Wednesday, February 23, 2011

WSUS


WSUS

Q. What is WSUS?
A. It is Microsoft Software Update Server, and it is designed to automate the process of distributing Windows operating system patches.
    It works by controlling the Automatic Updates applet already present on all Windows machines.  Instead of many machines at UVA all going to Microsoft's website to download updates, the SUS server downloads all updates to an ITC-owned server and workstations then look there for updates.

Q. What is the Minimum Free Disk Space required?
A.  Minimum of 6 GB free disk space is recommended to store the WSUS content.
  
Q. How WSUS Works?
A. WSUS is an update component of Windows Server and offers an effective and quick way to help keep systems up-to-date. WSUS provides a management infrastructure consisting of the following:
Microsoft Update: The Microsoft Web site to which WSUS components connect for updates of Microsoft products.

Windows Server Update Services server: The server component that is installed on a computer running a Microsoft Windows 2000 Server with Service Pack 4 (SP4) or Windows Server 2003 operating system inside the corporate firewall. WSUS server provides the features that administrators need to manage and distribute updates through a Web-based tool, which can be accessed from Internet Explorer on any Windows computer in the corporate network. In addition, a WSUS server can be the update source for other WSUS servers.

Automatic Updates: The client computer component built into Microsoft Windows Server 2003, Windows XP, and Windows 2000 with SP3 operating systems. Automatic Updates enables both server and client computers to receive updates from Microsoft Update or from a server running WSUS.

Q. What are the basic requirements (Hardware/Software) to implement the Windows SUS server?

A.  Server Hardware Requirements:

     WSUS requires a single server for basic operation, although you can scale your WSUS implementation to larger numbers of servers if you wish. For a basic implementation of up to 500 users, hardware requirements, per Microsoft, are:
·       1GHz CPU
·       1GB RAM
You also need a network card, and around free disk space (described below)

 

Server Software Requirements:

You need the following software components:
·       A supported Windows Server operating system - Windows Server 2003 is the preferred OS, but Windows 2000 is also supported. WSUS is supported on all editions of Windows Server 2003, but there are some restrictions of you use the Web Edition (See [WUS Restrictions With2k3 Web].
·       IIS - WUS is operated via IIS, so your WUS Server needs to have IIS loaded. You need at least IIS 5.0.
·       .NET Framework 1.1 SP1 - get this 7.982MB download from the Microsoft download site. The .NET Framework 1.1 SP1 is delivered as a hot fix installation file (see KB article KB867460 for details). This expands to 55.6 MB (58,335,654 bytes) on disk prior to installation. The installation of this hot fix also stops IIS, and requires a reboot.
·       Background Intelligent Transfer Service 2.0 (BITS 2.0 English.zip) - this is a new version of BITS, at present only available to beta testers, or those on the OEP. This is a 1.34MB download.
·       WSUS Setup (WSUSSetup.exe) - Like BITS V2, this is available only to beta testers or members of the OEP at present. This is download is over 100mb.
·       SQL Database server. For Windows Server 2003 MSDE is installed during setup. For Windows 2000 it is not and MSDE or SQL server must be installed prior WUS setup.

 

Server Disk Space Requirements:

     WUS Server disk space requirements fall into three categories: the WUS service, WUS updates and the WUS data base.

     Microsoft recommends that you have at least 6GB free disk space to store WUS content. At present, typical usage is around 1-2GB/language, although this does depend on what updates you specify and is likely to grow over time. The WSUS service installs (by default) into C:\Program Files\Update Services\. This folder takes up 365MB (371MB on disk) after the initial installation.   The WSUS Database is managed by MDSE, and is installed by default into C:\WSUS\MSSQL$WSUS. This folder takes up 216 MB after the initial install, synchronize and with only 2 clients. The size of the DB grows as you add more computers, and as you manage more updates.

Q. What is TCP/IP port no. used for Windows SUS services?
A.  WSUS uses 8530 port.

Q. What is essential application used for WSUS database report?
A. WSUS database stores update information, event information about update actions on client computers, and WSUS server settings.
Administrators have the following options for the WSUS database:
1. The Microsoft SQL Server 2000 Desktop Engine (Windows) (WMSDE) database that WSUS can install during setup on Windows Server 2003
2. An existing Microsoft® SQL Server™ 2000 database
3. An existing Microsoft Data Engine 2000 (MSDE) with Service Pack 3 (SP3) or Later.

Q. What are essential settings required at the end of WSUS client?
A.  On the client side we have to enable Automatic update from security setting. Also we can enable automatic update from registry.
Registry Key: KEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WindowsUpdate\
Type: Reg_DWORD
  • 0 - Disabled.
  • 1 - Enable the Automatic Update client to use the SUS Server specified by the "WUServer" value.
    If you have domain login on client, then we also enable auto update on client side through group policy.

Monday, February 21, 2011

Internet Beginner

What is Internet?

The Internet is a Computer Network made up of thousands of computers worldwide. It is basically a bunch of computers linked together through a network so computer users in different locations can have access to the same information. Modems are usually used to connect to Internet with the help of an Internet Service Provider (I S P).
The Internet is a client-server system. Your computer is the client, and the computer which stores the data is the server. When you click onto a Website, your computer requests the web page from the specific server storing that file. That server sends the data file that you have requested over the Internet to your computer. Your Web Browser interprets that data & displays it to your computer screen.

Originally designed as a way for government and academic researchers to share information, the net now connects universities, schools, corporations, non-profit organizations, and individuals. Therefore the Internet is a very robust tool both for sharing information and, more recently, for conducting electronic commerce.


What is the World Wide Web (WWW)?
The term "World Wide Web" refers to the Internet’s ability to display and link files containing text, images, and a variety of other information. For example, a person creates a web site containing a series of pages that describes a science project. These files can also contain links to other files located anywhere in the world. The links are typically based on content related to the page containing the reference. The result is an ability to continually branch from a single starting point to any number of pages of related content located at sites all over the world.


What is the difference between a web site and a web page?
A web site is made up of a web page(s).
A web site is similar to a file folder. A folder contains and organizes information and documents. These documents are similar to web pages.

For example - www.krishna.com is the main page of Krishna's web site. The links from this page are separate web pages. All of these pages together make up the web site.

What is a browser?
A browser is a software program/application which allows users to view and navigate the content of the World Wide Web. The two most popular browser programs are Netscape’s Navigator and Communicator, and Microsoft’s Internet Explorer.

Browsers do not have precisely the same features, but their basic capabilities are very similar. These capabilities are:

1. Viewing and navigating the Web. A browser displays web sites. As you move from one site to another you have the option to go back to the previous page as well as going forward to a page you just viewed if you have used the back key. These keys are very useful when viewing a web site that has not placed links to different pages on their site.

2. Marking favorite pages. Browsers can store a list of sites to which you want to return. Netscape calls these "bookmarks," and Explorer calls them "favorite places." Remember that these are links to web sites and are not stored copies of the files themselves. This means that when you click on a bookmark/favorite place, your browser will load the most recent version of that website.

3. Saving pages. Your browser has the ability to save the contents of a page to your computer.

What is a URL?
The acronym URL stands for "uniform resource locator," a fancy term for the unique location of a particular web file on the Internet. A typical URL looks like this:

http://www.krishna.com/home.html

Why is this important? If you know what a URL means, you can tell a lot about the source of the pages you are viewing. THIS IS IMPORTANT. Let us begin by breaking the URL into its component parts.

http:// is the protocol (a set of operating rules) by which computers on the Internet send files back and forth. The protocol for the Web "http" is called “hypertext transfer protocol."

www.krishna.com is the domain name. The domain name is the unique name for the network which contains the web site you are viewing.

/html/ is the pathname. A pathname is the location within the web site where a specific web page is located. This is similar to a subfolder or a folder within a folder. Also, this is not always part of a URL. Pathnames can be called anything that the web sites creator came up with. In most cases, the use of a tilde "~" in a pathname indicates a web site reserved for a given individuals personal use.

home.htm is the file name. It is the name of a single hypertext file, web page, located on the Internet.

All Internet addresses contain these components in varying combination.


What is e-mail?
In its simplest form, e-mail is an electronic message sent from one device to another. While most messages go from computer to computer, e-mail can also be sent and received by mobile phones and PDAs. With e-mail, you can send or receive personal and business-related messages with attachments, such as photos or formatted documents

Electronic mail, or e-mail, is the most frequently used service on the Internet for many reasons:

* You can send the same message to several people at the same time.
* You can send a message any time, any where and the recipient can read it at his or her convenience.
* You can forward information to co-workers without retyping it.
* You can save time. E-mail is fast, usually taking no more than a few minutes to be received.
* You can e-mail electronic documents and the recipients can then edit and return revised version.
* You can send messages around the world as easily as to co-workers in the next office.

How Email Works on the Internet?

Like a postal address, an e-mail address specifies the destination of an electronic message.

* An Internet e-mail address looks like this: user name@domain name
* The user name is a unique name that identifies the recipient.
* The domain name is the address. Many people can share the same domain name.
* Some companies use a different naming system for internal e-mail.

Just as a letter makes stops at different postal stations along the way to its final destination, e-mail passes from one computer, known as a mail server, to another as it travels over the Internet. Once it arrives at the destination mail server, it's stored in an electronic mailbox until the recipient retrieves it. This whole process can take seconds, allowing you to quickly communicate with people around the world at any time of the day or night.

* E-mail is sent and received through electronic "post offices" known as mail servers.
* To read your e-mail, you must retrieve it from the mail server.
* Once you enter the address of the recipient, compose your message, and click Send, your e-mail software handles the delivery.
* If the message isn't delivered, because of an incorrect address, for example, you typically receive an e-mail message explaining why.If the message doesn't reach its destination the first time, the mail server sends it again.
* If the message is not delivered, you usually receive a message explaining the problem, along with the full text of the original message. You can correct the problem-usually an incorrect e-mail address--and resend it


What is an E-mail Client?

The software you use to send, receive, and manage electronic messages is called an e-mail client. (Most web browsers have with this software.) To send an e-mail, you enter information similar to the heading of a typical interoffice memo.

To contains the e-mail addresses of the recipients. This is a mandatory entry.

CC, short for Carbon Copy, contains the e-mail addresses for people other than the primary recipients. This is optional.
BCC:, short for Blind Carbon Copy, contains the e-mail addresses of other recipients who receive copies, but their names and addresses are hidden from the other recipients. This is optional.
Subject contains the main topic of the message. Keep this brief. Recipients see this in their summary of incoming e-mails.
Attachment contains the names of files that you may be sending, for example, a word-processing document or a spreadsheet.
Body contains the message itself, which can be of any length.

Internet E-mail Address
Here is how to interpret the parts of an e-mail address:

1.kris.junnikar@gmail.com

kris.junnikar--The user name of the e-mail account holder is a unique, assigned name that can be a real name, initials, a nickname, or a descriptive word such as "information."

@--The axon sign is required in all Internet e-mail addresses. It allows the e-mail software to distinguish between the user name and the domain name.

gmail.com--The domain name identifies the company or organization of the account holder.

Signatures
E-mail can include a signature at the end of the message. An e-mail signature is not your hand-written signature, but it can provide useful information about you.

Like a business card, an e-mail signature can include your name, title, telephone and fax numbers, street address, and e-mail address.

Using the signature feature saves time, since you don't have to retype the information each time you send a message. Clicking the feature automatically adds it to the message

Some e-mail software lets you store more than one signature.

In the future, the signature may contain passcodes that verify the sender of the message, authenticating an e-mail the way a hand-written signature authenticates a paper document.


E-mail Etiquette
To improve the impact of your messages and avoid trouble, there are a few unwritten rules, called netiquette (networking etiquette) you should be aware of:

* Include your name at the bottom of a message.
* Clearly summarize your message in the subject line.
* Keep your messages short and focused. Recipients tend to ignore long messages.
* Don't write in all CAPITAL LETTERS. Capital letters are used for emphasis, and are considered equivalent to SHOUTING.

In a corporate environment, certain rules of netiquette are especially important to follow.

Send e-mail only to those people who need the information. Don't waste people's time with unrelated e-mail.

When replying to a message sent to several people, reply only to those who need to see your response. The Reply to All feature on many e-mail programs may be convenient, but it creates unnecessary e-mail.

Avoid sending messages like jokes and personal announcements. They may be inappropriate in a business situation.

Don't make disparaging remarks about co-workers in an e-mail message, even when joking. These written remarks can be easily sent around the company.

Corresponding Outside Your Company

* Remember that messages sent via company e-mail are no different than one sent on company letterhead. It represents not only you, but your company.
* Keep in mind that some cases, an e-mail message may be considered a legal document.
* Include a signature at the bottom of the message. This helps the recipient identify you and your company.
* Include your telephone number, so the recipient can follow up with a call. A telephone conversation may be the most effective way to get more information or clarify of what you wrote.


Understanding/Deciphering Error Messages
If an e-mail is returned to you, most likely it will contain an explanation.

* User unknown: The message arrived at the mail server, but the server couldn't find the recipient. Check the user name part of the e-mail address for errors and try sending the message again. Also, double check the domain name to ensure that you are sending it to the right organization/domain.
* Host unknown: Your mail server could not find out the server's computer address based on the domain name. Check the domain name in the e-mail address for errors and try again.
* Message hasn't been delivered, but will try again. Your mail server failed to deliver the message, but will continue to resend it. This error message indicates a temporary communications problem that may clear up by itself. For example, this message is generated when the recipient's mail server is not functioning or is disconnected from the Internet.


Sending Files as Attachments

In addition to sending text messages, most e-mail programs allow you to attach word-processing documents, spreadsheets, graphics, audio, video, and other electronic files to your message.

To attach a file:

* Click on the Attachment or Include File icon, often represented by a paper clip. This feature is often located on the toolbar or on a pull-down menu.
* Locate the file on your computer's hard drive or other storage device from the window that typically opens requesting the name of the file.
* Select the file you want from the file attachment window. An icon representing the file may appear in the body of your message, or the name of the file appears in the Attachment line of your message window.


Opening Attachments

To view an attached file, you can often click on the file icon or save the file to your hard drive, and then use the appropriate software application to open it.

With some e-mail software, you open or save an attached file by double-clicking on the icon for the file. This typically brings up a dialog box allowing you to decide how you want to process the file.

Should you open an attachment that looks like random characters and symbols, it probably has not been decoded correctly. Alternatively, you may be viewing it with the wrong software application.


Tips for Avoiding Common Email Pitfalls
File Attachments

Files attached to email messages have the potential to cause a variety of problems, including:

* Size: Attachments can be large and fill the recipient's inbox, blocking the receipt of future messages. To prevent users from filling another person's account, we limit the size of file attachments to 2MB or less.
* Readability: Some attachments can't be opened and used by the recipient. Before sending a file as an attachment, contact the recipient to see if he or she can handle that type of document. Avoid sending attachments to large mailing lists (see "Mailing lists" below). A possible solution: cut and paste just the contents of the file into the body of the email message itself.
* Mailing lists: Sending a large attachment to a large number of recipients, either through a private list or through a listserv, can cause network delays or failures as the server attempts to process the data.
* Computer viruses: If your computer is infected with a virus, you may infect those who open email attachments you send. To avoid this problem, don't send files as attachments and use antivirus software.

Common mail receipt problems
Over quota
The most likely reason the recipient is having trouble receiving email is that he must have exceeded his email account quota. This happens if the mails are not downloaded regularly.
You may receive a delivery failure message stating that the delivery failed due to user over quota. This means that the recipient has not downloaded the messages in his mailbox.
Messages with blocked attachments
Mail server maintains mail filters that block attachments that commonly contain viruses.
For example if files with .jpeg attachement are blocked on our mail server, no one will receive messages which are having .jpeg attachment.
host unknown --The host name (the part of the e-mail address after the @ sign) can not be translated into the name of a computer connected to the Internet. The most common cause is typographical errors. For example, sending mail to dc.varroc@varrocgroupe.com would cause an error because krishna.com is misspelled.
user unknown --The host to which you sent the mail, (the part of the e-mail address after the @ sign) does not have an e-mail account for the user you specified. The most common cause is typographical errors. For example, sending mail to dc.varoc@varrocgroup.com would cause an error because dc.krishna is misspelled.

Recipient address rejected: need fully-qualified address -- This is also caused by sending email to an invalid email address, however instead of not having a correct domain (as above), it is caused by not having a domain at all. All To: and CC: addresses must have a @ in them.

DHCP

DHCP

Q. What is DHCP?
A. DHCP stands for "Dynamic Host Configuration Protocol".  DHCP (Dynamic Host Configuration Protocol) is a communications protocol that lets network administrators centrally manage and automate the assignment of Internet Protocol (IP) addresses in an organization's network.
   
    DHCP, the Dynamic Host Configuration Protocol, describes the means by which a system can connect to a network and obtain the necessary information for communication upon that network.

Q. Who Created It? How Was It Created?
A.  DHCP was created by the Dynamic Host Configuration Working Group of the Internet Engineering Task Force (IETF; a volunteer organization which defines protocols for use on the Internet). As such, its definition is recorded in an Internet RFC and the Internet Activities Board (IAB) is asserting its status as to Internet Standardization. As of this writing (June 1998), DHCP is an Internet Draft Standard Protocol and is Elective. BOOTP is an Internet Draft Standard Protocol and is recommended.

Q. How DHCP Works?
A. DHCP uses a client-server model. The network administrator establishes one or more DHCP servers that maintain TCP/IP configuration information and provide it to clients. The server database includes the following:

·         Valid configuration parameters for all clients on the network.
·         Valid IP addresses maintained in a pool for assignment to clients, plus reserved addresses for manual assignment.
·         Duration of a lease offered by the server. The lease defines the length of time for which the assigned IP address can be used.
With a DHCP server installed and configured on your network, DHCP-enabled clients can obtain their IP address and related configuration parameters dynamically each time they start and join the network. DHCP servers provide this configuration in the form of an address-lease offer to requesting clients.
A. With a DHCP server installed and configured on your network, DHCP-enabled clients can obtain their IP address and related configuration parameters dynamically each time they start and join the network. DHCP servers provide this configuration in the form of an address-lease offer to requesting clients.
1.      The DHCP client requests an IP address by broadcasting a DHCP Discover message to the local subnet.
2.      The client is offered an address when a DHCP server responds with a DHCP Offer message containing IP address and configuration information for lease to the client. If no DHCP server responds to the client request, the client can proceed in two ways:
·         If it is a Windows 2000–based client, and IP auto-configuration has not been disabled, the client self-configures an IP address for its interface.
·         If the client is not a Windows 2000–based client, or IP auto-configuration has been disabled, the client network initialization fails. The client continues to resend DHCP Discover messages in the background (four times, every 5 minutes) until it receives a DHCP Offer message from a DHCP server.
3.      The client indicates acceptance of the offer by selecting the offered address and replying to the server with a DHCP Request message.
4.      The client is assigned the address and the DHCP server sends a DHCH ACK message, approving the lease. Other DHCP option information might be included in the message.
5.      Once the client receives acknowledgment, it configures its TCP/IP properties using any DHCP option information in the reply, and joins the network.
In rare cases, a DHCP server might return a negative acknowledgment to the client. This can happen if a client requests an invalid or duplicate address. If a client receives a negative acknowledgment (DHCP Nack), the client must begin the entire lease process again.




Q. At what layer of OSI it functions?
A. DHCP works at Data link Layer. (Layer 2)

Q. What is DORA?
A. Finally, the chosen DHCP server sends the lease information (the IP address, potentially a subnet mask, DNS server, WINS server, WINS node type, domain name, and default gateway) to the workstation in a message called the DHCP ACK (data communications jargon for acknowledge). You can remember the four parts of a DHCP message by the mnemonic DORA - Discover, Offer, Request, and ACK.

Q. What is the default Lease Period in DHCP Client/Server communication?
A. The default lease is 8 days, after which a computer has to renew their use of the address they've been leased by your DHCP server.

There are certain situations however when you might want to lengthen this lease period to several weeks or months or even longer. These situations include (a) when you have a stable network where computers neither join or are removed or relocated; (b) when you have a large pool of available IP addresses to lease from; or (c) when your network is almost saturated with very little available bandwidth and you want to reduce DHCP traffic to increase available bandwidth (not by much, but sometimes every little bit helps).

Q. How does DHCP lease works?
A. The first time a DHCP-enabled client starts and attempts to join the network; it automatically follows an initialization process to obtain a lease from a DHCP server. Figure 4.2 shows the lease process.


Figure 4.2 DHCP Lease Process

3.      The DHCP client requests an IP address by broadcasting a DHCP Discover message to the local subnet.
4.      The client is offered an address when a DHCP server responds with a DHCP Offer message containing IP address and configuration information for lease to the client. If no DHCP server responds to the client request, the client can proceed in two ways:
·         If it is a Windows 2000–based client, and IP auto-configuration has not been disabled, the client self-configures an IP address for its interface.
·         If the client is not a Windows 2000–based client, or IP auto-configuration has been disabled, the client network initialization fails. The client continues to resend DHCP Discover messages in the background (four times, every 5 minutes) until it receives a DHCP Offer message from a DHCP server.
6.      The client indicates acceptance of the offer by selecting the offered address and replying to the server with a DHCP Request message.
7.      The client is assigned the address and the DHCP server sends a DHCH ACK message, approving the lease. Other DHCP option information might be included in the message.
8.      Once the client receives acknowledgment, it configures its TCP/IP properties using any DHCP option information in the reply, and joins the network.
In rare cases, a DHCP server might return a negative acknowledgment to the client. This can happen if a client requests an invalid or duplicate address. If a client receives a negative acknowledgment (DHCP Nack), the client must begin the entire lease process again.
Q. How can you backup configuration file of DHCP server?
A.  DHCP database backs itself up automatically every 60 minutes to the %SystemRoot%\System32\Dhcp\Backup\Jet directory. This interval can be changed:
  1. Start the registry editor
2.      Move to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DHCPServer\Parameters\BackupInterval
  1. Double click on BackupInterval and set to the number of minutes you want the backup to be performed. Click OK
  2. Close the registry editor
  3. Stop and restart the DHCP server service (Start - Settings - Control Panel - Services - DHCP Server - Start and Stop)
You could backup the %SystemRoot%\System32\Dhcp\Backup\Jet directory if you wish.
Q. Had you maintained/created any technical reference documentation on DHCP Server/Client?
A.  Yes.

Q. What is TCP/IP port no. used for DHCP service?
A.  DHCP uses the same two IANA assigned ports as BOOTP: 67/udp for the server side, and    68/udp for the client side.

Q. What is VLAN?
A.  A virtual LAN, commonly known as a vLAN or as a VLAN, is a method of creating independent logical networks within a physical network.
A VLAN consists of a network of computers that behave as if connected to the same wire - even though they may actually be physically connected to different segments of a LAN. Network administrators configure VLANs through software rather than hardware, which make them extremely flexible.
A. DHCP and VLANs, which are very different in concept, are sometimes cited as different solutions to the same problem. While they have a goal in common (easing moves of networked computers), VLANs represent a more revolutionary change to a LAN than DHCP. A DHCP server and forwarding agents can allow you to set things up so that you can unplug a client computer from one network or subnet and plug it into another and have it come alive immediately, it having been reconfigured automatically. In conjunction to Dynamic DNS, it could automatically be given its same name in its new place. VLAN-capable LAN equipment with dynamic VLAN assignment allows you to configure things so a client computer can be plugged into any port and have the same IP number (as well as name) and be on the same subnet. The VLAN-capable network either has its own configuration that lists which MAC addresses are to belong to each VLAN, or it makes the determination from the source IP address of the IP packets that the client computer sends. Some differences in the two approaches:
§       DHCP handles changes by reconfiguring the client while a VLAN-capable network handles it by reconfiguring the network port the client is moved to.
§       DHCP dynamic reconfiguration requires a DHCP server, forwarding agent in each router, and DHCP capability in each client's TCP/IP support. The analogous capability in VLANs requires that all hubs throughout the network be VLAN-capable, supporting the same VLAN scheme. To this point VLAN support is proprietary with no vendor interoperability, but standards are being developed.
§       DHCP can configure a new client computer for you while a VLAN-capable network can't.
§       DHCP is generally aimed at giving "easy moves" capability to networks that are divided into subnets on a geographical basis, or on separate networks. VLANs are generally aimed at allowing you to set up subnets on some basis other than geographical, e.g. instead of putting everyone in one office on the same subnet, putting each person on a subnet that has access to the servers that that person requires.
There is an issue with trying to use DHCP (or BOOTP) and VLANs at the same time, in particular, with the scheme by which the VLAN-capable network determines the client's VLAN based upon the client computer's source IP address. Doing so assumes the client computer is already configured, which precludes the use of network to get the configuration information from a DHCP or BOOTP server.
Q. What is DHCP relay Agent?
A. DHCP Relay Agent component is a Bootstrap Protocol (BOOTP) relay agent that relays Dynamic Host Configuration Protocol (DHCP) messages between DHCP clients and DHCP servers on different IP networks.

Q. How does DHCP relay agent work?
A. A DHCP relay agent is an agent program or component responsible for relaying DHCP & BOOTP (Bootstrap Protocol) broadcast messages between a DHCP server and a client across an IP router.
   
    A DHCP relay agent supports DHCP/BOOTP message relay as defined in RFC (Request for Comment) 1541 & 2131. The DHCP relay agent service is managed using Routing & Remote Service.

Q. DHCP User Class and Vendor Class Options?
A. DHCP provides support for a host of new features. The user-specified and vendor-specified DHCP options—features that let administrators assign separate options to clients with similar configuration requirements. For example, if DHCP-aware clients in your human resources (HR) department require a different default gateway or DNS server than the rest of your clients, you can configure DHCP Class IDs to distribute these options to HR clients. The options that Class IDs provide override any scope or global default options that the DHCP server typically assigns.

Q. Option Classes?
A. The two option class types: User Class and Vendor Class. User Classes assign DHCP options to a group of clients that require similar configuration; Vendor Classes typically assign vendor-specific options to clients that share a common vendor type. For example, with Vendor Classes you can assign all Dell computers DHCP options that are common to those machines. The purpose of option classes is to group DHCP options for similar clients within a DHCP scope.

Q. What is Super scope?
A.  A range of IP addresses that span several subnets. The DHCP server can assign these addresses to clients that are on several subnets.

A.  A super-scope is actually a collection of individual scopes. When you group different scopes together into a single superscope, you can do the following:
  • Place DHCP clients from multiple network IDs on the same physical segment
  • Allow remote DCHP clients from multiple network IDs to obtain an address from a DHCP Server
  • Place multiple DHCP Servers on the same physical segment, with each DCHP Server being responsible for a different scope.
The superscope will allow the DHCP Server to answer requests from DHCP clients from different network IDs.

Q. What is Multicast?
A.  A range of class D addresses from 224.0.0.0 to 239.255.255.255 that can be assigned to computers when they ask for them. A multicast group is assigned to one IP address. Multicasting can be used to send messages to a group of computers at the same time with only one copy of the message. The Multicast Address Dynamic Client Allocation Protocol (MADCAP) is used to request a multicast address from a DHCP server.
A.  A DHCP lease is the amount of time that the DHCP server grants to the DHCP client permission to use a particular IP address. A typical server allows its administrator to set the lease time.

RAID



Q. What is Basic Disk?
A. A standard disk with standard partitions (primary and extended).

Q.
What is Dynamic Disk?
A. Disks that have dynamic mounting capability to add additional local or remote partitions or directories to a disk drive. These are called dynamic volumes. This is new with the Windows 2000 operating system and is not supported by any other operating systems. Any volume that is on more than one hard drive must be created with dynamic disks. A disk can only be converted from dynamic to basic by first deleting all the volumes in the dynamic disk.

Q.
What is RAID?
A. RAID (Redundant Array of Independent Disks). A collection of disk drives that offers increased performance and fault tolerance. There are a number of different RAID levels. The three most commonly used are 0, 1, and 5: Level 0: striping without parity (spreading out blocks of each file across multiple disks). Level 1: disk mirroring or duplexing. Level 2: bit-level striping with parity Level 3: byte-level striping with dedicated parity.

Q. What is Simple Volume?
A.  Simple volumes are the most common volumes and the type of volume that you will create most often. If you are using a single disk configuration, a simple volume is the only volume type that you can create.

Q.
What is Spanned Volume?
A.  Spanned volumes are created by combining disk space from two or more hard disks. Spanned volumes can be created by using different amounts of space from different hard disks. For example, a 10GB spanned volume can be created from 6GB of unallocated space on hard drive 0, 3GB of unallocated space on hard drive 1, and 1GB of space on hard drive 2. A spanned volume cannot be extended, and there is no fault tolerance in using a spanned volume. If any of the drives fail, the data on the volume is lost and must be restored from backup (tape). Spanned volumes can be created from two physical disks and can contain up to 32 physical disks.

Q. What is Mirrored Volume?
A.  Mirrored volumes are created using two physical disks. A mirrored volume requires same amount of unallocated space on each of the physical disk used. When data is written to a mirrored volume, the data is written to disk and then synchronized on the second disk. An exact copy of the data is available on both physical disks.

Q.
What is Stripped Volume?
A.  A striped volume is created using a minimum of two and a maximum of 32 physical drives to create a single volume. A striped volume is created by using an equal amount of unallocated space on all the physical disks.
The data is written across all physical disks in the volume in equal parts, thereby creating a stripe pattern. When data is written to the volume, it is divided into 64KB parts and each part is written to a separate disk. Chopping the data into pieces allows each physical disk to be performing a write operation at almost exactly the same time, thereby increasing speed dramatically. When data is read, it is read in the same way, in 64KB blocks at a time. Striped volumes provide the best read and write performance of all the different types of volumes. A striped volume gets its name from how the data is read and accessed on the drive.

Q.
What is Raid-0?
A. RAID Level 0 is not redundant, hence does not truly fit the "RAID" acronym. In level 0, data is split across drives, resulting in higher data throughput. Since no redundant information is stored, performance is very good, but the failure of any disk in the array results in data loss. This level is commonly referred to as striping.

Q.
What is RAID-1?
A.  RAID Level 1 provides redundancy by writing all data to two or more drives. The performance of a level 1 array tends to be faster on reads and slower on writes compared to a single drive, but if either drive fails, no data is lost. This is a good entry-level redundant system, since only two drives are required; however, since one drive is used to store a duplicate of the data, the cost per megabyte is high. This level is commonly referred to as mirroring.

Q.
What is RAID-5?
A.  RAID Level 5 is similar to level 4, but distributes parity among the drives. This can speed small writes in multiprocessing systems, since the parity disk does not become a bottleneck. Because parity data must be skipped on each drive during reads, however, the performance for reads tends to be considerably lower than a level 4 array. The cost per megabyte is the same as for level 4.

 
RAID stands for Redundant Array of Inexpensive Disks.

RAID is the organization of multiple disks into a large, high performance logical disk.

Disk arrays stripe data across multiple disks and access them in parallel to achieve:


* Higher data transfer rates on large data accesses and
* Higher I/O rates on small data accesses.

Data striping also results in uniform load balancing across all of the disks, eliminating hot spots that otherwise saturate a small number of disks, while the majority of disks sit idle.

But....

Large disk arrays, however are highly vulnerable to disk failures. A disk array with a hundred disks is a hundred times more likely to fail than a single disk. An MTTF (mean-time-to-failure) 500,000 hours for a single disk implies an MTTF of 500,000/100 i.e. 5000 hours for a disk array with a hundred disks.

So....

The solution to the problem of lower reliability in disk arrays is to improve the availability of the system. This can be achieved by employing redundancy in the form of error-correcting codes to tolerate disk failures. A redundant disk array can now retain data for much longer time than an unprotected single disk.

Do not confuse between reliability and availability.

Reliability is how well a system can work without any failures in its components. If there is a failure, the system was not reliable.

Availability is how well a system can work in times of a failure. If a system is able to work even in the presence of a failure of one or more system components, the system is said to be available.

Redundancy improves the availability of a system, but cannot improve the reliability. Reliability can only be increased by improving manufacturing technologies or using lesser individual components in a system.

Disadvantages due to Redundancy

Every time there is a write operation, there is a change of data. This change also, has to be reflected in the disks storing redundant information. This worsens the performance of writes in redundant disk arrays significantly compared to the performance of writes in non redundant disk arrays.

Also, keeping the redundant information consistent in the presence of concurrent I/O operation and the possibility of system crashes can be difficult.

The need for RAID can be summarized in two points given below. The two keywords are Redundant and Array.

* An array of multiple disks accessed in parallel will give greater throughput than a single disk.
* Redundant data on multiple disks provides fault tolerance.

Provided that the RAID hardware and software perform true parallel accesses on multiple drives, there will be a performance improvement over a single disk.

With a single hard disk, you cannot protect yourself against the costs of a disk failure, the time required to obtain and install a replacement disk, reinstall the operating system, restore files from backup tapes, and repeat all the data entry performed since the last backup was made.

With multiple disks and a suitable redundancy scheme, your system can stay up and running when a disk fails, and even while the replacement disk is being installed and its data restored.

To create an optimal cost-effective RAID configuration, we need to simultaneously achieve the following goals:

* Maximize the number of disks being accessed in parallel.
* Minimize the amount of disk space being used for redundant data.
* Minimize the overhead required to achieve the above goals.

There are 2 important concepts to be understood in the design and implementation of disk arrays:

1. Data striping, for improved performance.
2. Redundancy for improved reliability.
Data Striping

Data striping transparently distributes data over multiple disks to make them appear as a single fast, large disk. Striping improves aggregate I/O performance by allowing multiple I/Os to be serviced in parallel. There are 2 aspects to this parallelism.


* Multiple, independent requests can be serviced in parallel by separate disks. This decreases the queuing time seen by I/O requests.
* Single, multiple block requests can be serviced by multiple disks acting in co-ordination. This increases the effective transfer rate seen by a single request. The performance benefits increase with the number of disks in the array. Unfortunately, a large number of disks lowers the overall reliability of the disk array.

Most of the redundant disk array organizations can be distinguished based on 2 features:

1. the granularity of data interleaving and
2. the way in which the redundant data is computed and stored across the disk array.

Data interleaving can be either fine grained or coarse grained.

Fine grained disk arrays conceptually interleave data in relatively small units so that all I/O requests, regardless of their size, access all of the disks in the disk array. This results in very high data transfer rate for all I/O requests but has the disadvantages that only one logical I/O request can be in service at any given time and all disks must waste time positioning for every request.

Coarse grained disk arrays interleave data in relatively large units so that small I/O requests need access only a small number of disks while large requests can access all the disks in the disk array. This allows multiple small requests to be serviced simultaneously while still allowing large requests to see the higher transfer rates afforded by using multiple disks.

Redundancy

Since larger number of disks lower the overall reliability of the array of disks, it is important to incorporate redundancy in the array of disks to tolerate disk failures and allow for the continuous operation of the system without any loss of data.

The incorporation of redundancy in disk arrays brings up two problems:

1. Selecting the method for computing the redundant information. Most redundant disks arrays today use parity, though some use Hamming or Reed-Solomon codes.

2. Selecting a method for distribution of the redundant information across the disk array. The distribution method can be classified into 2 different schemes:

* Schemes that concentrate redundant information on a small number of disks.
* Schemes that distribute redundant information uniformly across all of the disks.

Such schemes are generally more desirable because they avoid hot spots and other load balancing problems suffered by schemes that do not uniformly distribute redundant information.

Finally, it is important to mention that selecting between the many possible data striping and redundancy schemes involves complex trade offs between reliability, performance and cost, which have been discussed in the next few sections.


There are many types of RAID and some of the important ones are introduced below:

Level 0 -- Striped Disk Array without Fault Tolerance: Provides data striping (spreading out blocks of each file across multiple disk drives) but no redundancy. This improves performance but does not deliver fault tolerance. If one drive fails then all data in the array is lost.

Level 1 -- Mirroring and Duplexing: Provides disk mirroring. Level 1 provides twice the read transaction rate of single disks and the same write transaction rate as single disks.

• Level 2 -- Error-Correcting Coding: Not a typical implementation and rarely used, Level 2 stripes data at the bit level rather than the block level.

• Level 3 -- Bit-Interleaved Parity: Provides byte-level striping with a dedicated parity disk. Level 3, which cannot service simultaneous multiple requests, also is rarely used.

• Level 4 -- Dedicated Parity Drive: A commonly used implementation of RAID, Level 4 provides block-level striping (like Level 0) with a parity disk. If a data disk fails, the parity data is used to create a replacement disk. A disadvantage to Level 4 is that the parity disk can create write bottlenecks.

Level 5 -- Block Interleaved Distributed Parity: Provides data striping at the byte level and also stripe error correction information. This results in excellent performance and good fault tolerance. Level 5 is one of the most popular implementations of RAID.

• Level 6 -- Independent Data Disks with Double Parity: Provides block-level striping with parity data distributed across all disks.

• Level 0+1 – A Mirror of Stripes: Not one of the original RAID levels, two RAID 0 stripes are created, and a RAID 1 mirror is created over them. Used for both replicating and sharing data among disks.

• Level 10 – A Stripe of Mirrors: Not one of the original RAID levels, multiple RAID 1 mirrors are created, and a RAID 0 stripe is created over these.

• Level 7: A trademark of Storage Computer Corporation that adds caching to Levels 3 or 4.

• RAID S: EMC Corporation's proprietary striped parity RAID system used in its Symmetrix storage systems.

The distribution of data across multiple drives can be managed either by dedicated hardware or by software. Additionally, there are hybrid RAIDs that are partially software and hardware-based solutions.

Software-based
Software implementations are now provided by many operating systems. A software layer sits above the (generally block-based) disk device drivers and provides an abstraction layer between the logical drives (RAID arrays) and physical drives. Most common levels are RAID 0 (striping across multiple drives for increased space and performance) and RAID 1 (mirroring two drives), followed by RAID 1+0, RAID 0+1, and RAID 5 (data striping with parity).
Since the software must run on a host server attached to storage, the processor (as mentioned above) on that host must dedicate processing time to run the RAID software.

Hardware-based
A hardware implementation of RAID requires at a minimum a special-purpose RAID controller. On a desktop system, this may be a PCI expansion card, or might be a capability built into the motherboard. Any drives may be used - IDE/ATA, SATA, SCSI, SSA, Fibre Channel, sometimes even a combination thereof. In a large environment the controller and disks may be placed outside of a physical machine, in a stand alone disk enclosure. The using machine can be directly attached to the enclosure in a traditional way, or connected via SAN. The controller hardware handles the management of the drives, and performs any parity calculations required by the chosen RAID level.
Most hardware implementations provide a read/write cache which, depending on the I/O workload, will improve performance. In most systems write cache may be non-volatile (e.g. battery-protected), so pending writes are not lost on a power failure.
Hardware implementations provide guaranteed performance, add no overhead to the local CPU complex and can support many operating systems, as the controller simply presents a logical disk to the operating system.
Hardware implementations also typically support hot swapping, allowing failed drives to be replaced while the system is running.
Inexpensive RAID controllers have become popular that are simply a standard disk controller with a BIOS extension implementing RAID in software for the early part of the boot process. A special operating system driver then takes over the raid functionality when the system switches into protected mode.

Hot spares
Both hardware and software implementations may support the use of hot spare drives, a pre-installed drive which is used to immediately (and automatically) replace a drive that has failed, by rebuilding the array onto that empty drive. This reduces the mean time to repair period during which a second drive failure in the same RAID redundancy group can result in loss of data, though it doesn't eliminate it completely; array rebuilds still take time, especially on active systems. It also prevents data loss when multiple drives fail in a short period of time, as is common when all drives in an array have undergone similar use patterns, and experience wear-out failures. This can be especially troublesome when multiple drives in a RAID set are from the same manufacturer batch.