0% found this document useful (0 votes)
3 views

Server2

This chapter provides an overview of server types, their roles, and key components, emphasizing the differences between servers and PCs. It discusses thin servers and thin client servers, their functionalities, and the importance of RAID and network storage technologies. Additionally, it highlights server classifications, major components, and the significance of hot-swap technology for continuous service.

Uploaded by

kapama
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Server2

This chapter provides an overview of server types, their roles, and key components, emphasizing the differences between servers and PCs. It discusses thin servers and thin client servers, their functionalities, and the importance of RAID and network storage technologies. Additionally, it highlights server classifications, major components, and the significance of hot-swap technology for continuous service.

Uploaded by

kapama
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

This sample chapter is for review purposes only. Copyright © The Goodheart-Willcox Co., Inc. All rights reserved.

9 Introduction
to the Server










After studying this chapter, you will be able to:
❑ Recall the various roles of servers in a network environment.
❑ Give examples of uses for a thin server.
❑ Give examples of uses for a thin client server.
❑ Differentiate between a server and a PC.
❑ Identify the ID and LUN numbers of a Small Computer Systems Interface
(SCSI) device.
❑ Identify the four types of system resources.
❑ Compare RAID systems.
❑ Recall the characteristics and purpose of network attached storage (NAS)
technology.
❑ Recall the characteristics and purpose of storage area network (SAN)
technology.
❑ Give examples of common Fibre Channel technology applications.
❑ Identify the Fibre Channel topologies.
❑ Interpret an iSCSI IQN address.

Network+ Exam—Key Points Network+


The Network+ Certification exam specifically references fault tolerance and
network storage. Pay particular attention to the characteristics of RAID 0, RAID 1,
RAID 5, and RAID 6 and to network storage, such as storage area network (SAN)
and network attached storage (NAS).

369
370 Networking Fundamentals Chapter 9 Introduction to the Server 371

Authentication Figure 9-1.

Key Words and Terms


Servers provide
■■■■■■■ and security
database server Web server Mail server Print server a variety of
services, such as
The following words and terms will become important pieces of your authentication and
networking vocabulary. Be sure you can define them. security, Web, mail,
ACPI Component Architecture Internet Small Computer Systems and print.
(ACPICA) Interface (iSCSI)
Automatic Configuration and Power interrupt request (IRQ)
Interface (ACPI) logical unit number (LUN)
backplane memory address assignment Internet
blade server Network Address Authority (NAA) connection
Direct Memory Access (DMA) channel network attached storage (NAS)
disk mirroring parallel processing
disk striping power-on self-test (POST)
duplexing Redundant Array of Independent Disks
error correction (RAID)
fabric switch serial attached SCSI (SAS)
fault tolerance Small Computer Systems Interface
Fibre Channel (SCSI) controller to provide security for the entire network, and another server to provide
firmware storage area network (SAN) application software, a database for its clients, and support for print operations.
thin client The more services a server provides and the more clients it services creates
hot swapping
a higher demand on the server. A single server with a limited amount of
hot-swap technology thin client server
services may be fine for a relatively small number of users, typically less than
Input/Output (I/O) port thin server 25. A commercial enterprise spanning across the country or world may require
hundreds of servers. The network administrator or network designer decides
the number and capacity of individual servers needed by taking into account the
number of users and the system’s predicted network traffic.
Each network system is uniquely designed, even though each network has
many similarities. Some network equipment providers have software programs
that help you design a network. You simply enter information, such as the number
of clients, offices, cities, and countries and the type of software and services to be thin server
A complete understanding of server hardware can take a great deal of study. provided. After all the information is collected, the software program provides a server that has
This chapter provides an overview of the server and identifies different server an estimate of the size and number of servers required. We will discuss this topic only the hardware
types and their roles. You will be introduced to some of the hardware that makes later in Chapter 19—Designing and Installing a New Network. and software needed
the server unique from the ordinary PC, and you will learn about RAID and to support and run
other storage systems. a specific function,
Thin Servers
such as Web services,
A thin server is a server that has only the hardware and software needed to print services, and
Server Types and Services support and run a specific function, such as Web services, print services, and file file services.
Servers provide a variety of services. Some of the services a server can services. It is more economical to use a thin server as a print server than to tie up
thin client server
provide are authentication and security, Web, mail, and print. A server can be a more expensive server simply to handle printing on a network. IBM markets
a server that provides
called by many names. For example, it can be called an authentication and security a thin server, which consists of a sealed box that contains only the essential
applications and
database server, Web server, mail server, and print server, Figure 9-1. A network may hardware and software required for supporting the server’s dedicated function. processing power to
have a single server that provides a variety of services, or it may have a group of a thin client.
servers, each providing a specific service. Thin Client Servers thin client
A small network usually has one server set up to handle many different A thin client server is a server that provides applications and processing a computer that relies
services. A large network usually has several servers, each providing a different power to a thin client. Thin client servers run terminal server software and may on the thin client
service or set of services. For example, a large corporation may use one server have more RAM and hard disk drive storage than needed. A thin client is a server’s processing
to handle e-mail requests and Web hosting, another server to serve as a domain computer that typically has a minimal amount of processing power and memory. power and memory.
372 Networking Fundamentals Chapter 9 Introduction to the Server 373

It relies on the server’s processor and memory for processing data and running Do not open a CRT (monitor) while wearing an antistatic wrist strap, even if the CRT is Caution
software applications. Thin clients are becoming common in industry for such unplugged. CRT screens can hold a high voltage charge for long periods of time after they
applications as hotel bookings, airline ticketing, and medical record access. have been disconnected from electrical power.
When budgets are tight, you can install what is normally considered an
obsolete PC on a thin client network. The obsolete PC is obsolete because of its
processing speed, lack of storage, and inability to run new software. The thin The major components of a server are similar to a typical PC. In fact, you
client server can provide all the services that are required by the obsolete PC, can use a typical PC as a server for a small network. A network server can
thus making the obsolete PC a useful workstation. be as simple as a typical PC or as complex as a piece of equipment designed
Do not confuse a thin client with a dumb terminal. A dumb terminal sends exclusively for networks. Some server models with multiple CPUs, large amounts
user input to a mainframe. Dumb terminals have absolutely no computing of RAM, and vast amounts of storage space can be thought of as a “small”
power, operating system, hard disk drive, BIOS, and RAM. A thin client may not mainframe rather than as a PC. There are many server designs available. As part
need a hard disk drive or an operating system; however, it is still a full-fledged of your study of network servers, it is highly advisable to check the IBM, Sun
computer because it has a CPU and processing power. Microsystems, HP, and Dell Web sites to see the available designs. This section
Windows 2000 Server, Windows Server 2003, and Windows Server 2008 come looks at the following components: case, hot-swap components, power supply,
with Terminal Services software. Once Terminal Services is set up on the server, motherboard, BIOS, and CPU.
you have the option to generate a disk that will assist you in automatically setting
up thin client workstations.
Case
Server case styles vary greatly. Some are similar to desktop models. Some are
designed to be mounted into a rack like the server in Figure 9-2.
Server Classification by Number of CPUs Large enterprise servers are actually a group of individual servers mounted
Servers vary a great deal by size and power. The number of processors in a rack system or cabinet, Figure 9-3. The group of servers acts as one unit that
they contain usually classifies them. For example, Sun Microsystems has three has multiple CPUs and a large amount of system resources, such as hard disk
classifications of servers: entry-level, midrange, and high-end. Sun Microsystems drive storage and RAM.
defines these classifications by the number of processors they contain. A Sun A blade server derives its name from its size and shape. It is extremely thin blade server
Microsystems entry-level server has up to 8 processors. A midrange server has up compared to other servers and fits into a rack, Figure 9-4. Blade servers are a powerful server
to 30 processors, and a high-end server has up to 106 processors. Other vendor’s especially designed to allow a large number of servers to be mounted in a small that is extremely
definitions vary somewhat, but this gives you a general idea. In this chapter, we space. Blade servers are not to be confused with thin servers. A blade server can thin. It is designed
focus on the HP ProLiant DL740 server. The HP ProLiant DL740 is one of the most contain more than one processor and be quite powerful. They are often selected to be mounted in
powerful entry-level servers manufactured. a small space with
for applications where there is a requirement for many servers to perform the
other blade servers.
same or similar function. For example, they may be used in a large Web service
Major Server Components facility or a file server farm.
It is assumed you have some PC hardware background from completing a
course on PC service and repair or have a CompTIA A+ Certification. If not, it is
Hot-Swap Components
Servers are generally designed to provide continuous service with minimal
strongly advised that you take a course in PC repair or, at the very least, complete
interruptions and data loss. The main feature that most servers use to provide
a home study program. A good background in PC hardware proves to be
this continuous service is hot-swap technology. Hot-swap technology allows a hot-swap
beneficial to anyone working with network servers. As a matter of fact, IBM and
component to be removed or installed while the system is running. There is no technology
other companies require the CompTIA A+ Certification as part of its progression a technology that
need to power down the system while replacing or adding major components.
toward certification as a server technician. allows a component
Some common hot-swap components are hard disk drives, memory modules
When handling electronic components, it is standard practice to use to be removed or
(RAM), CPUs, and power supplies.
electrostatic discharge (ESD) safety practices. Electronic components based on installed while the
Never assume a component is hot-swappable. Always check the system
complimentary metal oxide semiconductor (CMOS) technology can be easily system is running.
manual before removing any component while the system is powered on.
damaged by static electricity. The human body and clothing can build up a
tremendous static electricity charge. When touching a static-sensitive electronic
component, the static electricity can discharge and cause the component to be
Figure 9-2.
destroyed. To avoid damaging electronic components, use an antistatic wrist
The ProLiant DL740
strap, which is designed to drain static charges safely. can be mounted into
a rack. (Hewlett-
Caution Packard Company)
Do not use an antistatic wrist strap when servicing any component with live voltage present.
374 Networking Fundamentals Chapter 9 Introduction to the Server 375

Figure 9-3. Figure 9-5.


This cabinet can Power supplies Back view of the
store many servers, ProLiant ML350.
allowing them to This system comes
act as a single unit. with two power
(Hewlett-Packard supplies that evenly
Company) distribute power
throughout the
system. When one
power supply fails,
the other carries the
full load. (Hewlett-
Packard Company)

Power Supply
The power supply converts standard 120-volt or 240-volt AC power into lower
DC voltage levels that can be used by the motherboard and other devices inside
the computer case. A typical power supply provides an assortment of output plugs.
The plug style matches the intended piece of equipment. For example, a standard
ATA drive uses a Molex plug, which supplies 5 volts DC and 12 volts DC to the
ATA drive. An ATX-style motherboard plug supplies 3.3 volts, 5 volts, and 12 volts
as well as a ground connection to the motherboard. It is also designed to plug into
the motherboard correctly. Older style connections could be incorrectly plugged
into the motherboard if you did not pay attention to the color-coding.
Entry-level servers are typically equipped with two power supplies,
Figure 9-5. The two power supplies balance the load. If one power supply fails,
Figure 9-4. the other power supply carries the full load. Some servers are designed with
A blade server is “hot-swappable” power supplies, which permit the defective power supply to be
thin, yet powerful. It changed while the server is running.
is designed to allow To prevent the loss of data, most server manufacturers recommend disconnecting
many blade servers the server from the network while replacing hot-swappable power supplies. backplane
to be installed in a a simple mother-
small area. A—A Motherboard board designed with
single blade server. Servers generally use a backplane. A backplane is a simple motherboard minimal compo-
B—Many blade designed with minimal components. It typically serves as the interface of all nents. It typically
servers installed in a the major components. It is designed to allow major components to be added or serves as the inter-
single rack. (Hewlett- removed without powering down the system. Removing components without face of all the major
Packard Company) shutting down the system is call hot swapping. components.
Figure 9-6 shows the general backplane layout of the HP ProLiant DL740 server hot swapping
with and without the added modules. An I/O board attaches to the backplane. It the process of
contains six PCI hot-swappable slots. The processor boards each contain 4 CPUs, for removing compo-
a total of 8 CPUs. Each memory module in the system is hot-swappable and contains nents without
A B 8 DIMMS. The HP ProLiant DL740 can contain up to 40 GB of RAM. The multiple shutting down the
CPUs and vast amount of RAM are required to provide the many different services to system.
376 Networking Fundamentals Chapter 9 Introduction to the Server 377

Small Computer
Figure 9-6. Small Computer Systems Interface (SCSI) Systems Interface
The backplane layout of the ProLiant DL740.
Small Computer Systems Interface (SCSI), pronounced skuzzy, is a (SCSI)
Fan 1 computer bus technology that allows you to connect multiple devices to a a computer bus tech-
Memory Fan
connector 1 single controller. The benefits of SCSI technology can be readily observed in nology that allows
module 1 Memory
Fan 2 connector module the chart in Figure 9-7. SCSI technology not only allows multiple devices to you to connect
connector Fan 1 connect to a single controller, it also supports high-data transfer rates. This is multiple devices to a
2 single controller.
Memory quite a performance improvement when compared to the traditional IDE or ATA
module 2 Memory
connector module attachment. SCSI is ideal for servers that must hold large amounts of data that is
2
Processor Processor accessed by numerous clients.
board board
Memory
1 2
Memory Most SCSI drives are hot-swap devices. Often, SCSI drives are arranged in
module 3 module
connector 3
the server with hot-swap bays open to the outside of the case to provide easy
access. This allows you to connect or disconnect a drive without opening the
Processor Processor Memory
I/O board board 1 board 2 Memory
module
server case. See Figure 9-8.
connector connector connector module 4
connector 4 SCSI technology has evolved over the years. With this evolution, new names
I/O board with
6 PCI hot plug have emerged to describe the improved technology. The term Wide is used to
Memory Memory
module 5
slots indicate 16-bit data transfers in place of 8-bit data transfers. To reflect the increase
module
connector 5 in frequency, the term Fast was used and then the term Ultra. Combination of
the words, such as Ultra/Wide, are also used to express the newer technologies.
Backplane Backplane with modules and I/O board Ultra/Wide means the SCSI device is faster and supports 16-bit transfers. A close

numerous network clients with minimal delay. The CPUs need not be the latest, high- Figure 9-7.
Common Name Class Devices Bus Width Speed MBps
speed processors available because there are numerous processors in the server. SCSI technology
in bits specifications.
BIOS SCSI-1 SCSI-1 8 8 5 MHz 4-5 MBps
The BIOS contains a small software program that starts the server boot Wide SCSI SCSI-2 16 8 5 MHz 10 MBps
operation when power is applied to the server. The combination BIOS chip and Fast SCSI SCSI-2 8 8 10 MHz 10 MBps
firmware the software program are usually referred to as firmware. The BIOS is responsible Fast/Wide SCSI SCSI-2 16 16 10 MHz 20 MBps
the combination of for the power-on self-test (POST), which is performed at startup. The POST Ultra SCSI SCSI-3 8 8 20 MHz 20 MBps
BIOS chip and the does a quick, initial check of the major components, such as memory, disk drives, Ultra/Wide SCSI-3 8 16 20 MHz 20 MBps
software program keyboard, mouse, and monitor, to be sure that a minimum working system is
within the chip. Ultra2 SCSI-3 8 8 40 MHz 40 MBps
available. After a general check is made of the major hardware components, the Ultra2/Wide SCSI SCSI-3 16 16 40 MHz 80 MBps
power-on self-test BIOS turns control over to the operating system software. The operating system
Ultra3 SCSI SCSI-3 16 16 40 MHz 160 MBps
(POST) completes the boot process by loading more advanced hardware drivers than the
a BIOS routine that Ultra Wide 320 SCSI-3 16 16 80 MHz 320 MBps
BIOS did. It also performs a more sophisticated check of hardware and software
performs a series Ultra Wide 640 SCSI-3 16 16 160 MHz 640 MBps
systems. If all the software and hardware components appear to be in working
of hardware checks order, the final screen, which serves as a user interface, appears.
to determine if
the computer is in Central Processing Unit (CPU) Figure 9-8.
minimal working One major difference between a server and a typical PC is that many Hot-swap drives are
order.
servers have multiple CPUs installed rather than just one. When multiple CPUs typically accessible
parallel processing are installed, the server can perform parallel processing. This means that a from the front of
processing a program can be processed through more than one CPU simultaneously. Another the server for easy
program through advantage of multiple CPUs is several clients may be serviced at the same time access. (Hewlett-
more than one CPU rather than waiting their turn to access a single CPU. Supercomputers and Packard Company)
simultaneously. enterprise servers may contain over 1,000 CPUs.
A small office server can get by with one processor, especially if demand on
the server is low. A large enterprise system requires multiple processors to meet
the demands of the server’s clients. Some processor modules are hot-swappable. Hot-swap
When a single CPU fails, it can easily be removed and replaced while the server SCSI drive
is running and providing services to clients.
378 Networking Fundamentals Chapter 9 Introduction to the Server 379

study of the table in Figure 9-7 will help you understand the evolution of the SCSI electrical connection is made. The pairs of pins represent the binary number
technology. To learn more about SCSI technology, visit the Adaptec Web page at system. The jumpers are applied in a binary pattern that represents the SCSI ID
www.adaptec.com. There you will find in-depth knowledge about SCSI systems number. Figure 9-10 illustrates each of the binary patterns and the related SCSI
and other technologies. ID number.
A SCSI hardware system consists of a host adapter or controller card, a
flat ribbon cable to connect SCSI devices, and SCSI devices such as disk drives, Logical unit number (LUN)
CD-ROMs, and tape drives. SCSI cables come in a variety to match the many SCSI devices are not limited to internal devices. The SCSI chain can extend
different classifications of SCSI. The cables come as DB-25, 50-pin, 68-pin, and outside the case by adding an extender card to the SCSI chain. The extender card
80-pin styles. allows more devices to be attached to existing SCSI systems. The extender card
Look at Figure 9-9 to see the way a typical SCSI host adapter, cable, and is an integrated circuit card connected to the SCSI chain as a SCSI device. See
devices might appear. The host adapter and devices can connect to any part of Figure 9-11.
the chain. The chain of SCSI devices must be terminated. Termination is typically When additional devices are attached, they are identified separately from the logical unit number
completed at the last device with a termination block. original chain of devices. Each additional device connected to the SCSI extender (LUN)
is identified with a logical unit number (LUN). SCSI bus extenders are also a numbering scheme
SCSI ID numbers referred to as SCSI expanders, repeaters, and regenerators. to identify SCSI
devices attached to
Each device, including the host adapter card, must have a unique ID number. External SCSI device chains are commonly used in RAID systems. RAID
an extender card.
The numbers start at zero and end at seven for an eight-device SCSI chain and systems are covered later in this chapter.
end at fifteen for a sixteen-device SCSI chain. The host adapter typically is
assigned the highest number.
SCSI ID numbers are assigned through pins and jumpers on the SCSI drive.
Serial Attached SCSI
The pins are arranged in pairs. When a jumper is applied across the pins, an Serial attached SCSI (SAS) is the next generation of SCSI. It uses a serial Serial attached SCSI
port similar to the SATA serial drive port, Figure 9-12. This eliminates the need (SAS)
of the wide SCSI cable and produces faster data transfer rates. First generation SCSI technology
Figure 9-9. SAS devices can achieve data rates as high as 3 Gbps. Second generation SAS that transfers data in
The last SCSI
Typical SCSI drive serial fashion.
drive in the chain devices can achieve rates of 6 Gbps. Note that these speeds are expressed in bits
arrangement. is terminated per second (bps), not bytes per second (Bps). This is because SAS transfers data
in a serial fashion. The SAS design allows 128 devices to be attached directly.

SCSI drive
Figure 9-10.
ID 6
Connection Jumper
SCSI binary patterns.
SCSI drives pins
ID 3–ID 5

SCSI drive =0 =4
ID 2

SCSI drive
ID 1
=1 =5
SCSI drive
ID 0
Host adapter =2 =6
ID 7

PCI slot =3 =7
380 Networking Fundamentals Chapter 9 Introduction to the Server 381

Figure 9-11. LUN ID Figure 9-13.


The SCSI limit of numbers Power options for
SCSI ID
seven devices can be 0 a wireless network
numbers
expanded by using 0 Expander card 1 adapter.
expander cards.
Each expander card 1 2
SCSI card
allows an additional 2 3
seven devices to be
3 4
connected to the
LUN ID
SCSI system. LUN 4 5
numbers
numbers are assigned 0
5 6
to the additional SCSI
devices so they can 6 Expander card 1
be identified by the 2
system software and Device location
3 equals SCSI 6,
BIOS.
LUN 3
4
5
6

ACPI Component Architecture (ACPICA) is an extension to the original ACPI ACPI Component
standard. The goal of ACPICA is to create a non-proprietary software package Architecture
Figure 9-12. for configuring hardware. An ACPICA-compliant device is operating system (ACPICA)
SAS and SATA disk an extension to the
independent. ACPICA is written in the C language and is an open standard
drive connectors. original ACPI stan-
allowing any computer software or hardware manufacturer to share power-saving
Notice the two dard that provides
connector types are features rather than developing proprietary power-saving features. ACPICA is
a non-proprietary
similar. compatible with both 32-bit and 64-bit systems. software package
SAS Some of the companies that participate with the goals of ACPICA are for hardware
Microsoft, HP, Intel, and several Linux organizations. To learn more about configuration.
ACPICA, check out the ACPICA Web site (www.acpica.org).

System Resources
System resources refer to resources such as interrupt requests, Direct Memory
Access channels, Input/Output ports, and memory. System resources are assigned
SATA to components installed in the computer system such as hard disk drives, keyboards,
and mice. In a Windows-based server, you can view system resource assignments
in Device Manager.
Through the use of edge expander devices, a maximum of 16,000 SAS devices can Not all devices have all four types of resources assigned to them. For example,
be connected. some devices do not require a DMA channel assignment. System resources
typically cannot be shared between two devices. Sharing the same system resource
causes a system resource conflict, referred to simply as a conflict. Conflicts must
ACPI and ACPICA be resolved before the system can operate properly. An exception to this rule is
Automatic Automatic Configuration and Power Interface (ACPI) is a standard motherboard chips used to bridge different bus systems. A motherboard chip can
Configuration and for controlling the power options for computer hardware devices. The first share an IRQ with a hardware device.
Power Interface implementation of the ACPI standard gave users the ability to select how they
(ACPI) wanted their computer to behave to conserve power. For example, the user could Interrupt Request (IRQ)
a standard for configure the computer or individual computer devices to go into a state of An interrupt request (IRQ) is a circuit that communicates with the CPU. interrupt request
controlling the power
hibernation after a period of inactivity. Hardware devices send an electrical signal to the CPU using an assigned IRQ circuit. (IRQ)
options for computer
Figure 9-13 shows the power options available for a wireless network There are 16 IRQ assignments numbered from 0 to 15, Figure 9-14. Many of the a circuit that commu-
hardware devices.
adapter. These options allow the computer to turn off the adapter to save power assignments cannot be changed, but some can. When Plug and Play devices are used, nicates with the CPU.
and allow the adapter to wake the computer when network activity occurs. the IRQ is automatically assigned. Typically, each hardware device must use a separate
382 Networking Fundamentals Chapter 9 Introduction to the Server 383

Figure 9-14. Figure 9-15.


IRQ assignments. DMA assignment.

IRQ to communicate with the CPU. If two hardware devices are assigned the
same IRQ, an IRQ conflict occurs. Once the first device contacts the CPU using the
IRQ assignment, the other device cannot communicate with the CPU. An IRQ conflict
can lead to problems such as an inoperable device, a system crash, and a system
lockup. An IRQ can typically be assigned manually by first entering the BIOS setup
program and disabling Plug and Play detection. Changes to the IRQ can then be Figure 9-16.
IDE Channel
made through Device Manager. After the problem device has been assigned the
Properties dialog box
proper IRQ, the Plug and Play detection can be activated without a problem.
Advanced Settings
You may notice IRQ numbers higher than 16 in Device Manager. These numbers tab. The IDE channel
are virtual IRQ settings, rather than hardware-based IRQs. They work the same as the is assigned to a DMA
hardware-based interrupts, but they are not limited by physical properties. Virtual channel by enabling
IRQ assignments are configured automatically by the operating system. DMA.

Tech Tip Yellow question marks next to devices in Device Manager indicate there is a problem with
the device or assignment.

Direct Memory Access (DMA) Channel


Direct Memory A Direct Memory Access (DMA) channel is a circuit that allows devices
Access (DMA) to communicate and transfer data to and from RAM without the need of CPU
channel intervention. Computer systems were first designed with the CPU handling
a circuit that allows all communication. Every bit of data had to travel through the CPU. DMA
devices to communi- technology was introduced to save valuable processor time. Input/Output (I/O) Port
cate and transfer data DMA works in conjunction with the chipsets on the motherboard, BIOS Input/Output (I/O)
The Input/Output (I/O) port is a small amount of memory assigned to a
to and from RAM port
software, and the CPU. Large blocks of data that need to be transferred between device that temporarily holds small amounts of data. It is used to transfer data
without the need of a small amount of
CPU intervention.
hardware devices and memory are transferred through a DMA channel that between two locations. The data remains in the I/O port assignment until it can
memory assigned to
is assigned to the device. Figure 9-15 shows the DMA controller identified by be moved.
a device that tempo-
Device Manager. The system has many hardware devices and software programs that depend rarily holds small
One of the devices controlled by the DMA memory access controller is the on transferring data between hardware and memory locations. When a device amounts of data. It
computer ATA drive. Figure 9-16 shows the Advanced Settings tab for the IDE or software program wants to transfer data, it may need to wait until the CPU is used to transfer
channel. The IDE channel has been assigned to a DMA channel to take advantage is finished with its current process. In fact, it may need to wait until several data between two
of fast data transfer. processes are completed before the CPU can handle the data. The I/O port stores locations.
384 Networking Fundamentals Chapter 9 Introduction to the Server 385

Figure 9-17. Figure 9-18.


I/O port Memory
assignments. assignments.

this data until the CPU is free. Figure 9-17 shows the I/O port assignments Another RAID technique is error correction, which can use traditional fault tolerance
associated with a system’s hardware devices. error-checking code (ECC) or parity. ECC is obsolete as a method for RAID as applied to RAID
because most hard disk drive systems use ECC as a standard way to protect data. systems, it is the
ability to recover
Memory Address Assignment Incorporating ECC into a RAID system would be redundant.
from a hard disk or
memory address A memory address assignment is a large block of memory assigned to a Parity is a technique that allows data to be recovered if one of the hard disk
hard disk controller
assignment device and is used to transfer data between two locations. A device is assigned a drives fails in a multiple disk drive system. A minimum of three hard disk drives
failure without the
a large block of range of memory addresses. Some devices such as video and sound cards require must be used for this technique. If three hard disk drives are used, one hard loss of stored data. As
memory assigned a great deal of memory. The blocks of RAM assigned to a device cannot be used disk drive is used to store parity and the other two are used to store data. Data applied to a network
to a device. It is
by any other device. Figure 9-18 shows the memory assignments associated with is spread evenly between the two data storage drives, and the parity code for the infrastructure, it is
used to transfer sum of the two data storage drives is stored on the parity drive. the ability to continue
a system’s hardware devices.
data between two Parity is also a binary code that represents the total data pattern shared operation during a
locations. between the data storage drives. If any data storage drive fails, the system can use system hardware or
RAID Systems the parity bit to rebuild the missing data. software error.
Redundant Array of Redundant Array of Independent Disks (RAID) is a system of disks RAID systems are referred to as RAID levels. There are many RAID levels, disk striping
Independent Disks arranged for speed or fault tolerance, or both. Fault tolerance as applied to RAID each incorporating a different technique to increase speed or to provide data a storage technique
(RAID) systems means the ability to recover from a hard disk or hard disk controller redundancy, or both. that divides the data
a system of disks failure without the loss of stored data. Fault tolerance as applied to a network Things to consider when selecting a RAID level are cost, reliability, and into sections and
arranged for speed infrastructure means the ability to continue operation during a system hardware speed. There is no single, best RAID level. The appropriate level depends on the writes the data across
or fault tolerance, or value of the data being protected and the amount of budget available. If a bank several hard disk
or software error. To achieve a high-data transfer rate, a technique known as disk
both. were protecting financial data, cost would most likely be of little concern. A drives at the same
striping is used. Disk striping involves dividing the data into separate sections time.
and writing the data across several hard disk drives at the same time. This RAID 0/5 with a tape backup would be quite appropriate. If you were protecting
reduces the total amount of time it takes to store large amounts of data. a personal computer, you would not likely need a RAID system. error correction
Repairing a failed RAID system means the drive must be physically replaced a RAID technique
and then the data reconstructed. In a Microsoft Windows operating system, the that uses traditional
Tech Tip Another accepted representation of the RAID acronym is Redundant Array of Inexpensive Disk Management utility is used to reconstruct data. If using proprietary SCSI error-checking code
drives, data is reconstructed by the data array manufacturer software package. (ECC) or parity.
Disks.
386 Networking Fundamentals Chapter 9 Introduction to the Server 387

Tech Tip 110100110100110100110100 Figure 9-21.


When implementing a RAID system in a Microsoft Windows operating system, all drives RAID 1, or disk

110100

110100
must be dynamic disk. Same data mirroring, provides
a copy of data on two
disk drives.
See Figure 9-19 for a list of RAID levels and a short description of each. The
following section looks at each RAID level in detail.

RAID 0
RAID 0 uses disk striping across a group of independent hard disk drives, RAID 2
Figure 9-20. This technique increases data flow but provides no fault tolerance. If
RAID 2 uses common ECC error-correction code to provide fault tolerance.
one hard disk drive fails, all data is lost and cannot be reconstructed. This RAID
All drives provide some sort of ECC, so this form of RAID is basically obsolete.
level is most useful when speed is important, not fault tolerance.

RAID 1 RAID 3
RAID 3 stripes data across multiple drives and stores parity on a separate
disk mirroring RAID 1 uses the technique of disk mirroring. Disk mirroring is the act of
drive. Data striping is performed at the byte level. See Figure 9-22.
the act of writing the writing the same information to two hard disk drives at the same time, Figure 9-21.
same information to Each of the two hard disk drives contains the same data. If one hard disk drive
two hard disk drives fails, a copy exists on the other hard disk drive. RAID 4
at the same time. Another form of RAID 1 is duplexing. Duplexing is the technique of placing RAID 4 stripes data across several drives and stores parity on a separate
duplexing each mirrored hard drive on a separate hard disk drive controller. Duplexing drive. The main difference between RAID 3 and RAID 4 is RAID 4 stores data in
the technique adds another level of fault tolerance. If one hard disk drive controller fails, the blocks. The size of the block can vary.
of placing each other is still operable. Mirroring contains the risk of the hard disk drive controller
mirrored hard drive failing and causing both hard disk drives to fail. RAID 1 provides data protection RAID 5
on a separate hard at the cost of speed when compared to RAID 0. When there is a small demand for RAID 5 is also called block striping with distributed parity. RAID 5 distributes
disk drive controller. disk read/writes, RAID 1 is an appropriate technique. parity across all drives rather than writing parity to one drive. It provides fault
tolerance and some increase in read-write data transfer. See Figure 9-23.
Figure 9-19.
RAID Level Description
RAID levels. Figure 9-22.
RAID 0 Striping. 110100100101010101010101001010010101010
RAID 3 writes across
RAID 1 Mirroring or duplexing.

1110100

0001100

1111000
multiple drives with
RAID 2 Error checking code (ECC). parity stored on a
RAID 3 Byte-level striping with parity. separate drive.
RAID 4 Block-level striping with parity.
RAID 5 Block-level striping with distributed parity.
RAID 6 Dual parity.
Data Data Parity
RAID 0/1 or 10 Disk mirroring with striping.
RAID 0/5 or 50 Block striping with parity and striping.

110100100101010101010101001010010101010 Figure 9-23.


RAID 5 provides
Figure 9-20.

1110100

0001100

1111000
110100100101010101010101001010010101010 both disk striping
RAID 0 divides and parity. Parity
110100

100101

010101

data and writes it to


and data is
multiple drives. It distributed across all
provides excellent
drives.
data transfer rates
but no data loss
Data Data Parity
protection.
Parity Data Data
Data Parity Data
388 Networking Fundamentals Chapter 9 Introduction to the Server 389

RAID 0/1 Clients Figure 9-24.


RAID 0/1, or RAID 10, uses multiple RAID 1 (mirroring) disk systems. It also In a network
incorporates disk striping across each of the mirrored disk sets. When compared attached storage
(NAS) design, clients
to RAID 1, this system provides better fault tolerance because data is duplicated
make requests for
on multiple mirrored disk sets. It also provides relatively fast data-transfer speeds
data through the
by striping data across the mirrored disk sets. network file server.
The file server then
RAID 0/5 makes a request to
RAID 0/5, or RAID 50, uses several RAID 5 (block striping with parity) the NAS device. The
sets and combines them with RAID 0 (disk striping). It provides increased fault NAS device retrieves
Network Disk or tape the data and sends it
tolerance when compared to a RAID 5 system. server storage array to the file server. The
file server forwards
RAID 6 the data to the client.
RAID 6 is similar to RAID 5 in that it distributes parity across all drives, except
RAID 6 uses a second set of parity. This technique is referred to as dual parity. The
additional parity set allows for protection from simultaneous two-disk failure. Since
two simultaneous disk failures are rarely encountered, RAID 6 is not commonly used. Figure 9-25.
The storage area
network (SAN) is
Network+ Network+ Note a separate, high-
Pay particular attention to RAID 0, 1, and 5. These systems are the speed network that
most commonly used and are the ones most likely to be covered on the provides a storage
Network+ Certification exam. facility for other
networks.

External Storage Systems XYZ corporation LAN

Data is often stored separately from a server. There are network devices that
serve specifically as storage containers for network data. These devices are typically
called network attached storage (NAS). There are also facilities external to the local University WAN
area network that provide data storage. These devices are typically called storage
Fibre Channel switch
area network (SAN). This section discusses both types of storage systems.

Network-Attached Storage (NAS)


Network attached storage (NAS) is a device or collection of devices that
provide storage for network data. Network attached storage units are typically
network attached composed of disk arrays or tape arrays. The file systems used on the disk array
storage (NAS) and file array do not typically match the file system used by network clients or
a device or collec- servers. The file systems are proprietary and are made to facilitate access speed
tion of devices that and data integrity.
provide storage for
This is how data on a NAS device is accessed. A client requesting data makes ABC corporation LAN
network data.
a request to the file server. The file server in turn makes a request to the NAS
device. The NAS device retrieves the data and sends it to the file server. The file
server, in turn, sends the data to the client. See Figure 9-24. Storage facility
storage area
network (SAN)
a separate, high-
Storage Area Network (SAN)
speed network that A storage area network (SAN) is a separate, high-speed network that Exact definitions of storage area network vary according to different manufacturers. Often
Tech Tip
provides a storage provides a storage facility for one or more networks. Typically, a SAN uses a the differences are blurred.
facility for one or high-speed access media such as Fibre Channel. See Figure 9-25. Fibre Channel is
more networks. discussed in the next section of the chapter.
390 Networking Fundamentals Chapter 9 Introduction to the Server 391

Fibre Channel Fibre Channel Fabric Switched Topology


a high-speed access
Fibre Channel
method that typically Fibre Channel is a high-speed access method that typically uses fiber-optic The fabric switched topology uses a device known as a fabric switch. A fabric
uses fiber-optic cable cable as network media. It may also use copper core cable and wireless. The switch is a switch designed especially for Fibre Channel networking. The fabric
as network media. term Fibre Channel also refers to a set of standards and a protocol. The Fibre switch provides a direct or switched connection between two points. When two
Channel standard provides a relatively high-data transmission rate between points wish to communicate, a private link, or channel, is set up between the two
Network Address
supercomputers, mainframes, servers, and desktops. Fibre Channel is often used devices. This method is best used when numerous nodes wish to access the same
Authority (NAA)
a naming standard for storage area network (SAN) access. There are three common Fibre Channel disk storage array. For example, a university consisting of many buildings can
that consists of topologies: point-to-point, arbitrated loop, and fabric, Figure 9-26. connect each building’s server to a common disk storage array using the fabric
the “naa.” prefix A fiber channel device uses a Network Address Authority (NAA), which is switched topology. This way, departments in each building can have access to
followed by a string a naming standard developed by the International Committee for Information research documents stored in the disk storage array. They can also access servers fabric switch
of hexadecimal in other buildings through a high-speed connection. a switch designed
Technology Standards (ICITS). The NAA address consists of the “naa.” prefix
characters. It was especially for Fibre
followed by a string of hexadecimal characters. For example, naa.02034D12B12124. Channel networking
developed by
the International Internet Small Computer Systems Interface and that provides a
Committee for Fibre Channel Point-to-Point Topology Internet Small Computer Systems Interface (iSCSI) is a network storage
direct or switched
Information A Fibre Channel point-to-point topology is simply a straight connection or connection between
standard developed by the Internet Engineering Task Force (IETF). It is used to two points.
Technology channel between two points, such as a mainframe and a server. The channel is access a wide variety of storage devices such as tapes, disks, and storage arrays.
Standards (ICITS). isolated from other channels or media, and total bandwidth is dedicated to the The iSCSI (pronounced eye-scuzzy) standard is referred to as IP-based storage
channel between the two devices. because it is designed to work on a LAN, MAN, or WAN using IPv4 and IPv6
network addresses to identify the storage device. iSCSI operates by sending SCSI
Fibre Channel Arbitrated Loop Topology commands over Ethernet using NFS or SMB/CIFS protocols. The two advantages
The Fibre Channel arbitrated loop is a common Fibre Channel topology. of iSCSI are the following:
It looks similar to the Token Ring topology. The arbitrated loop differs from ■ Storage devices can be located at great distances from the client. This Internet Small
Token Ring in that two devices in the loop set up a direct communication link, overcomes the limitations of systems such as Fibre Channel. Computer Systems
or channel, for the duration of the data transfer. In Token Ring network, a token Interface (iSCSI)
■ It is less expensive than Fibre Channel SANs. an IP-based storage
is passed around the ring while one device on the ring controls communication.
Windows 7 and Windows Server 2008 have a GUI interface called iSCSI Initiator technology that
Token Ring has a maximum control time of approximately 8 milliseconds
for configuring iSCSI. It can be accessed from the Administrative Tools menu, uses IPv4 and IPv6
in contrast to the arbitrated loop standard, which allows two devices to
Figure 9-27. network addresses
communicate until all the data requested has been transferred.
The iSCSI initiator is the workstation or server making the requests to the to identify storage
The arbitrated loop is limited to 127 connections. It is used to move large devices on a LAN,
storage device. It is called the target and can be located either on the local area
volumes of data between two devices such as a disk storage array and a server. MAN, or WAN.
network or at some distant location across the Internet.
It is not used for sporadic communication between multiple nodes as it is on a
The iSCSI properties can be configured automatically through the Network
Token Ring network.
Discovery feature or manually. Look at Figure 9-28 to see how the Network Discovery
feature can automatically locate an iSCSI device on the local area network. In this
Figure 9-26. example, the iSCSI storage device is located on a Windows Server 2008 computer
Three major topologies associated with Fibre Channel systems are point-to-point, arbitrated loop, and fabric switched. using IP address 192.168.1.103.
iSCSI devices can be located across the Internet by using an iSCSI qualified
Channel name (IQN) or an Enterprise Unique Name (EUI). The name can be automatically
generated based on information provided by the Network Discovery feature.
Figure 9-29 shows an example of an IQN address. The IQN address in the
Station1 Station2 example is iqn.1991-05.com.microsoft:richar7.netlab1domain.local. The IQN name
Point-to-point
format is <type>–<date>–<authority>–<string defined by naming authority>:
where
Type = iqn
Station1 Station2 Station1 Station2 Date = month and year domain
was acquired
Authority = domain name
String defined by naming authority = String of characters identifying
Station3 Station4 Station1 Station2
the iSCSI object
Arbitrated loop Fabric switched
392 Networking Fundamentals Chapter 9 Introduction to the Server 393

Figure 9-27. Figure 9-29.


The iSCSI Initiator, Configuration tab of
located under the the iSCSI Initiator
Administrative Tools Properties dialog
menu, is a GUI used box.
for configuring an
iSCSI system.

Figure 9-28.
Discovery tab of
the iSCSI Initiator
Properties dialog The string of characters consists of letters A–Z, numbers 0–9, and special
box. symbols dash (-), period (.), and colon (:). The string of characters typically
provides a general description, but this is not a requirement. The string of
characters can represent anything. Everything before the colon is a mandatory
standard. Everything after the colon is entirely up to the naming authority.
The IQN address in the example is first identified by “iqn”. Following this are
the date of origination of the address “1991-05,” the reverse domain name of the
authority “com.microsoft,” and the computer name and domain.
The IEEE has developed another naming format known as the Extended
Unique Identifier or the IEU-64 format. The IEU format consists of the prefix
“ieu” followed by a period and then by a string of hexadecimal numbers. For
example, ieu.0123D0123F0A. This type of address is issued by IEEE and is used
by equipment manufacturers to identify its network storage devices.

Furthering Your Study


You may be interested in further study and possible certification as a server
technician. The CompTIA organization has a certification called Server+, which
is designed to verify your competence for installing, repairing, and maintaining
servers. You can download a complete description of the exam objectives from
the CompTIA Web site.
Many of the areas in the Server+ Certification exam overlap those on the A+
Certification exam. However, even if you have scored high on the A+ Certification
exams, there are sufficient differences between the certifications that will prevent
you from passing the Server+ Certification exam without specialized study.
394 Networking Fundamentals Chapter 9 Introduction to the Server 395

For additional study materials and more detailed information about server 10. What must be done to the last device on a SCSI chain?
hardware, access the IBM and the Sun Microsystems Web sites. For detailed 11. What does the acronym LUN represent?
information on SCSI technology, access the Adaptec Web site. 12. What does the acronym ACPI represent?
13. What is the purpose of ACPI?
Summary 14. What does the acronym ACPICA represent?
15. What is the goal of ACPICA?
■ Servers play many roles in a network, such as print server, file server, database 16. Name the four system resources that may be assigned to a hardware device?
server, application server, backup server, Web server, and mail server. 17. How many IRQ settings are there in a typical computer?
■ A thin server has only the hardware and software needed to support and 18. What does the acronym RAID represent?
run a specific function, or role. 19. How is parity used to replace data lost on a damaged disk?
■ A thin client server provides applications and processing power to a thin client. 20. Which RAID level(s) provide no fault tolerance?
21. Which RAID levels provide disk mirroring?
■ The thin client relies on a thin client server’s processor and memory for
22. What is the difference between disk mirroring and duplexing?
processing data and running software applications.
23. Which RAID level provides both striping and parity?
■ Typically, entry-level servers contain 1 to 8 processors; mid-range servers 24. Your system storage is accessed many times throughout the day by many
contain 9 to 30 processors; and high-end servers contain 31 to 106 processors. users. The data is not critical. Rather, it is a collection of application software.
■ Servers typically incorporate hot-swap technology to allow components to be A tape backup system is used to restore data from a system failure. Which
removed or installed while the system is running. RAID level would most likely be appropriate and why?
■ System resources associated with hardware are Direct Memory Access (DMA), 25. Which RAID level is denoted by the use of two hard disk drives each
interrupt request (IRQ), I/O port address, and memory address assignment. containing identical data?
■ When two hardware devices share the same resource assignment, a system 26. What does the acronym NAS represent?
conflict occurs. 27. What does the acronym SAN represent?
28. What is the difference between NAS and SAN?
■ The most common RAID levels are RAID 0, RAID 1, and RAID 5. 29. What type of media is used for Fibre Channel?
■ RAID 0 is known as striping. Striping increases data read/write speed but 30. What are the three common Fibre Channel topologies?
does not provide fault tolerance. 31. What does the acronym iSCSI represent?
■ RAID 1 is mirroring or duplexing two hard disk drives. 32. What are the two main advantages to iSCSI storage?
■ RAID 5 is known as striping with parity, which combines data read/write 33. What two protocols are used to send SCSI commands across the network?
speed with fault tolerance. 34. What does the acronym NAA represent?
35. What two naming formats are used to identify iSCSI targets?
■ Network Attached Storage (NAS) is a device or collection of devices used to
36. What naming format is used to identify Fibre Channel storage devices?
provide storage for a local area network. The NAS shares the bandwidth of
37. Identify the following address type: iqn.2008-06.com.
the local network.
rmroberts:myiSCSIstorage.
■ Storage Area Network (SAN) is a separate network dedicated to data storage.
It does not affect the bandwidth of the other connected networks.
■ The iSCSI standard is an IP-based storage technology that uses IPv4 and IPv6
network addresses to identify storage devices on a LAN, MAN, or WAN. Sample Network+ Exam Questions Network+
Answer the following questions on a separate sheet of paper. Please do not write in this book.
Review Questions 1. Which RAID level provides the fastest reading and writing data transfer time?
A. RAID 0
Answer the following questions on a separate sheet of paper. Please do not write in this book. B. RAID 1
1. What are some typical services that servers provide? C. RAID 5
2. What is a thin server and what applications can it be used for? D. RAID 0 and RAID 1
3. What is a thin client server and what applications can it be used for? 2. Which network RAID level provides a duplicate copy of one hard disk
4. What does the term hot-swap mean? drive on another hard disk drive?
5. What type of motherboard is commonly used for servers? A. RAID 0
6. Which server component is responsible for the POST? B. RAID 1
7. How many devices can be connected to a Fast/Wide SCSI-2 chain? C. RAID 5
8. What is the bus width of Fast SCSI-2? D. RAID 4
9. What is the bus width of Fast/Wide SCSI-2?
396 Networking Fundamentals Chapter 9 Introduction to the Server 397

3. How does SAN differ from NAS?


Suggested Laboratory Activities
Network+
A. SAN provides access to a SCSI disk exclusively, while NAS provides Do not attempt any suggested laboratory activities without your instructor’s permission.
access to SCSI, ATA, and EIDE drives. Certain activities can render the PC operating system inoperable.
B. SAN offers encryption; NAS does not. 1. Create several partitions on a hard disk drive and then format the partitions
C. SAN does not increase local network traffic; NAS does. using FAT32.
D. SAN is connected to the local network system, while NAS is accessed 2. Convert a basic FAT32 partition to an NTFS partition and then convert the
remotely via a WAN link. NTFS partition to dynamic disk.
4. What is the minimum number of drives required for implementing a RAID 3. Use the diskpart command to view the contents of a hard disk drive.
5 installation? Familiarize yourself with the DiskPart command line options.
A. 1 4. Install a RAID 0, RAID 1, and RAID 5 system. Remove a hard disk drive to
B. 2 simulate a disk failure and then replace the hard disk drive with a new hard
C. 3 disk drive and rebuild the missing data.
D. 4 5. Explore the iSCSI Initiator administrative tool in Windows 7.
5. What does the term fault tolerance mean?
A. The ability to find faults in data before it is backed up.
B. The ability of the network administrator to tolerate system policy Interesting Web Sites for More Information
breeches by users. http://computer.howstuffworks.com/scsi.htm
C. The ability to recover from a system failure. http://msdn.microsoft.com/en-us/library/ee681827(VS.85).aspx
D. The ability to continue normal operation despite a system failure. http://serverwatch.internet.com
6. Which of the following describes the ability to change a module such as www.acnc.com/raid.html
hard disk drive or power supply on a server without the need to shut www.faqs.org/rfcs/rfc3720.html
down the server? www.molex.com
A. System substitution www.pcguide.com/topic.html
B. On the fly changes www.starwindsoftware.com/white-papers
C. Hot-swap
D. Infinite run ability
7. What is the function of disk striping?
A. Reduces the total amount of time it takes to store large amounts of data.
B. Stores duplicate data across two or more drives.
C. Ensures data integrity.
D. Aids in disaster recovery.
8. How does a client access files on a NAS device?
A. Through NAS client software.
B. Through a server that is attached to the NAS device.
C. Directly through Category 5e cable.
D. Directly through high-speed, fiber-optic cable.
9. An investment broker is installing a network system for his employees and
to provide customer access. Money transactions will occur on a continuous
basis. Which RAID level would you recommend for this business?
A. RAID 0
B. RAID 1
C. RAID 1 (with duplexed drives)
D. RAID 5
10. Multiple CPUs in a server can perform which of the following?
A. Unilateral processing
B. Multiplexed processing
C. Synchronous processing
D. Parallel processing
398 Networking Fundamentals Chapter 9 Introduction to the Server 399

An enterprise business typically depends on hundreds of servers to meet user demands. Chapter 9
Laboratory Activity

Using the DiskPart Command


Interpreter
After completing this laboratory activity, you will be able to:
■ Use the DiskPart command interpreter.
■ Use common DiskPart commands to retrieve information about the number
of disks installed in a system and about disk partitions or volumes.
■ Use DiskPart help command to reveal a list of DiskPart commands.

Introduction
Disk management is usually performed in the Disk Management utility. The
DiskPart command interpreter is an alternative way to manage disks and partitions.
At times, the DiskPart command interpreter may be the only alternative for
inspecting and manipulating the master boot record (MBR) and partition table
should the GUI fail. Also, certain tasks can be performed using the DiskPart
command interpreter that cannot be performed using the Disk Management utility.
For example, you must use the DiskPart command interpreter to convert a dynamic
disk to a basic disk and to delete or replace the MBR in the active partition. The Disk
Management utility does not allow the performance of these tasks because it is
designed to protect the integrity of the disk structure from accidental deletion.
You can think of the DiskPart command interpreter as an updated version of the
fdisk command. Windows XP no longer supports the fdisk command. The DiskPart
utility is used in place of fdisk to inspect, create, and delete partitions or volumes
on a disk drive.
The DiskPart command interpreter will not make changes to removable
media such as a USB drive and an IEEE-1394 drive. These types of media are
identified as a “super floppy” by the DiskPart utility rather than as a hard disk
drive.
In this laboratory activity, you will perform some basic DiskPart operations
to become familiar with this utility. While you most likely will never need to
use the full capability of this utility, more information can be obtained at the
Microsoft Tech Support Web site.
Look at the following screen capture. Notice that the detail disk command
has been entered at the DiskPart command line. The detail disk command
reveals details about the selected disk, such as the hard disk drive manufacturer
and type. It also shows that the hard disk drive has two partitions or volumes.
Volume 1 is assigned letter C and volume 2 is assigned letter D. Notice that both
volumes are indicated as healthy.
400 Networking Fundamentals Chapter 9 Introduction to the Server 401

Equipment and Materials


■ Computer with Windows XP, Windows Vista, or Windows 7 installed. (A
server is not required for this laboratory activity.)

Procedure
1. ______ Report to your assigned workstation.
2. ______ Boot the computer and verify it is in working order.
3. ______ Open the command prompt (Start | All Programs | Accessories |
Command Prompt, or Start | Run and enter cmd in the Run dialog box).
The list command can be used with the disk, volume, and partition object.
When using the DiskPart command interpreter, disks, partitions, and volumes 4. ______ At the command line, type and enter the DiskPart command. If
are referred to as objects. Look at the following screen capture. It shows the list successful, the prompt will display > DISKPART to let you know that
disk, list partition, and list volume commands. The list disk command lists the you are now using the DiskPart command interpreter.
disk(s) installed starting with disk 0. The list volume command lists the volumes
5. ______ Enter the Help or /? command to reveal a list of commands.
contained in the system. The list partition command lists the partitions located on
a selected disk. Notice how the DVD-ROM drive is identified after issuing the list 6. ______ Enter the list command to display the objects that can be specified
volume command. Also, notice how the removable drive is identified even though with the list command. Disk, partition, and volume are listed.
it is no longer present.
7. ______ Try each of the following commands to reveal information about the
disk drive(s): list disk, list partition, list volume. Remember, the list
partition command requires focus. You must use the select command
to select the disk drive you wish to list partition information about.
For example, you would enter select disk 0 to set the focus on the
first disk in the system. The select command is only required for the
list partition command. After running each command, record on a
separate sheet of paper the information revealed.
8. ______ The detail command reveals similar content but with more detailed
information about an object. Enter each of the following commands
and then record on a separate sheet of paper the information
revealed: detail disk, detail volume, detail partition.
9. ______ Practice using the commands covered thus far until you are very
familiar with them. They are difficult to learn at first because some
involve setting focus and using two words for a valid command.
10. ______ Use the help command to reveal what the following commands
Before issuing the list partition command, you must select the disk you are used for. Do not attempt to use any of the following commands
wish to view. For example, to view the partition information for a single hard without explicit permission from the instructor.
disk drive, you would issue the select disk command. Then you would issue the
list partition command. Otherwise, you will generate an error message stating,
“There is no disk selected to list partitions.”
Selecting the disk is also known as setting focus. When you set focus, you
focus the list partition command on a selected disk. You must also set the focus
on the partition you wish to list. If you do not, the default partition you are
presently running the DiskPart command interpreter from is automatically
selected.
For more information on the DiskPart command interpreter, read the
following Microsoft Support article: 300415—A Description of the DiskPart
Command Line Utility.
402 Networking Fundamentals

Command Purpose
add

active

assign

break

clean

create

delete

detail

exit

extend

help

import

inactive

list

online

rem

remove

repair

rescan

retain

select

11. ______ Enter the exit command to return to the command prompt and then
again to return to the Windows desktop. Leave your computer in the
condition as specified by your instructor.
12. ______ Answer the review questions.

Review Questions
Answer the following questions on a separate sheet of paper. Please do not write in this book.
1. What are objects when using the DiskPart command interpreter?
2. What command is used to reveal information about a particular partition?
3. Which command is used to set focus on a particular drive?
4. What does the command prompt look like when you are running the
DiskPart command interpreter?
5. How can you see a list of the various DiskPart commands?
6. A particular computer has only one hard disk drive. What command is used
to set focus on that one hard disk drive?
7. What command will stop the DiskPart command interpreter and return you
to the default prompt?

You might also like