CBLM Core Uc3
CBLM Core Uc3
Unit of
: SET-UP COMPUTER SERVERS
Competency
You need to complete this module before you can perform the
module on maintaining Computer Systems and Networks.
LIST OF COMPETENCIES
No. Unit of Competency Module Title Code
Introduction
Learning Outcomes:
ASSESSMENT CRITERIA
(NOS) features
manufacturer’s instructions
installation procedures
user/system requirements
requirements
requirements
and procedures.
CONTENTS:
This module will teach you how to set-up user access
ASSESSMENT CRITERIA:
CONDITIONS:
ASSESSMENT METHODS:
Practical Demonstration w/ oral questioning
Interview
Third Party
Portfolio
Learning Outcome 1
The user module supports user roles, which can be set up with
fine-grained permissions allowing each role to do only what the
administrator permits. Each user is assigned one or more roles. By
default there are three roles: anonymous (a user who has not logged in)
and authenticated (a user who has signed up and been authorized), and
in Drupal 7 only, administrator (a signed in user who will be assigned site
administrator permissions).
Users can use their own name or handle and can fine tune some
personal configuration settings through their individual my account page.
Registered users need to authenticate by supplying their username and
password, or alternately an login.
A visitor accessing your website is assigned a unique ID, the so-
called session ID, which is stored in a cookie. For security's sake, the
cookie does not contain personal information but acts as a key to
retrieving the information stored on your server.
You can
Peer-to-Peer
In a peer-to-peer network operating system users are allowed to share
resources and files located on their computers and access shared
resources from others. This system is not based with having a file server
or centralized management source. A peer-to-peer network sets all
connected computers equal; they all share the same abilities to use
resources available on the network.
Examples:
Ease of setup
Less hardware needed, no server needs to be purchased.
Disadvantages
Client/Server
Advantages
Disadvantages
The Network
The network allows transmission of data from the clients to the
server. There are several points on the network where a hacker could
eavesdrop or steal important packets of information. These packets may
contain important confidential data such as passwords or company
details. It is important that these networks are secured properly to keep
unauthorized professionals away from all the data stored on the server.
This can be done by encrypting important data being sent on the
network. However, encryption may not be the only possible way of
protecting networks as hackers can work their way around encryption.
Another method could be conducting security audits regularly and
ensuring identification and authorization of individuals at all points
along the network. This should discourage potential hackers (Wilson
et.al., 1999). Making the entire environment difficult to impersonate also
makes sure that the clients are reaching the true files and applications
on the server and that the server is providing information to authorized
personnel only.
Network operating systems typically are used to run computers that act
as servers. They provide the capabilities required for network operation.
Network operating systems are also designed for client computers and
provide functions so the distinction between network operating systems
and stand alone operating systems is not always obvious. Network
operating systems provide the following functions:
Installed Components
Client functionality
Server functionality
Functions provided:
Network services
File Sharing
Print sharing
User administration
Backing up data
\\servername\pathname
1. False---Allows
2. False---Software
3. True
4. False---Equals
5. True
Learning Objectives:
After reading this information sheet, you must be able to:
1. differentiate applications of network security, password and
policies.
Security Policies
B. User Authentication
1. Password Security
2. Privilege Management
B. End-User Security
User Role
C. Administrator Security
Free development
Controlled Development
RESTRICT NETWORK ACCESS.
1. Use a firewall.
Always apply all relevant and current security patches for both the
operating system, and components thereof.
1. True
2. False--managed
3. True
4. True
5. False---control
CONTENTS:
ASSESSMENT CRITERIA:
ASSESSMENT METHODS:
Practical Demonstration w/ oral questioning
Interview
Third Party
Portfolio
Learning Outcome 2
Learning Objectives:
After reading this information sheet, you must be able to:
a. Check the entire computer server for its normal functions
Hardware Requirement
Hardware
requirement for servers vary, depending on the server application. Absolute
CPU speed is not quite as critical to a server as it is to a desktop machine ].
Servers' duties to provide service to many users over a network lead to
different requirements such as fast network connections and high I/O
throughout. Since servers are usually accessed over a network, they may
run in headless mode without a monitor or input device. Processes that
are not needed for the server's function are not used. Many servers do not
have a graphical user interface (GUI) as it is unnecessary and consumes
resources that could be allocated elsewhere. Similarly, audio
and USB interfaces may be omitted.
Servers often run for long periods without interruption
and availability must often be very high, making hardware reliability and
durability extremely important. Although servers can be built from
Date Prepared: Document No. CIT-CSS-0115
COMPUTER March 2015 Issued by:
SYSTEM
SERVICING NCII
Prepared by: CORE Page 34 of 88
Institute of
Set-up Computer Technology
Reynaldo C.
Servers Revision #
Cariño
01
commodity computer parts, mission-critical enterprise servers are ideally
very fault tolerant and use specialized hardware with low failure
rates in order to maximize uptime, for even a short-term failure can cost
more than purchasing and installing the system. For example, it may take
only a few minutes of down time at a national stock exchange to justify
the expense of entirely replacing the system with something more reliable.
Servers may incorporate faster, higher-capacity hard drives,
larger computer fans or water cooling to help remove heat,
and uninterruptible power supplies that ensure the servers continue to
function in the event of a power failure. These components offer higher
performance and reliability at a correspondingly higher price.
Hardware redundancy—installing more than one instance of modules
such as
To increase reliability, most servers use memory with error detection and
correction, redundant disks, redundant power supplies and so on. Such
components are also frequently hot swappable, allowing technicians to
replace them on the running server without shutting it down. To prevent
overheating, servers often have more powerful fans. As servers are usually
administered by qualified system administrators, their operating systems
are also more tuned for stability and performance than for user
friendliness and ease of use, Linux taking a noticeably larger percentage
than for desktop computers.
As servers are often noisy and they need a stable power supply, good
Internet access, and increased security, it is usual to store them in
dedicated server centers. This requires reducing the power consumption,
as the extra energy used generates more heat thus causing the
temperature in the room to exceed acceptable limits; hence normally, server
rooms are equipped with air conditioning devices. Server casings are
usually flat and wide (typically measured in "rack units"), adapted to store
many devices next to each other in a server rack. Unlike ordinary
computers, servers usually can be configured, powered up and down or
rebooted remotely, using out-of-band management,
Servers often do extensive pre-boot memory testing and verification and
startup of remote management services. The hard drive controllers then
start up banks of drives sequentially, rather than all at once, so as not to
overload the power supply with startup surges, and afterwards they
initiate RAID system pre-checks for correct operation of redundancy. It is
Date Prepared: Document No. CIT-CSS-0115
COMPUTER March 2015 Issued by:
SYSTEM
SERVICING NCII
Prepared by: CORE Page 35 of 88
Institute of
Set-up Computer Technology
Reynaldo C.
Servers Revision #
Cariño
01
common for a machine to take several minutes to start up, but it may not
need restarting for months or years.
A server rack seen
from the rear
Operating systems
Types
Main Differences
Many people mistakenly believe that a server is no different from a
typical desktop computer. This couldn't be further from the truth.
While almost any computer that meets the minimum hardware
requirements can run a server operating system that alone does
not make a desktop computer a true server. Even if the desktop
computer had similar processor speeds, memory and storage
capacity compared to a server, it still isn't a replacement for a real
server. The technologies behind them are engineered for different
purposes.
A desktop computer system typically runs a user-friendly operating
system and desktop applications to facilitate desktop-oriented
tasks. In contrast, a server manages all network resources.
Servers are often dedicated (meaning it performs no other task
besides server tasks). Because a server is engineered to manage,
store, send and process data 24-hours a day it has to be more
reliable than a desktop computer and offers a variety of features
and hardware not typically used in the average desktop computer.
Server Hardware
One of the best choices for a small business is a dedicated
server built from the ground up as a file server to provide features
and expansion options that a desktop computer lacks. Some server
hardware decisions you will need to make include the following:
1. Form Factor: For small businesses, the best choice is a
dedicated entry-level server in a tower configuration.
2. Processor: Choose a server-specific processor to boost
performance and data throughput.
3. Memory: Buy as much memory as you can afford and look
for expansion slots for future upgrades.
4. Storage: Look for SATA or SCSI hard disks, not IDE.
Motherboard
The motherboard is the computer's main electronic circuit board to which
all the other components of your computer are connected. More than any
other component, the motherboard is the computer. All other components
attach to the motherboard.
Date Prepared: Document No. CIT-CSS-0115
COMPUTER March 2015 Issued by:
SYSTEM
SERVICING NCII
Prepared by: CORE Page 41 of 88
Institute of
Set-up Computer Technology
Reynaldo C.
Servers Revision #
Cariño
01
The major components on the motherboard include the processor (or CPU),
supporting circuitry called the chipset, memory, expansion slots, a
standard IDE hard drive controller, and input/output (I/O) ports for devices
such as keyboards, mice, and printers. Some motherboards also include
additional built-in features such as a graphics adapter, SCSI disk
controller, or a network interface.
Processor
The processor, or CPU, is the brain of the computer. Although the processor
isn't the only component that affects overall system performance, it is the
one that most people think of first when deciding what type of server to
purchase. At the time of this writing, Intel had four processor models
designed for use in server computers:
Itanium 2: 1.60GHz clock speed; 1–2 processor cores
Xeon: 1.83–2.33GHz clock speed; 1–4 processor cores
Pentium D: 2.66-3.6GHz clock speed; 2 processor cores
Pentium 4: 2.4-3.6GHz clock speed; 1 processor core
Each motherboard is designed to support a particular type of processor.
CPUs come in two basic mounting styles: slot or socket. However, you can
choose from several types of slots and sockets, so you have to make sure
that the motherboard supports the specific slot or socket style used by the
CPU. Some server motherboards have two or more slots or sockets to hold
two or more CPUs.
The term clock speed refers to how fast the basic clock that drives the
processor's operation ticks. In theory, the faster the clock speed, the faster
the processor. However, clock speed alone is reliable only for comparing
processors within the same family. In fact, the Itanium processors are
faster than Xeon processors at the same clock speed. The same holds true
for Xeon processors compared with Pentium D processors. That's because
the newer processor models contain more advanced circuitry than the older
models, so they can accomplish more work with each tick of the clock.
The number of processor cores also has a dramatic effect on performance.
Each processor core acts as if it's a separate processor. Most server
computers use dual-core (two processor cores) or quad-core (four cores)
chips.
Hard drives
Most desktop computers use inexpensive hard drives called IDE drives
(sometimes also called ATA).These drives are adequate for individual
users, but because performance is more important for servers, another type
of drive known as SCSI is usually used instead. For the best
performance, use the SCSI drives along with a high-performance SCSI
controller card.
Recently, a new type of inexpensive drive called SATA has been
appearing in desktop computers. SATA drives are also being used more
and more in server computers as well due to their reliability and
performance.
Network connection
The network connection is one of the most important parts of any server.
Many servers have network adapters built into the motherboard. If your
server isn't equipped as such, you'll need to add a separate network
adapter card.
Video
Fancy graphics aren't that important for a server computer. You can equip
your servers with inexpensive generic video cards and monitors without
affecting network performance. (This is one of the few areas where it's
acceptable to cut costs on a server.)
Power supply
Because a server usually has more devices than a typical desktop
computer, it requires a larger power supply (300 watts is typical). If the
server houses a large number of hard drives, it may require an even larger
power supply.
1. True
2. False--software
3. True
4. True
5. False---electronic
6. True
7. True
8. True
CONTENTS:
ASSESSMENT CRITERIA:
CONDITIONS:
ASSESSMENT METHODS:
Practical Demonstration w/ oral questioning
Interview
Third Party
Portfolio
Learning Outcome 3
Learning Objectives:
After reading this information sheet, you must be able to:
Setting up management server.
Note: OCS Inventory NG Server Setup will check for all these components
and will exit if any are missing.
The Web communication server requires Apache web server and Perl 5
scripting language and some additional modules for Perl 5 (see
Requirements). It acts as an Apache module which handles HTTP OCS
Inventory agents' requests to a virtual directory /ocsinventory.
Warning: You must have root privileges to set required perl modules up.
On Debian like Linux, you can use “apt-get” to set required modules up:
On Gentoo like Linux, you can use "emerge" to get required modules set
up:
emerge dev-perl/XML-Simple
emerge perl-core/IO-Compress
emerge dev-perl/Apache-DBI
emerge dev-perl/Net-IP
emerge dev-perl/SOAP-Lite
emerge app-portage/g-cpan
g-cpan -i XML::Entities
You can also install the missing modules using the cpan script. i.e.
cpan -i Compress::Zlib
Note: If you are not using system perl interpreter, but another one such as
the XAMPP/LAMPP perl interpreter, you must call this perl interpreter, not
the system one, by specifying full path to your perl interpreter. For
example:
/opt/lampp/bin/perl Makefile.PL
The Web Administration console requires Apache web server and PHP 4
scripting language and some additional modules for PHP
(seeRequirements).
Warning: You must have root privileges to install Administration console.
On Fedora/Redhat like Linux, you can use “yum” to install PHP Zip
support:
Otherwise, the best way to do this is to use PHP PECL ZIP package. You
must have PHP development libraries (php-devel package under RedHat or
Fedora Core, under Linux Debian or Ubuntu) in order to
have phpize command.
sh setup.sh
Type “y” or “enter” to validate and, then enter MySQL server host address,
in most cases localhost.
Setup will then try to find make utility. If it fails, setup will stop.
/etc/httpd/conf.d
or
/etc/apache/conf.d
If you are not using configuration directory, but having all configurations
into Apache main configuration file, enter no.
Setup will next try to determine your Apache mod_perl version. If it is not
able to determine mod_perl version, it will ask you to enter it.
Note: You can check which version of mod_perl you are using by querying
your server's software database.
Now, you can restart Apache web server for changes to take effect (httpd is
usually for apache2).
/etc/init.d/httpd restart
or
max_execution_time
max_input_time
memory_limit
Note: You are not obliged to launch install.php, you can use this command
too :
Note: You will see warning regarding max size of package you will be able
to deploy. Please, see Uploads size for package deployment.) to configure
your server to match your need.
Note: If your default collation is UTF8, you will see some errors regarding
KEY too long in some tables, see here for some
workarounds:http://forums.ocsinventory-ng.org/viewtopic.php?
pid=32009#p32009
Finally, you may fill in a text describing the TAG, a string displayed at first
launch of the agent to ask user to enter the TAG Value. It's a generic data
which allows you to sort the new computers (geographical site, first floor,
john room....). If you don't want this functionality, just let it blank.
Warning: Notice that many package removers are asking if you want to
also remove database - you should not do this, because you want to
upgrade, and not install from scratch.
Note: Notice that installers says about how to log in to server after
upgrade. Actually use your user/pass that you used before upgrade,
especially if you removed/disabled user admin :)
Apache 2.2.17
MySQL 5.5.8 + PBXT engine(currently disabled)
PHP 5.3.5 + PEAR
XAMPP Control Panel 2.5.8
SQLite 2.8.17
SQLite 3.6.20
OpenSSL 0.9.8l
phpMyAdmin 3.3.9
ADOdb 5.11
Mercury Mail Transport System v4.72
FileZilla FTP Serveur 0.9.37
Webalizer 2.21-02
Perl 5.10.1
mod_perl 2.0.4
Xdebug 2.1.0rc1
Tomcat 7.0.3 (with mod_proxy_ajp as connector)
Note: Even if all these components are installed, you will be able to choose
the components you want to automatically start.
Communication server files are now located into PERL standard libraries.
Apache logs (access.log, error.log, phperror.log) and communication server
logs (ocsinventory-NG.log) are located in the sub-directoryApache\Logs”.