Server2
Server2
9 Introduction
to the Server
■
■
■
■
■
■
■
■
■
After studying this chapter, you will be able to:
❑ Recall the various roles of servers in a network environment.
❑ Give examples of uses for a thin server.
❑ Give examples of uses for a thin client server.
❑ Differentiate between a server and a PC.
❑ Identify the ID and LUN numbers of a Small Computer Systems Interface
(SCSI) device.
❑ Identify the four types of system resources.
❑ Compare RAID systems.
❑ Recall the characteristics and purpose of network attached storage (NAS)
technology.
❑ Recall the characteristics and purpose of storage area network (SAN)
technology.
❑ Give examples of common Fibre Channel technology applications.
❑ Identify the Fibre Channel topologies.
❑ Interpret an iSCSI IQN address.
369
370 Networking Fundamentals Chapter 9 Introduction to the Server 371
It relies on the server’s processor and memory for processing data and running Do not open a CRT (monitor) while wearing an antistatic wrist strap, even if the CRT is Caution
software applications. Thin clients are becoming common in industry for such unplugged. CRT screens can hold a high voltage charge for long periods of time after they
applications as hotel bookings, airline ticketing, and medical record access. have been disconnected from electrical power.
When budgets are tight, you can install what is normally considered an
obsolete PC on a thin client network. The obsolete PC is obsolete because of its
processing speed, lack of storage, and inability to run new software. The thin The major components of a server are similar to a typical PC. In fact, you
client server can provide all the services that are required by the obsolete PC, can use a typical PC as a server for a small network. A network server can
thus making the obsolete PC a useful workstation. be as simple as a typical PC or as complex as a piece of equipment designed
Do not confuse a thin client with a dumb terminal. A dumb terminal sends exclusively for networks. Some server models with multiple CPUs, large amounts
user input to a mainframe. Dumb terminals have absolutely no computing of RAM, and vast amounts of storage space can be thought of as a “small”
power, operating system, hard disk drive, BIOS, and RAM. A thin client may not mainframe rather than as a PC. There are many server designs available. As part
need a hard disk drive or an operating system; however, it is still a full-fledged of your study of network servers, it is highly advisable to check the IBM, Sun
computer because it has a CPU and processing power. Microsystems, HP, and Dell Web sites to see the available designs. This section
Windows 2000 Server, Windows Server 2003, and Windows Server 2008 come looks at the following components: case, hot-swap components, power supply,
with Terminal Services software. Once Terminal Services is set up on the server, motherboard, BIOS, and CPU.
you have the option to generate a disk that will assist you in automatically setting
up thin client workstations.
Case
Server case styles vary greatly. Some are similar to desktop models. Some are
designed to be mounted into a rack like the server in Figure 9-2.
Server Classification by Number of CPUs Large enterprise servers are actually a group of individual servers mounted
Servers vary a great deal by size and power. The number of processors in a rack system or cabinet, Figure 9-3. The group of servers acts as one unit that
they contain usually classifies them. For example, Sun Microsystems has three has multiple CPUs and a large amount of system resources, such as hard disk
classifications of servers: entry-level, midrange, and high-end. Sun Microsystems drive storage and RAM.
defines these classifications by the number of processors they contain. A Sun A blade server derives its name from its size and shape. It is extremely thin blade server
Microsystems entry-level server has up to 8 processors. A midrange server has up compared to other servers and fits into a rack, Figure 9-4. Blade servers are a powerful server
to 30 processors, and a high-end server has up to 106 processors. Other vendor’s especially designed to allow a large number of servers to be mounted in a small that is extremely
definitions vary somewhat, but this gives you a general idea. In this chapter, we space. Blade servers are not to be confused with thin servers. A blade server can thin. It is designed
focus on the HP ProLiant DL740 server. The HP ProLiant DL740 is one of the most contain more than one processor and be quite powerful. They are often selected to be mounted in
powerful entry-level servers manufactured. a small space with
for applications where there is a requirement for many servers to perform the
other blade servers.
same or similar function. For example, they may be used in a large Web service
Major Server Components facility or a file server farm.
It is assumed you have some PC hardware background from completing a
course on PC service and repair or have a CompTIA A+ Certification. If not, it is
Hot-Swap Components
Servers are generally designed to provide continuous service with minimal
strongly advised that you take a course in PC repair or, at the very least, complete
interruptions and data loss. The main feature that most servers use to provide
a home study program. A good background in PC hardware proves to be
this continuous service is hot-swap technology. Hot-swap technology allows a hot-swap
beneficial to anyone working with network servers. As a matter of fact, IBM and
component to be removed or installed while the system is running. There is no technology
other companies require the CompTIA A+ Certification as part of its progression a technology that
need to power down the system while replacing or adding major components.
toward certification as a server technician. allows a component
Some common hot-swap components are hard disk drives, memory modules
When handling electronic components, it is standard practice to use to be removed or
(RAM), CPUs, and power supplies.
electrostatic discharge (ESD) safety practices. Electronic components based on installed while the
Never assume a component is hot-swappable. Always check the system
complimentary metal oxide semiconductor (CMOS) technology can be easily system is running.
manual before removing any component while the system is powered on.
damaged by static electricity. The human body and clothing can build up a
tremendous static electricity charge. When touching a static-sensitive electronic
component, the static electricity can discharge and cause the component to be
Figure 9-2.
destroyed. To avoid damaging electronic components, use an antistatic wrist
The ProLiant DL740
strap, which is designed to drain static charges safely. can be mounted into
a rack. (Hewlett-
Caution Packard Company)
Do not use an antistatic wrist strap when servicing any component with live voltage present.
374 Networking Fundamentals Chapter 9 Introduction to the Server 375
Power Supply
The power supply converts standard 120-volt or 240-volt AC power into lower
DC voltage levels that can be used by the motherboard and other devices inside
the computer case. A typical power supply provides an assortment of output plugs.
The plug style matches the intended piece of equipment. For example, a standard
ATA drive uses a Molex plug, which supplies 5 volts DC and 12 volts DC to the
ATA drive. An ATX-style motherboard plug supplies 3.3 volts, 5 volts, and 12 volts
as well as a ground connection to the motherboard. It is also designed to plug into
the motherboard correctly. Older style connections could be incorrectly plugged
into the motherboard if you did not pay attention to the color-coding.
Entry-level servers are typically equipped with two power supplies,
Figure 9-5. The two power supplies balance the load. If one power supply fails,
Figure 9-4. the other power supply carries the full load. Some servers are designed with
A blade server is “hot-swappable” power supplies, which permit the defective power supply to be
thin, yet powerful. It changed while the server is running.
is designed to allow To prevent the loss of data, most server manufacturers recommend disconnecting
many blade servers the server from the network while replacing hot-swappable power supplies. backplane
to be installed in a a simple mother-
small area. A—A Motherboard board designed with
single blade server. Servers generally use a backplane. A backplane is a simple motherboard minimal compo-
B—Many blade designed with minimal components. It typically serves as the interface of all nents. It typically
servers installed in a the major components. It is designed to allow major components to be added or serves as the inter-
single rack. (Hewlett- removed without powering down the system. Removing components without face of all the major
Packard Company) shutting down the system is call hot swapping. components.
Figure 9-6 shows the general backplane layout of the HP ProLiant DL740 server hot swapping
with and without the added modules. An I/O board attaches to the backplane. It the process of
contains six PCI hot-swappable slots. The processor boards each contain 4 CPUs, for removing compo-
a total of 8 CPUs. Each memory module in the system is hot-swappable and contains nents without
A B 8 DIMMS. The HP ProLiant DL740 can contain up to 40 GB of RAM. The multiple shutting down the
CPUs and vast amount of RAM are required to provide the many different services to system.
376 Networking Fundamentals Chapter 9 Introduction to the Server 377
Small Computer
Figure 9-6. Small Computer Systems Interface (SCSI) Systems Interface
The backplane layout of the ProLiant DL740.
Small Computer Systems Interface (SCSI), pronounced skuzzy, is a (SCSI)
Fan 1 computer bus technology that allows you to connect multiple devices to a a computer bus tech-
Memory Fan
connector 1 single controller. The benefits of SCSI technology can be readily observed in nology that allows
module 1 Memory
Fan 2 connector module the chart in Figure 9-7. SCSI technology not only allows multiple devices to you to connect
connector Fan 1 connect to a single controller, it also supports high-data transfer rates. This is multiple devices to a
2 single controller.
Memory quite a performance improvement when compared to the traditional IDE or ATA
module 2 Memory
connector module attachment. SCSI is ideal for servers that must hold large amounts of data that is
2
Processor Processor accessed by numerous clients.
board board
Memory
1 2
Memory Most SCSI drives are hot-swap devices. Often, SCSI drives are arranged in
module 3 module
connector 3
the server with hot-swap bays open to the outside of the case to provide easy
access. This allows you to connect or disconnect a drive without opening the
Processor Processor Memory
I/O board board 1 board 2 Memory
module
server case. See Figure 9-8.
connector connector connector module 4
connector 4 SCSI technology has evolved over the years. With this evolution, new names
I/O board with
6 PCI hot plug have emerged to describe the improved technology. The term Wide is used to
Memory Memory
module 5
slots indicate 16-bit data transfers in place of 8-bit data transfers. To reflect the increase
module
connector 5 in frequency, the term Fast was used and then the term Ultra. Combination of
the words, such as Ultra/Wide, are also used to express the newer technologies.
Backplane Backplane with modules and I/O board Ultra/Wide means the SCSI device is faster and supports 16-bit transfers. A close
numerous network clients with minimal delay. The CPUs need not be the latest, high- Figure 9-7.
Common Name Class Devices Bus Width Speed MBps
speed processors available because there are numerous processors in the server. SCSI technology
in bits specifications.
BIOS SCSI-1 SCSI-1 8 8 5 MHz 4-5 MBps
The BIOS contains a small software program that starts the server boot Wide SCSI SCSI-2 16 8 5 MHz 10 MBps
operation when power is applied to the server. The combination BIOS chip and Fast SCSI SCSI-2 8 8 10 MHz 10 MBps
firmware the software program are usually referred to as firmware. The BIOS is responsible Fast/Wide SCSI SCSI-2 16 16 10 MHz 20 MBps
the combination of for the power-on self-test (POST), which is performed at startup. The POST Ultra SCSI SCSI-3 8 8 20 MHz 20 MBps
BIOS chip and the does a quick, initial check of the major components, such as memory, disk drives, Ultra/Wide SCSI-3 8 16 20 MHz 20 MBps
software program keyboard, mouse, and monitor, to be sure that a minimum working system is
within the chip. Ultra2 SCSI-3 8 8 40 MHz 40 MBps
available. After a general check is made of the major hardware components, the Ultra2/Wide SCSI SCSI-3 16 16 40 MHz 80 MBps
power-on self-test BIOS turns control over to the operating system software. The operating system
Ultra3 SCSI SCSI-3 16 16 40 MHz 160 MBps
(POST) completes the boot process by loading more advanced hardware drivers than the
a BIOS routine that Ultra Wide 320 SCSI-3 16 16 80 MHz 320 MBps
BIOS did. It also performs a more sophisticated check of hardware and software
performs a series Ultra Wide 640 SCSI-3 16 16 160 MHz 640 MBps
systems. If all the software and hardware components appear to be in working
of hardware checks order, the final screen, which serves as a user interface, appears.
to determine if
the computer is in Central Processing Unit (CPU) Figure 9-8.
minimal working One major difference between a server and a typical PC is that many Hot-swap drives are
order.
servers have multiple CPUs installed rather than just one. When multiple CPUs typically accessible
parallel processing are installed, the server can perform parallel processing. This means that a from the front of
processing a program can be processed through more than one CPU simultaneously. Another the server for easy
program through advantage of multiple CPUs is several clients may be serviced at the same time access. (Hewlett-
more than one CPU rather than waiting their turn to access a single CPU. Supercomputers and Packard Company)
simultaneously. enterprise servers may contain over 1,000 CPUs.
A small office server can get by with one processor, especially if demand on
the server is low. A large enterprise system requires multiple processors to meet
the demands of the server’s clients. Some processor modules are hot-swappable. Hot-swap
When a single CPU fails, it can easily be removed and replaced while the server SCSI drive
is running and providing services to clients.
378 Networking Fundamentals Chapter 9 Introduction to the Server 379
study of the table in Figure 9-7 will help you understand the evolution of the SCSI electrical connection is made. The pairs of pins represent the binary number
technology. To learn more about SCSI technology, visit the Adaptec Web page at system. The jumpers are applied in a binary pattern that represents the SCSI ID
www.adaptec.com. There you will find in-depth knowledge about SCSI systems number. Figure 9-10 illustrates each of the binary patterns and the related SCSI
and other technologies. ID number.
A SCSI hardware system consists of a host adapter or controller card, a
flat ribbon cable to connect SCSI devices, and SCSI devices such as disk drives, Logical unit number (LUN)
CD-ROMs, and tape drives. SCSI cables come in a variety to match the many SCSI devices are not limited to internal devices. The SCSI chain can extend
different classifications of SCSI. The cables come as DB-25, 50-pin, 68-pin, and outside the case by adding an extender card to the SCSI chain. The extender card
80-pin styles. allows more devices to be attached to existing SCSI systems. The extender card
Look at Figure 9-9 to see the way a typical SCSI host adapter, cable, and is an integrated circuit card connected to the SCSI chain as a SCSI device. See
devices might appear. The host adapter and devices can connect to any part of Figure 9-11.
the chain. The chain of SCSI devices must be terminated. Termination is typically When additional devices are attached, they are identified separately from the logical unit number
completed at the last device with a termination block. original chain of devices. Each additional device connected to the SCSI extender (LUN)
is identified with a logical unit number (LUN). SCSI bus extenders are also a numbering scheme
SCSI ID numbers referred to as SCSI expanders, repeaters, and regenerators. to identify SCSI
devices attached to
Each device, including the host adapter card, must have a unique ID number. External SCSI device chains are commonly used in RAID systems. RAID
an extender card.
The numbers start at zero and end at seven for an eight-device SCSI chain and systems are covered later in this chapter.
end at fifteen for a sixteen-device SCSI chain. The host adapter typically is
assigned the highest number.
SCSI ID numbers are assigned through pins and jumpers on the SCSI drive.
Serial Attached SCSI
The pins are arranged in pairs. When a jumper is applied across the pins, an Serial attached SCSI (SAS) is the next generation of SCSI. It uses a serial Serial attached SCSI
port similar to the SATA serial drive port, Figure 9-12. This eliminates the need (SAS)
of the wide SCSI cable and produces faster data transfer rates. First generation SCSI technology
Figure 9-9. SAS devices can achieve data rates as high as 3 Gbps. Second generation SAS that transfers data in
The last SCSI
Typical SCSI drive serial fashion.
drive in the chain devices can achieve rates of 6 Gbps. Note that these speeds are expressed in bits
arrangement. is terminated per second (bps), not bytes per second (Bps). This is because SAS transfers data
in a serial fashion. The SAS design allows 128 devices to be attached directly.
SCSI drive
Figure 9-10.
ID 6
Connection Jumper
SCSI binary patterns.
SCSI drives pins
ID 3–ID 5
SCSI drive =0 =4
ID 2
SCSI drive
ID 1
=1 =5
SCSI drive
ID 0
Host adapter =2 =6
ID 7
PCI slot =3 =7
380 Networking Fundamentals Chapter 9 Introduction to the Server 381
ACPI Component Architecture (ACPICA) is an extension to the original ACPI ACPI Component
standard. The goal of ACPICA is to create a non-proprietary software package Architecture
Figure 9-12. for configuring hardware. An ACPICA-compliant device is operating system (ACPICA)
SAS and SATA disk an extension to the
independent. ACPICA is written in the C language and is an open standard
drive connectors. original ACPI stan-
allowing any computer software or hardware manufacturer to share power-saving
Notice the two dard that provides
connector types are features rather than developing proprietary power-saving features. ACPICA is
a non-proprietary
similar. compatible with both 32-bit and 64-bit systems. software package
SAS Some of the companies that participate with the goals of ACPICA are for hardware
Microsoft, HP, Intel, and several Linux organizations. To learn more about configuration.
ACPICA, check out the ACPICA Web site (www.acpica.org).
System Resources
System resources refer to resources such as interrupt requests, Direct Memory
Access channels, Input/Output ports, and memory. System resources are assigned
SATA to components installed in the computer system such as hard disk drives, keyboards,
and mice. In a Windows-based server, you can view system resource assignments
in Device Manager.
Through the use of edge expander devices, a maximum of 16,000 SAS devices can Not all devices have all four types of resources assigned to them. For example,
be connected. some devices do not require a DMA channel assignment. System resources
typically cannot be shared between two devices. Sharing the same system resource
causes a system resource conflict, referred to simply as a conflict. Conflicts must
ACPI and ACPICA be resolved before the system can operate properly. An exception to this rule is
Automatic Automatic Configuration and Power Interface (ACPI) is a standard motherboard chips used to bridge different bus systems. A motherboard chip can
Configuration and for controlling the power options for computer hardware devices. The first share an IRQ with a hardware device.
Power Interface implementation of the ACPI standard gave users the ability to select how they
(ACPI) wanted their computer to behave to conserve power. For example, the user could Interrupt Request (IRQ)
a standard for configure the computer or individual computer devices to go into a state of An interrupt request (IRQ) is a circuit that communicates with the CPU. interrupt request
controlling the power
hibernation after a period of inactivity. Hardware devices send an electrical signal to the CPU using an assigned IRQ circuit. (IRQ)
options for computer
Figure 9-13 shows the power options available for a wireless network There are 16 IRQ assignments numbered from 0 to 15, Figure 9-14. Many of the a circuit that commu-
hardware devices.
adapter. These options allow the computer to turn off the adapter to save power assignments cannot be changed, but some can. When Plug and Play devices are used, nicates with the CPU.
and allow the adapter to wake the computer when network activity occurs. the IRQ is automatically assigned. Typically, each hardware device must use a separate
382 Networking Fundamentals Chapter 9 Introduction to the Server 383
IRQ to communicate with the CPU. If two hardware devices are assigned the
same IRQ, an IRQ conflict occurs. Once the first device contacts the CPU using the
IRQ assignment, the other device cannot communicate with the CPU. An IRQ conflict
can lead to problems such as an inoperable device, a system crash, and a system
lockup. An IRQ can typically be assigned manually by first entering the BIOS setup
program and disabling Plug and Play detection. Changes to the IRQ can then be Figure 9-16.
IDE Channel
made through Device Manager. After the problem device has been assigned the
Properties dialog box
proper IRQ, the Plug and Play detection can be activated without a problem.
Advanced Settings
You may notice IRQ numbers higher than 16 in Device Manager. These numbers tab. The IDE channel
are virtual IRQ settings, rather than hardware-based IRQs. They work the same as the is assigned to a DMA
hardware-based interrupts, but they are not limited by physical properties. Virtual channel by enabling
IRQ assignments are configured automatically by the operating system. DMA.
Tech Tip Yellow question marks next to devices in Device Manager indicate there is a problem with
the device or assignment.
this data until the CPU is free. Figure 9-17 shows the I/O port assignments Another RAID technique is error correction, which can use traditional fault tolerance
associated with a system’s hardware devices. error-checking code (ECC) or parity. ECC is obsolete as a method for RAID as applied to RAID
because most hard disk drive systems use ECC as a standard way to protect data. systems, it is the
ability to recover
Memory Address Assignment Incorporating ECC into a RAID system would be redundant.
from a hard disk or
memory address A memory address assignment is a large block of memory assigned to a Parity is a technique that allows data to be recovered if one of the hard disk
hard disk controller
assignment device and is used to transfer data between two locations. A device is assigned a drives fails in a multiple disk drive system. A minimum of three hard disk drives
failure without the
a large block of range of memory addresses. Some devices such as video and sound cards require must be used for this technique. If three hard disk drives are used, one hard loss of stored data. As
memory assigned a great deal of memory. The blocks of RAM assigned to a device cannot be used disk drive is used to store parity and the other two are used to store data. Data applied to a network
to a device. It is
by any other device. Figure 9-18 shows the memory assignments associated with is spread evenly between the two data storage drives, and the parity code for the infrastructure, it is
used to transfer sum of the two data storage drives is stored on the parity drive. the ability to continue
a system’s hardware devices.
data between two Parity is also a binary code that represents the total data pattern shared operation during a
locations. between the data storage drives. If any data storage drive fails, the system can use system hardware or
RAID Systems the parity bit to rebuild the missing data. software error.
Redundant Array of Redundant Array of Independent Disks (RAID) is a system of disks RAID systems are referred to as RAID levels. There are many RAID levels, disk striping
Independent Disks arranged for speed or fault tolerance, or both. Fault tolerance as applied to RAID each incorporating a different technique to increase speed or to provide data a storage technique
(RAID) systems means the ability to recover from a hard disk or hard disk controller redundancy, or both. that divides the data
a system of disks failure without the loss of stored data. Fault tolerance as applied to a network Things to consider when selecting a RAID level are cost, reliability, and into sections and
arranged for speed infrastructure means the ability to continue operation during a system hardware speed. There is no single, best RAID level. The appropriate level depends on the writes the data across
or fault tolerance, or value of the data being protected and the amount of budget available. If a bank several hard disk
or software error. To achieve a high-data transfer rate, a technique known as disk
both. were protecting financial data, cost would most likely be of little concern. A drives at the same
striping is used. Disk striping involves dividing the data into separate sections time.
and writing the data across several hard disk drives at the same time. This RAID 0/5 with a tape backup would be quite appropriate. If you were protecting
reduces the total amount of time it takes to store large amounts of data. a personal computer, you would not likely need a RAID system. error correction
Repairing a failed RAID system means the drive must be physically replaced a RAID technique
and then the data reconstructed. In a Microsoft Windows operating system, the that uses traditional
Tech Tip Another accepted representation of the RAID acronym is Redundant Array of Inexpensive Disk Management utility is used to reconstruct data. If using proprietary SCSI error-checking code
drives, data is reconstructed by the data array manufacturer software package. (ECC) or parity.
Disks.
386 Networking Fundamentals Chapter 9 Introduction to the Server 387
110100
110100
must be dynamic disk. Same data mirroring, provides
a copy of data on two
disk drives.
See Figure 9-19 for a list of RAID levels and a short description of each. The
following section looks at each RAID level in detail.
RAID 0
RAID 0 uses disk striping across a group of independent hard disk drives, RAID 2
Figure 9-20. This technique increases data flow but provides no fault tolerance. If
RAID 2 uses common ECC error-correction code to provide fault tolerance.
one hard disk drive fails, all data is lost and cannot be reconstructed. This RAID
All drives provide some sort of ECC, so this form of RAID is basically obsolete.
level is most useful when speed is important, not fault tolerance.
RAID 1 RAID 3
RAID 3 stripes data across multiple drives and stores parity on a separate
disk mirroring RAID 1 uses the technique of disk mirroring. Disk mirroring is the act of
drive. Data striping is performed at the byte level. See Figure 9-22.
the act of writing the writing the same information to two hard disk drives at the same time, Figure 9-21.
same information to Each of the two hard disk drives contains the same data. If one hard disk drive
two hard disk drives fails, a copy exists on the other hard disk drive. RAID 4
at the same time. Another form of RAID 1 is duplexing. Duplexing is the technique of placing RAID 4 stripes data across several drives and stores parity on a separate
duplexing each mirrored hard drive on a separate hard disk drive controller. Duplexing drive. The main difference between RAID 3 and RAID 4 is RAID 4 stores data in
the technique adds another level of fault tolerance. If one hard disk drive controller fails, the blocks. The size of the block can vary.
of placing each other is still operable. Mirroring contains the risk of the hard disk drive controller
mirrored hard drive failing and causing both hard disk drives to fail. RAID 1 provides data protection RAID 5
on a separate hard at the cost of speed when compared to RAID 0. When there is a small demand for RAID 5 is also called block striping with distributed parity. RAID 5 distributes
disk drive controller. disk read/writes, RAID 1 is an appropriate technique. parity across all drives rather than writing parity to one drive. It provides fault
tolerance and some increase in read-write data transfer. See Figure 9-23.
Figure 9-19.
RAID Level Description
RAID levels. Figure 9-22.
RAID 0 Striping. 110100100101010101010101001010010101010
RAID 3 writes across
RAID 1 Mirroring or duplexing.
1110100
0001100
1111000
multiple drives with
RAID 2 Error checking code (ECC). parity stored on a
RAID 3 Byte-level striping with parity. separate drive.
RAID 4 Block-level striping with parity.
RAID 5 Block-level striping with distributed parity.
RAID 6 Dual parity.
Data Data Parity
RAID 0/1 or 10 Disk mirroring with striping.
RAID 0/5 or 50 Block striping with parity and striping.
1110100
0001100
1111000
110100100101010101010101001010010101010 both disk striping
RAID 0 divides and parity. Parity
110100
100101
010101
Data is often stored separately from a server. There are network devices that
serve specifically as storage containers for network data. These devices are typically
called network attached storage (NAS). There are also facilities external to the local University WAN
area network that provide data storage. These devices are typically called storage
Fibre Channel switch
area network (SAN). This section discusses both types of storage systems.
Figure 9-28.
Discovery tab of
the iSCSI Initiator
Properties dialog The string of characters consists of letters A–Z, numbers 0–9, and special
box. symbols dash (-), period (.), and colon (:). The string of characters typically
provides a general description, but this is not a requirement. The string of
characters can represent anything. Everything before the colon is a mandatory
standard. Everything after the colon is entirely up to the naming authority.
The IQN address in the example is first identified by “iqn”. Following this are
the date of origination of the address “1991-05,” the reverse domain name of the
authority “com.microsoft,” and the computer name and domain.
The IEEE has developed another naming format known as the Extended
Unique Identifier or the IEU-64 format. The IEU format consists of the prefix
“ieu” followed by a period and then by a string of hexadecimal numbers. For
example, ieu.0123D0123F0A. This type of address is issued by IEEE and is used
by equipment manufacturers to identify its network storage devices.
For additional study materials and more detailed information about server 10. What must be done to the last device on a SCSI chain?
hardware, access the IBM and the Sun Microsystems Web sites. For detailed 11. What does the acronym LUN represent?
information on SCSI technology, access the Adaptec Web site. 12. What does the acronym ACPI represent?
13. What is the purpose of ACPI?
Summary 14. What does the acronym ACPICA represent?
15. What is the goal of ACPICA?
■ Servers play many roles in a network, such as print server, file server, database 16. Name the four system resources that may be assigned to a hardware device?
server, application server, backup server, Web server, and mail server. 17. How many IRQ settings are there in a typical computer?
■ A thin server has only the hardware and software needed to support and 18. What does the acronym RAID represent?
run a specific function, or role. 19. How is parity used to replace data lost on a damaged disk?
■ A thin client server provides applications and processing power to a thin client. 20. Which RAID level(s) provide no fault tolerance?
21. Which RAID levels provide disk mirroring?
■ The thin client relies on a thin client server’s processor and memory for
22. What is the difference between disk mirroring and duplexing?
processing data and running software applications.
23. Which RAID level provides both striping and parity?
■ Typically, entry-level servers contain 1 to 8 processors; mid-range servers 24. Your system storage is accessed many times throughout the day by many
contain 9 to 30 processors; and high-end servers contain 31 to 106 processors. users. The data is not critical. Rather, it is a collection of application software.
■ Servers typically incorporate hot-swap technology to allow components to be A tape backup system is used to restore data from a system failure. Which
removed or installed while the system is running. RAID level would most likely be appropriate and why?
■ System resources associated with hardware are Direct Memory Access (DMA), 25. Which RAID level is denoted by the use of two hard disk drives each
interrupt request (IRQ), I/O port address, and memory address assignment. containing identical data?
■ When two hardware devices share the same resource assignment, a system 26. What does the acronym NAS represent?
conflict occurs. 27. What does the acronym SAN represent?
28. What is the difference between NAS and SAN?
■ The most common RAID levels are RAID 0, RAID 1, and RAID 5. 29. What type of media is used for Fibre Channel?
■ RAID 0 is known as striping. Striping increases data read/write speed but 30. What are the three common Fibre Channel topologies?
does not provide fault tolerance. 31. What does the acronym iSCSI represent?
■ RAID 1 is mirroring or duplexing two hard disk drives. 32. What are the two main advantages to iSCSI storage?
■ RAID 5 is known as striping with parity, which combines data read/write 33. What two protocols are used to send SCSI commands across the network?
speed with fault tolerance. 34. What does the acronym NAA represent?
35. What two naming formats are used to identify iSCSI targets?
■ Network Attached Storage (NAS) is a device or collection of devices used to
36. What naming format is used to identify Fibre Channel storage devices?
provide storage for a local area network. The NAS shares the bandwidth of
37. Identify the following address type: iqn.2008-06.com.
the local network.
rmroberts:myiSCSIstorage.
■ Storage Area Network (SAN) is a separate network dedicated to data storage.
It does not affect the bandwidth of the other connected networks.
■ The iSCSI standard is an IP-based storage technology that uses IPv4 and IPv6
network addresses to identify storage devices on a LAN, MAN, or WAN. Sample Network+ Exam Questions Network+
Answer the following questions on a separate sheet of paper. Please do not write in this book.
Review Questions 1. Which RAID level provides the fastest reading and writing data transfer time?
A. RAID 0
Answer the following questions on a separate sheet of paper. Please do not write in this book. B. RAID 1
1. What are some typical services that servers provide? C. RAID 5
2. What is a thin server and what applications can it be used for? D. RAID 0 and RAID 1
3. What is a thin client server and what applications can it be used for? 2. Which network RAID level provides a duplicate copy of one hard disk
4. What does the term hot-swap mean? drive on another hard disk drive?
5. What type of motherboard is commonly used for servers? A. RAID 0
6. Which server component is responsible for the POST? B. RAID 1
7. How many devices can be connected to a Fast/Wide SCSI-2 chain? C. RAID 5
8. What is the bus width of Fast SCSI-2? D. RAID 4
9. What is the bus width of Fast/Wide SCSI-2?
396 Networking Fundamentals Chapter 9 Introduction to the Server 397
An enterprise business typically depends on hundreds of servers to meet user demands. Chapter 9
Laboratory Activity
Introduction
Disk management is usually performed in the Disk Management utility. The
DiskPart command interpreter is an alternative way to manage disks and partitions.
At times, the DiskPart command interpreter may be the only alternative for
inspecting and manipulating the master boot record (MBR) and partition table
should the GUI fail. Also, certain tasks can be performed using the DiskPart
command interpreter that cannot be performed using the Disk Management utility.
For example, you must use the DiskPart command interpreter to convert a dynamic
disk to a basic disk and to delete or replace the MBR in the active partition. The Disk
Management utility does not allow the performance of these tasks because it is
designed to protect the integrity of the disk structure from accidental deletion.
You can think of the DiskPart command interpreter as an updated version of the
fdisk command. Windows XP no longer supports the fdisk command. The DiskPart
utility is used in place of fdisk to inspect, create, and delete partitions or volumes
on a disk drive.
The DiskPart command interpreter will not make changes to removable
media such as a USB drive and an IEEE-1394 drive. These types of media are
identified as a “super floppy” by the DiskPart utility rather than as a hard disk
drive.
In this laboratory activity, you will perform some basic DiskPart operations
to become familiar with this utility. While you most likely will never need to
use the full capability of this utility, more information can be obtained at the
Microsoft Tech Support Web site.
Look at the following screen capture. Notice that the detail disk command
has been entered at the DiskPart command line. The detail disk command
reveals details about the selected disk, such as the hard disk drive manufacturer
and type. It also shows that the hard disk drive has two partitions or volumes.
Volume 1 is assigned letter C and volume 2 is assigned letter D. Notice that both
volumes are indicated as healthy.
400 Networking Fundamentals Chapter 9 Introduction to the Server 401
Procedure
1. ______ Report to your assigned workstation.
2. ______ Boot the computer and verify it is in working order.
3. ______ Open the command prompt (Start | All Programs | Accessories |
Command Prompt, or Start | Run and enter cmd in the Run dialog box).
The list command can be used with the disk, volume, and partition object.
When using the DiskPart command interpreter, disks, partitions, and volumes 4. ______ At the command line, type and enter the DiskPart command. If
are referred to as objects. Look at the following screen capture. It shows the list successful, the prompt will display > DISKPART to let you know that
disk, list partition, and list volume commands. The list disk command lists the you are now using the DiskPart command interpreter.
disk(s) installed starting with disk 0. The list volume command lists the volumes
5. ______ Enter the Help or /? command to reveal a list of commands.
contained in the system. The list partition command lists the partitions located on
a selected disk. Notice how the DVD-ROM drive is identified after issuing the list 6. ______ Enter the list command to display the objects that can be specified
volume command. Also, notice how the removable drive is identified even though with the list command. Disk, partition, and volume are listed.
it is no longer present.
7. ______ Try each of the following commands to reveal information about the
disk drive(s): list disk, list partition, list volume. Remember, the list
partition command requires focus. You must use the select command
to select the disk drive you wish to list partition information about.
For example, you would enter select disk 0 to set the focus on the
first disk in the system. The select command is only required for the
list partition command. After running each command, record on a
separate sheet of paper the information revealed.
8. ______ The detail command reveals similar content but with more detailed
information about an object. Enter each of the following commands
and then record on a separate sheet of paper the information
revealed: detail disk, detail volume, detail partition.
9. ______ Practice using the commands covered thus far until you are very
familiar with them. They are difficult to learn at first because some
involve setting focus and using two words for a valid command.
10. ______ Use the help command to reveal what the following commands
Before issuing the list partition command, you must select the disk you are used for. Do not attempt to use any of the following commands
wish to view. For example, to view the partition information for a single hard without explicit permission from the instructor.
disk drive, you would issue the select disk command. Then you would issue the
list partition command. Otherwise, you will generate an error message stating,
“There is no disk selected to list partitions.”
Selecting the disk is also known as setting focus. When you set focus, you
focus the list partition command on a selected disk. You must also set the focus
on the partition you wish to list. If you do not, the default partition you are
presently running the DiskPart command interpreter from is automatically
selected.
For more information on the DiskPart command interpreter, read the
following Microsoft Support article: 300415—A Description of the DiskPart
Command Line Utility.
402 Networking Fundamentals
Command Purpose
add
active
assign
break
clean
create
delete
detail
exit
extend
help
import
inactive
list
online
rem
remove
repair
rescan
retain
select
11. ______ Enter the exit command to return to the command prompt and then
again to return to the Windows desktop. Leave your computer in the
condition as specified by your instructor.
12. ______ Answer the review questions.
Review Questions
Answer the following questions on a separate sheet of paper. Please do not write in this book.
1. What are objects when using the DiskPart command interpreter?
2. What command is used to reveal information about a particular partition?
3. Which command is used to set focus on a particular drive?
4. What does the command prompt look like when you are running the
DiskPart command interpreter?
5. How can you see a list of the various DiskPart commands?
6. A particular computer has only one hard disk drive. What command is used
to set focus on that one hard disk drive?
7. What command will stop the DiskPart command interpreter and return you
to the default prompt?