Top Banner
59 HTTP Hypertext Transfer (or Transport) Protocol, the data transfer protocol used on the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. For example, when you enter a URL in your browser, this actually sends an HTTP command to the Web server directing it to fetch and transmit the requested Web page. HTTPS Hypertext Transfer Protocol: a protocol to transfer hypertext requests and information between servers and browsers. If you're going to run an online store or ecommerce Web site, you should be aware of HTTPS - or HyperText Transfer Protocol with Secure Sockets Layer. HTTPS is a protocol to transfer encrypted data over the Web. There are two primary differences between an HTTPS and an HTTP connection work: HTTPS connects on port 443, while HTTP is on port 80 HTTPS encrypts the data sent and received with SSL, while HTTP sends it all as plain text. FTP Short for File Transfer Protocol, the protocol for exchanging files over the Internet. FTP works in the
80

Practical File of Hos

May 30, 2017

Download

Documents

simargrewal
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Practical File of Hos

59

HTTP

Hypertext Transfer (or Transport) Protocol, the data transfer protocol used on the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. For example, when you enter a URL in your browser, this actually sends an HTTP command to the Web server directing it to fetch and transmit the requested Web page.

HTTPS

Hypertext Transfer Protocol: a protocol to transfer hypertext requests and information between servers and browsers. If you're going to run an online store or ecommerce Web site, you should be aware of HTTPS - or HyperText Transfer Protocol with Secure Sockets Layer. HTTPS is a protocol to transfer encrypted data over the Web.

There are two primary differences between an HTTPS and an HTTP connection work:

HTTPS connects on port 443, while HTTP is on port 80 HTTPS encrypts the data sent and received with SSL, while HTTP sends it all as

plain text.

FTP

Short for File Transfer Protocol, the protocol for exchanging files over the Internet. FTP works in the same way as HTTP for transferring Web pages from a server to a user's browser and SMTP for transferring electronic mail across the Internet in that, like these technologies, FTP uses the Internet's TCP/IP protocols to enable data transfer.

FTP is most commonly used to download a file from a server using the Internet or to upload a file to a server (e.g., uploading a Web page file to a server).

Page 2: Practical File of Hos

59

SFTP

SFTP is secure FTP. Secure File Transfer Protocol (SFTP) encrypts both commands and data. SFTP prevents passwords and sensitive information from being transmitted over the network, and is thus much less vulnerable to third-party interception. SFTP functionally similar to FTP with a different protocol(with is secure than traditional FTP software).

SSH

SSH, the term derived from Secure Shell, provides users with a secure, encrypted mechanism to for accessing systems that are supporting remote connections through the ssh services and do the various jobs from maintenance of Unix/Linux systems to the plain files transfers as it can be used as a secure replacement for FTP as well.

BOOTP

Short for Bootstrap Protocol, an Internet protocol that enables a diskless workstation to discover its own IP address, the IP address of a BOOTP server on the network, and a file to be loaded into memory to boot the machine. This enables the workstation to boot without requiring a hard or floppy disk drive. The protocol is defined by RFC 951.

Routable Protocols

Data being sent from one LAN to another along any of several available paths is routed. The protocols that support multipath LAN-to-LAN communications are known as 'Routable Protocols'. Because routable protocols can be used to tie several LANs together and create new wide-area environments, they are becoming increasingly important. TCP/IP is the 'routable protocol'. Because Routable Protocols are relatively large protocols than the non-routable ones, they are slow in everything. They involve many types of error-checking and other functions, which increase the size of data-packets.

Page 3: Practical File of Hos

59

Routed Protocols

Routed protocols can be sent over a routed network. Today, with IP (think of TCP/IP) being the predominate protocol in use on the Internet and in most networks, we don't often think about routed versus unrouted protocols. That is because IP is a routed protocol. Meaning, IP is designed such that it can be routed over and through different networks. This is because the IP address is broken up into network and node (host) by the subnet mask. An example of a protocol that is not routed (unroutable) would be NetBIOS. It works great on a small local network (in your house) but wouldn't work well over a large network connected by dedicated network circuits or the Internet.

UNC

Short for Universal Naming Convention or Uniform Naming Convention, a PC format for specifying the location of resources on a local-area network (LAN). UNC uses the following format:

\\server-name\shared-resource-pathname

So, for example, to access the file test.txt in the directory examples on the shared server silo, you would write:

\\silo\examples\test.txt

You can also use UNC to identify shared peripheral devices, such as printers. The idea behind UNC is to provide a format so that each shared resource can be identified with a unique address.

UNC is supported by Windows and many network operating systems (NOS's).

RDP

Remote Desktop Protocol (RDP) is a secure network communications protocol for Windows-based applications running on a server.

RDP allows network administrators to remotely diagnose and resolve problems encountered by individual subscribers. RDP is available for most versions of the Windows operating system as well as Mac OS X. An open source version is also available.

Page 4: Practical File of Hos

59

Noteworthy properties of RDP include encryption, smart card authentication, bandwidth reduction, resource sharing, the ability to use multiple displays and the ability to disconnect temporarily without logging off. RDP also allows redirection of functions such as audio and printing.

RDP can support up to 64,000 independent channels for data transmission. Data can be encrypted using 128-bit keys and the bandwidth reduction feature optimizes the data transfer rate in low-speed connections.

The protocol has presented some security issues, however. For instance, if an administrator opens a thin-client connection between computers, an attacker who is able to break into the RDP connection would have administrator privileges on both computers. It is generally recommended that RDP only be used when it is absolutely necessary and that both the administrator and end user run with the lowest level of privileges possible.

Client Server Model for Networking

The term "Client-Server model" has several uses but all are based around the same concept of using a client system to access a centralized server in order to use a service. When a network protocol is described as being 'client-server', we mean that the application runs as a service on a server, and a client version of the application is used to access the service. There are some very specific characteristics of a client server implementation:

The server provides services and data The server abstracts communication and information access, allowing clients

to make simplified requests for services and data.

The client handles all aspects of data presentation and the user's interface.

Page 5: Practical File of Hos

59

IP Address

Every machine on a network has a unique identifier. Just as you would address a letter to send in the mail, computers use the unique identifier to send data to specific computers on a network. Most networks today, including all computers on the Internet, use the TCP/IP protocol as the standard for how to communicate on the network. In the TCP/IP protocol, the unique identifier for a computer is called its IP address.

There are two standards for IP addresses: IP Version 4 (IPv4) and IP Version 6 (IPv6). All computers with IP addresses have an IPv4 address, and many are starting to use the new IPv6 address system as well. Here's what these two address types mean:

IPv4 uses 32 binary bits to create a single unique address on the network. An IPv4 address is expressed by four numbers separated by dots. Each number is the decimal (base-10) representation for an eight-digit binary (base-2) number, also called an octet. For example: 216.27.61.137

IPv6 uses 128 binary bits to create a single unique address on the network. An IPv6 address is expressed by eight groups of hexadecimal (base-16) numbers separated by colons, as in 2001:cdba:0000:0000:0000:0000:3257:9652. Groups of numbers that contain all zeros are often omitted to save space, leaving a colon separator to mark the gap (as in 2001:cdba::3257:9652).

MAC Address

Page 6: Practical File of Hos

59

Short for Media Access Control address, a hardware address that uniquely identifies each node of a network. In IEEE 802 networks, the Data Link Control (DLC) layer of the OSI Reference Model is divided into two sub-layers: the Logical Link Control (LLC) layer and the Media Access Control (MAC) layer. The MAC layer interfaces directly with the network medium. Consequently, each different type of network medium requires a different MAC layer.

On networks that do not conform to the IEEE 802 standards but do conform to the OSI Reference Model, the node address is called the Data Link Control (DLC) address.

How to Find a MAC Address

To display your MAC address on a Windows NT/2000/2003/XP/Visa computer:

Click START Go to ACCESSORIES

Select Command Prompt

Type: (no quotes) "ipconfig /all"

In the "ipconfig /all" results look for the adapter you want to find the MAC address of. The MAC address is the number located next to "Physical Address" in the list.

Subnet Masking

TCP/IP communication between computers is divided into packets with headers (electronic address labels) that identify the IP address of the computer a packet is coming from, and the IP address of the computer it is going to (the destination).

Every IP address is divided into a network ID portion and a client ID portion. On the internet, routers look at the 3 binary digits on the left of the destination IP address to determine an IP address's "class." (An IP address is 32 binary digits.) The router then uses the class to determine how many binary digits make up the network portion of the IP address: 8 for class A's, 16 for class B's, and 24 for class C's. It uses a database in the router (called the routing table) to decide where to send it next.

Page 7: Practical File of Hos

59

Once a packet is passed by an Internet router to its destination network, it is either on the LAN segment of the destination computer, or the LAN has been subdivided by the LAN administrators. If its on the destination computer's LAN segment, the destination computer uses it and it goes no further. If a network administrator has divided the LAN, and the destination computer is not on the current LAN segment, the corporate routers (not Internet routers) must now determine how to forward the packet to the correct LAN segment. These corporate routers are what sub-divide the LAN.

The "network" portion of the IP address doesn't help the corporate router, because every IP address in the subdivided LAN has the same network ID. This is what the subnet mask is for. Here's a key point: A subnet mask is used both when a LAN is subdivided, and when it is not subdivided (a single LAN segment).

If the LAN is not subdivided, the subnet mask shows that the LAN is a single segment. For example, with a class C IP address, the first 3 octets (w.x.y in the w.x.y.z format, or the left-most 24 binary digits) are the network ID portion, and a subnet mask of 255.255.255.0 would be used to indicate that there was only one undivided LAN segment. In this case, the client ID portion of the IP address (the z in the w.x.y.z format) is not divided, and all 8 binary digits are used to identify a specific computer on the LAN segment. (In binary, a mask of 255.255.255.0 is 11111111.11111111.11111111.00000000.)

When a LAN is subdivided, the client ID portion of the IP address is split! The part on the left is used to identify the corporate LAN segment, and the part on the right is used to identify a specific computer on that LAN segment. With a class C IP address, and a subnet mask of 255.255.255.192, the 192 tells the corporate routers that of the eight binary digits making up the client ID in a class C IP address, the 2 on the left are to identify the LAN segment, and the remaining 6 identify the specific computer on that LAN segment. (In binary, a mask of 255.255.255.192 is 11111111.11111111.11111111.11000000, and the digits in red show which digits of the client ID portion are masked, and therefore used to identify a corporate subnet.)

Gateway

A node on a network that serves as an entrance to another network. In enterprises, the gateway is the computer that routes the traffic from a workstation to the outside

Page 8: Practical File of Hos

59

network that is serving the Web pages. In homes, the gateway is the ISP that connects the user to the internet.

In enterprises, the gateway node often acts as a proxy server and a firewall. The gateway is also associated with both a router, which use headers and forwarding tables to determine where packets are sent, and a switch, which provides the actual path for the packet in and out of the gateway.

Bridge

A bridge device filters data traffic at a network boundary. Bridges reduce the amount of traffic on a LAN by dividing it into two segments.

Bridges operate at the data link layer (Layer 2) of the OSI model. Bridges inspect incoming traffic and decide whether to forward or discard it. An Ethernet bridge, for example, inspects each incoming Ethernet frame - including the source and destination MAC addresses, and sometimes the frame size - in making individual forwarding decisions.

Bridges serve a similar function as switches, that also operate at Layer 2. Traditional bridges, though, support one network boundary, whereas switches usually offer four or more hardware ports. Switches are sometimes called "multi-port bridges" for this reason.

RouterA router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called routing, which is somewhat like switching, but a router is different from a switch. The latter is simply a device to connect machines to form a LAN.Routers are physical devices that join multiple wired or wireless networks together. Technically, a wired or wireless router is a Layer 3 gateway, meaning that the wired/wireless router connects networks (as gateways do), and that the router operates at the network layer of the OSI model.

Page 9: Practical File of Hos

59

Home networkers often use an Internet Protocol (IP) wired or wireless router, IP being the most common OSI network layer protocol. An IP router such as a DSL or cable modem broadband router joins the home's local area network (LAN) to the wide-area network (WAN) of the Internet.

Ethernet

Ethernet is a protocol that controls the way data is transmitted over a local area network (LAN). It uses wires (meaning it is not a wireless technology).

The wires used for a LAN are mostly those headed by an RJ-45 jack, which is similar to the jack plugged into your telephone set, but twice as big. Some Ethernet networks use coaxial cables, but that’s rarer, and present in rather large LANs, which span over areas between buildings. If you want to see what a coaxial cable is like, look at the thick cable that links your TV antenna to your TV set.

Ethernet is by far the most popular LAN protocol used today. It is so popular that if you buy a network card to install on your machine, you will get an Ethernet card, unless you ask for something different, if of course that different protocol is available.

Ethernet has evolved over the years. Today, you can get cheap Ethernet LAN cards with speeds up to 100 Mbps; while the fastest Ethernet reaches Gbps (1 Gbps = 1000 Mbps) in speed.

Internal Modem vs. External Modem

There are 2 basic physical types of modems: Internal & External modems. External modems sit next to the computer and connect to the serial port using a straight-through serial cable.

Page 10: Practical File of Hos

59

An internal modems is a plug-in circuit board that sits inside the computer. It incorporates the serial port on-board. They are less expensive than external modems because they do not require a case, power supply and serial cable. They appear to the communication programs as if they were an external modem for all practical purposes.

Radio and Microwave Signal"Radio" or "Radio Waves" are energy expended in the form of electro

magnetic radiation. More specifically the term "Radio" refers to a specific frequency pattern of that radiation. This is how Radio broadcasting works. "Microwaves" are a said to be all radio frequency between 300Mhz and 30 Ghz. Thus microwave is a specific class of "Radio Wave". For more in depth explanations research the theroys of Heinrich Hertz.

Page 11: Practical File of Hos

59

NTFS

Short for NT File System, one of the file system for the Windows NT operating system (Windows NT also supports the FAT file system). NTFS has features to improve reliability, such as transaction logs to help recover from disk failures. To control access to files, you can set permissions for directories and/or individual files. NTFS files are not accessible from other operating systems such as DOS.

For large applications, NTFS supports spanning volumes, which means files and directories can be spread out across several physical disks.

FAT

A table that the operating system uses to locate files on a disk. Due to fragmentation, a file may be divided into many sections that are scattered around the disk. The FAT keeps track of all these pieces.

In DOS systems, FATs are stored just after the boot sector.

The FAT system for older versions of Windows 95 is called FAT16, and the one for new versions of Windows 95 and Windows 98 is called FAT32.

Extended File System

The extended file system, or ext, was implemented in April 1992 as the first file system created specifically for the Linux kernel. It has metadata structure inspired by the traditional Unix File System (UFS) and was designed by Rémy Card to overcome certain limitations of the Minix file system.[1] It was the first implementation that used the virtual file system (VFS), for which support was added in the Linux kernel in version 0.96c, and it could handle file systems up to 2 gigabytes (GB) in size.

EXFATExFAT is the Extended File Allocation Table file system and is part of Windows CE 6.0 and Windows Vista SP1/Windows Server 2008 and beyond (i.e., included in Windows 7). ExFAT is designed to be used when NTFS is not suitable or there's too much overhead (e.g., on removable devices). ExFAT supports drives much

Page 12: Practical File of Hos

59

larger than 4GB, the previous limit, and actually supports drives up to 16 exbibytes theoretically (I've not seen thumb drives that large yet). ExFAT is the default file system for removable devices as shown below.

TCP/IP

Short for Transmission Control Protocol/Internet Protocol, the suite of communications protocols used to connect hosts on the Internet. TCP/IP uses several protocols, the two main ones being TCP and IP. TCP/IP is built into the UNIX operating system and is used by the Internet, making it the de facto standard for transmitting data over networks. Even network operating systems that have their own protocols, such as Netware, also support TCP/IP.

IPX/SPX

Page 13: Practical File of Hos

59

Short for Internetwork Packet Exchange, a networking protocol used by the Novell NetWare operating systems. Like UDP/IP, IPX is a datagram protocol used for connectionless communications. (SPX): Short for Sequenced Packet Exchange, a transport layer protocol (layer 4 of the OSI Model) used in Novell Netware networks. The SPX layer sits on top of the IPX layer (layer 3) and provides connection-oriented services between two nodes on the network. SPX is used primarily by client/server applications.

OSIOSI stands for open system interconnection is a standard description or

"reference model" for how messages should be transmitted between any two points in a telecommunication network.

Page 14: Practical File of Hos

59

7) Application Layer : The application layer provider different services to the application. Example of services provided by this layer are file transfer, electronic messaging e-mail, virtual terminal access and network management.

6) Presentation Layer : The Presentation layer is responsible for protocol conversion, date encryption/decryption, Expanding graphics command and the date compression. This layer makes the communications between two host possible.

5) Session Layer : This layer is responsible for establishing the process-to-process communication between the host in the network. This layer is responsible for establishing and ending the sessions across the network. The interactive login is an example of services provided by this layer in which the connective are re-connected in care of any interruption.

4) Transport Layer : This layer is responsible for end-to-end delivers of messages between the networked hosts. It first divides the streams of data into chunks or packets before transmission and then the receiving computer re-assembles the packets. It also guarantee error free data delivery without loss or duplications.

3) Network Layer : This layer is responsible for translating the logical network address and names into their physical address ( MAC address). This layer is also responsible for addressing, determining routes for sending and managing network problems such as packet switching, data congestion and routines.

2) Data Link Layer : Data link layer is responsible for controlling the error between adjacent nodes and transfer the frames to other computer via physical layer. Data link layer is used by hubs and switches for their operation.

1) Physical Layer : Physical Layer is responsible for transmitting row bit stream over the physical cable. The physical layer defines the hardware items such as cables, cards, voltages etc.

SQL

Page 15: Practical File of Hos

59

SQL (pronounced "ess-que-el") stands for Structured Query Language. SQL is used to communicate with a database. According to ANSI (American National Standards Institute), it is the standard language for relational database management systems. SQL statements are used to perform tasks such as update data on a database, or retrieve data from a database. Some common relational database management systems that use SQL are: Oracle, Sybase, Microsoft SQL Server, Access, Ingres, etc. Although most database systems use SQL, most of them also have their own additional proprietary extensions that are usually only used on their system. However, the standard SQL commands such as "Select", "Insert", "Update", "Delete", "Create", and "Drop" can be used to accomplish almost everything that one needs to do with a database. This tutorial will provide you with the instruction on the basics of each of these commands as well as allow you to put them to practice using the SQL Interpreter.

SpoofingA technique used to gain unauthorized access to computers, whereby the

intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. To engage in IP spoofing, a hacker must first use a variety of techniques to find an IP address of a trusted host and then modify the packet headers so that it appears that the packets are coming from that host.

Email spoofing is when the sender changes the name in an outgoing email so that it looks like the email came from somewhere or someone else. This practice is often used by spammers to stop people finding out who they are. It also means that when the spam mail is rejected by the addressee's mail server, the bounce back message goes to whoever was specified in the outgoing mail rather than to the spammer themselves.

LAN and WAN

LAN - Local Area Network

A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and

Page 16: Practical File of Hos

59

occasionally a LAN will span a group of nearby buildings. In TCP/IP networking, a LAN is often but not always implemented as a single IP subnet.

In addition to operating in a limited space, LANs are also typically owned, controlled, and managed by a single person or organization. They also tend to use certain connectivity technologies, primarily Ethernet and Token Ring.

WAN - Wide Area Network

As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN, spanning the Earth.

A WAN is a geographically-dispersed collection of LANs. A network device called a router connects LANs to a WAN. In IP networking, the router maintains both a LAN address and a WAN address.

A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are not owned by any one organization but rather exist under collective or distributed ownership and management. WANs tend to use technology like ATM, Frame Relay and X.25 for connectivity over the longer distances.

ADSL ModemShort for asymmetric digital subscriber line, ADSL is a type of DSL

broadband communications technology used for connecting to the Internet. ADSL allows more data to be sent over existing copper telephone lines (POTS), when compared to traditional modem lines. A special filter, called a microfilter, is installed on a subscriber's telephone line to allow both ADSL and regular voice (telephone) services to be used at the same time. ADSL requires a special ADSL modem and subscribers must be in close geographical locations to the provider's central office to receive ADSL service. Typically this distance is within a radius of 2 to 2.5 miles. ADSL supports data rates of from 1.5 to 9 Mbps when receiving data (known as the downstream rate) and from 16 to 640 Kbps when sending data (known as the upstream rate).

Page 17: Practical File of Hos

59

Boot Partition and System Partition The boot partition is a disk partition that contains the boot sector and files

such as NTLDR that are needed for booting Windows XP and earlier. (Windows Vista and Windows Server 2008 use a newer boot loader called bootmgr that replaces NTLDR and is configured using BCDEdit.exe).

The system partition is the disk partition that contains the Windows operating system files and its support files, but not any files responsible for booting.

Write any 10 technical differences between Windows Vista and Windows 7.

1. Peripherals are integrated in a smoother manner:

Now, every time you plug in a plug and play device, you will be having a different experience each time. Because this time, Windows 7 has turned its peripheral detection and support, more device central rather than shooting just an auto-run option as it used to do in Windows 7 and windows Vista. This will be more helpful, when you will be using different kind of peripheral devices. By far, almost all kinds of devices will be supported with the necessary drivers. And as if its not enough, Windows 7 will help you find the website of your peripheral device's manufacturer, and allow you do more than what you could have done with the auto-run interface only. Just for an example, say you plug in a camera, Windows 7 might take you to that manufacturer's website, where you might be having an option of uploading your photos to an online album. Best thing is, you won't be running out of drivers for your peripheral devices, as Windows 7 has been included an ocean of such drivers, and if by chance the driver is not existent there, Windows 7 will find it over the net for you.

2. Very much improved UAC:

Page 18: Practical File of Hos

59

The only problem, that was always discussed in most of the forums, and many questions which remained unanswered, and so many users who left the with an unsatisfied soul; will all be changed. Finally, we will be getting rid of annoying overprotective dialogue box that used to appear almost all the time, even when you changed the cursor speed or installed a software; as Windows 7 has shed overprotective dialogue boxes but still maintaining the quality protection against malicious attacks. Windows 7 will only display messages when major settings are changed.

3. Brand new taskbar:

What do you have at your bottom right corner of the screen? a set of icons which keeps popping up balloons one after another, giving an illusion of fancy lighting in a wedding? Well, don't worry anymore; as in Windows 7 Microsoft has made sure that you have the complete authority to change the settings required and allow or disallow only the required icons and also change the settings for notifications that might appear on screen and probably annoy you. Even the small little triangle that used to expand into the taskbar revealing all programs that are running; is gotten rid of. Now at the same place, if you move your cursor, you'll be getting a list of processes that are running.

4. Super fast performance:

Probably this is the major improvement upon Vista, which will heighten the sales of Windows 7. Microsoft had promised that it would deliver an Operating System that would be much faster than Vista. And yes it did, when the beta version of 7 was released and was tested. Windows 7 has very few startups process, and hence unspoken of, loads very fast. And in fact there are very few processes that run in the background and eat up memory cycles. But, anyways, performance of final release is yet to be tested. But till then, 7 have been rocking.

5. Multi-touch in Win 7

Page 19: Practical File of Hos

59

With touch technology becoming the latest trend after Apple’s revolutionary multi-touch iPhone, Windows 7 has multi-touch for all the supported hardware. HP Touchsmart series is one of them.

6. Aero Peek

Aero Peek allows Win 7 users to instantly make all the opened windows transparent. So let say, you want to see the weather on Windows 7 sidebar Gadget, this will be very useful.

7. New Taskbar

Windows 7 desktop will look different now because of the new taskbar. You can now reorder the opened Window buttons. It has Jump Lists feature which will allow you to access common programs very easily. And you can see the full screen preview before switching to a window.

As you can see above, Quick Launch bar and taskbar are merged together in Windows 7.

8. Games

Along with old Windows Vista games, Win 7 will have online version of Checkers, Spades and Backgammon. If you remember, recently there was a new robot game Tinker on Vista. This was a part of Vista Ultimate.

9. Media Center

Page 20: Practical File of Hos

59

Win 7 comes with enhanced Media Center experience. It will have Internet TV which will telecast MSN channels by default and will have a desktop sidebar gadget for the same too.

10. Net Book Edition

Netbooks are the light weight portable laptops used for browsing, email etc. It seems that by this year end we’ll see Netbooks by every major Brand like HP, Dell, Sony etc. Windows 7, apart from Ultimate Edition and Business edition will also have Netbook Edition. Though, of course it’ll be a stripped down version.

11. Performance and User Friendliness

Windows 7 will tremendously reduce the time to install an app. Also, now Windows will be less annoying with very less UAC prompt. For developers also, Win7 will reduce the time taken for developing Windows app.

Write the comparison between Win NT Server and Windows 2003 Server?

Feature area Features that were added since Windows NT 4.0 and are updated in this release

Features that are new to the Windows Server 2003 family

Server reliability Improved memory management

Robust system architecture

Diagnostic tools

Safe Mode start

Recovery Console

Windows File Protection

Enhanced Backup

Automated System Recovery (ASR)

Compatibility Mode

Page 21: Practical File of Hos

59

utility

Server availability Server clusters

Network Load Balancing clusters

Fewer server restarts

Plug and Play

Start from mirrored volumes

User State Migration Tool

Emergency Management Services

Server scalability Hardware scalability

I2O support

Symmetric multiprocessing enhancements

Network Load Balancing

Server clusters

Enterprise Memory Architecture

Internet Information Services (IIS) 6.0

Server manageability IntelliMirror

Windows Management Instrumentation (WMI)

Remote Desktop for Administration

Remotely administered server support

Page 22: Practical File of Hos

59

Remote Installation Services (RIS)

Manage Your Server

User State Migration Tool

Emergency Management Services

Resultant Set of Policy (RSOP)

Authorization Manager

Performance and tuning features

Winsock Direct

I2O support

CPU throttling for Web applications or sites

Process Accounting for Web applications or sites

Predictable, end-to-end Quality of Service (QoS)

Network Load Balancing

New performance tools

Disk Defragmenter

Event Tracing enhancements

Performance Options

New command-line utilities for System Monitor

Page 23: Practical File of Hos

59

Authentication and smart card support

Full support for the Kerberos V5 protocol

Public key infrastructure (PKI), Certificate Services, and smart cards

Virtual private networking

Flexible, secure authentication and authorization

Internet Authentication Service (IAS)

Routing and Remote Access

Stored User Names and Passwords

Smart card access through Terminal Server

Additional security features

Encrypting File System (EFS)

Internet Protocol Security (IPSec)

TCP/UDP port ownership

Software restriction policies

Remote management Microsoft Management Console (MMC)

Scripting with Windows Script Host

Remote Installation

Remote Desktop for Administration

Remote assistance

Web Interface for Remote Administration (Windows Server

Page 24: Practical File of Hos

59

Services (RIS) 2003, Web Edition only)

Maintenance and product updates

Windows Update Does not apply

Internationalization features

Multilingual support

Multiregional support

New Phonetic Input Method Editor (IME) for Traditional Chinese

Active Directory Simplified user and network-resource management

Flexible, secure authentication and authorization

Directory consolidation

Directory-enabled applications and infrastructure

Scalability without complexity

Use of Internet standards

A powerful development environment

Replication and

For a list of the Active Directory features that are new in this release, see New features for Active Directory.

Page 25: Practical File of Hos

59

trust monitoring

Message Queuing distribution lists

Disk and file management features

Disk Management

Disk quota support

Distributed File System

Distributed Link Tracking

Distributed Authoring and Versioning (DAV)

High-performance content indexing

Encrypting File System (EFS)

Removable Storage and Remote Storage

Remote document sharing

Command-line support for disk management

GUID partition table (GPT). Available on all versions of Windows Server 2003 with Service Pack 1 (SP1) and on all versions of Windows Server 2003, x64 Edition.

Shadow copies of shared folders

Internet and e-mail services and features

Active Server Pages (ASP)

Windows Media Services

Web Distributed Authoring and Versioning (WebDAV)

Microsoft .NET Framework components

Internet Information Services (IIS) 6.0

Universal Description,

Page 26: Practical File of Hos

59

Application recycling

Discovery, and Integration (UDDI) Services

E-mail services (POP3, SMTP)

Windows Management Instrumentation (WMI) Provider

Features for collaboration Windows Media Services

Predictable, end-to-end Quality of Service (QoS)

Asynchronous transfer mode (ATM)

Microsoft .NET Framework

Audio Acceleration on the remote access server

Application support Widest range of turnkey applications

Comprehensive Internet application services

Microsoft Active Accessibility

TAPI 3.1

Transaction

Compatibility Mode

Web gardens in Internet Information Services (IIS)

Page 27: Practical File of Hos

59

services

Message Queuing

Component Services

Job objects

Host data integration

Management and deployment

Change and configuration management with Group Policy

Directory consolidation in Active Directory

IntelliMirror

Remote Installation Services (RIS)

Windows Management Instrumentation (WMI)

Side-by-side component sharing

Add or Remove Programs

Windows Installer

Application

Remotely administered server support

Resultant Set of Policy (RSOP)

Page 28: Practical File of Hos

59

management

Terminal Server features Centralized deployment of programs

Remote access to applications

Single application access

Terminal Services Manager

Remote control

Audio redirection

Development support Visual Studio .NET

Multilingual technology

Automatic generation of link IDs

Background Intelligent Transfer Service (BITS)

Network protocols and technologies

Winsock Direct

DHCP with DNS and Active Directory

Internet Connection Sharing (ICS)

Network Address Translation (NAT)

Simple Object Access Protocol (SOAP)

Fibre Channel support

Automatic configuration for multiple networks

Page 29: Practical File of Hos

59

Virtual private networking

Routing and Remote Access

Asynchronous transfer mode (ATM)

Web Digital Authoring and Versioning (WebDAV) redirector

Internet Authentication Service (IAS) as RADIUS proxy

Wireless networking

IP version 6 (IPv6)

Write the steps to install Novel Netware along with diagram?

Minimum System Requirements

A server-class PC with a Pentium* II or AMD* K7 processor256 MB of RAM (512 MB if running NPS)A Super VGA display adapterA DOS partition of at least 200 MB and 200 MB available space2 GB of available disk space outside the DOS partition for volume SYS:One network boardA CD driveA USB, PS/2*, or serial mouse (recommended but not required)

Recommended System Requirements

A multiprocessor PC with a least two Pentium III 700 MHz or higher processors512 MB of RAMA Super VGA or higher resolution display adapterA DOS partition with 1 GB of available space

Page 30: Practical File of Hos

59

4 GB of available disk space outside the DOS partitionOne or more network boardsA bootable CD drive that supports the El Torito specificationA USB, PS/2, or serial mouse

Upgrade System Requirements

The server to be upgraded must be running one of the following:NetWare 5.1 with Support Pack 2 or laterNetWare 5 with Support Pack 6 or laterNetWare 4.2 with Support Pack 8 or laterNetWare 4.0 with Support Pack 8 or laterA server-class PC with a Pentium II or AMD K7 processor256 MB of RAMA Super VGA display adapterA DOS partition with 35 MB of available space2 GB of available disk space on volume SYS:One network boardA CD driveA USB, PS/2, or serial mouse (recommended but not required)

Software and Other Requirements

NetWare 6 Operating System CDNetWare 6 License/Cryptography disketteSupervisor right at the [Root] of the eDirectoryTM treeSupervisor right to the container where the server will be installedRead right to the Security container object for the eDirectory treeDOS and CD drivers (required if the computer does not boot from CD) You can make a bootablefloppy diskette using the MKFLOPPY.BAT program located in the INSTALL directory of theNetWare 6 Operating System CD.Client connection utilities (optional, for installing from a network):Novell? ClientTM for DOS and Windows* 3.1x (optional, for installing from a NetWare server runningIPXTM).

Page 31: Practical File of Hos

59

IP Server Connection Utility (optional, for installing from a NetWare server running IP only). Forinstructions, see PRODUCTS\SERVERINST\IPCONN.TXT on the Novell Client CD.IP address and domain names (required for connecting to the Internet):An IP addressAn IP address of a domain name serverThe name of your domainNetwork board and storage device properties, such as the interrupt and port address (required if notincluded in NetWare)

Prepare the Network

Run NetWare Deployment Manager (NWDEPLOY.EXE), located on the NetWare 6 Operating System CD.Complete all relevant tasks in the Prepare the Network section.

STEPS

(1)Choose ACCEPT LICENSE AGREEMENT and hit [ENTER] to continue.

(2) In this instance we want to create everything fresh with this NetWare 6 installation. Therefore, choose the option to CREATE A NEW BOOT PARTITION and hit [ENTER] to continue.

Page 32: Practical File of Hos

59

(3) The size of the boot partition can be modified if desired. I have heard it suggested that you have twice the disk space as you do RAM on your server. However, I have found that if you need to take a core dump of your server your disk space can be as little as half the amount of RAM on your system so long as you take the core dump without file cache. Select CONTINUE and hit [ENTER] to move on.

(4) Choose CONTINUE and hit [ENTER].

Page 33: Practical File of Hos

59

(5) After the new boot partition has been created, press any key to reboot the server.

(6) Now we are ready to start the installation. Hit [F10] to accept the license agreement.

(7) We want to modify this screen. EXPRESS is the type of install that comes up by default. We want to change this option to CUSTOM so we can select the basic web services to be installed. We will leave the other option at NEW SERVER. Choose CONTINUE and hit [ENTER].

Page 34: Practical File of Hos

59

(8) Accept the defaults, select CONTINUE, and hit [ENTER].

(9) Although it is not going to be covered in this training, it is important to note that if a language other than English is used, other products (such as NPS) will have a separate language configuration. For our purposes select CONTINUE and hit [ENTER].

(10) Accept the defaults, select CONTINUE, and hit [ENTER].

Page 35: Practical File of Hos

59

(11) Accept the defaults and hit [ENTER] to continue.

(12) Select the proper Network board and hit [ENTER] to continue.

(13) Create the desired size of the SYS volume and then hit [ENTER] to continue.

Page 36: Practical File of Hos

59

(14) Now enter in the name that you want for your server. The name of the server can either match the host name that you will be using or it can be different. For example, let's say that our server and host name are WEB and our domain is NOVELL.COM -- then our full DNS name would be WEB.NOVELL.COM and our server name would be WEB. The only advantage to this is that it makes it easier to remember which full DNS name belongs to which server. It is not required and will not be done with this install, but is mentioned as a common practice.

(15) Insert the license and select [NEXT] to continue.

Page 37: Practical File of Hos

59

(16) There are several services that can grow in size which may fill up your SYS volume. You may want to create another volume that will allow for this growth. Some of these services may include iFolder (file storage and log files), Apache (web site and log files), NES (web site and log files), NetStorage (file storage), etc. If you desire to create another volume, select the FREE SPACE section and select CREATE. Once the volume has been created, select [NEXT] to continue.

(17) I want you to pay close attention to the IP address that I am binding to my NIC. This will have significant impact later on during the install. Just remember that it ends with a 77.

Page 38: Practical File of Hos

59

(18) Remember in step 13 that we discussed the option of having the server name and the host name the same. Well to show the point that they don't have to be the same (and because my IP address is already registered with a DNS name that doesn't match the server), my server name will be NW6_TRAINING, my host name will be JHARMONTEST4, my domain will be PROVO.NOVELL.COM, and my full DNS name will be JHARMONTEST4.PROVO.NOVELL.COM.

(19) The most important thing to note here is that NetStorage can be adversely affected if time is not setup properly. I had a server that was two hours behind on

Page 39: Practical File of Hos

59

its time and a workstation that was unable to access NetStorage via IE (but could through Netscape) because the time on the server was behind the time on the workstation. This was the only time that I ever saw this issue, but I did want to mention it for reference sake.

(20) For this training we will select the option to create a NEW NDS TREE. Be aware that if you are installing NetWare 6 into an existing tree, certain things will need to be prepared before that happens. We already spoke about the issues with SSL, but there are also issues with SCHEMA. It is not the design of this training to go into these issues separately but rather to make you aware of potential downfalls during the install.

Page 40: Practical File of Hos

59

(21) Now we will need to put in the name of the tree and the top O as well as the admin's password.

(22) This next screen is just verifying your information. Select [NEXT] to continue.

Page 41: Practical File of Hos

59

(23) Select the license and click [NEXT] to continue.

(24) Here we are just asking where you want to install the license. For this training, accept the default and click [NEXT] to continue.

(25) The only services which are selected but can't be seen are iPrint and the NetWare Enterprise Web Server (NES). I want to stress selecting these products

Page 42: Practical File of Hos

59

because of the impact they can have on Web Infrastructure. Novell Advance Audit Services was left selected by mistake in this screen shot. Although it will have no affect on the products being installed, you don't need to select it for this training. Be sure the following products are selected then click [NEXT] to continue.- NetWare Enterprise Server- iPrint- NetWare FTP Server- NetWare Web Search- NetWare WebAccess- Novell iFolder Storage Services- Novell NetStorage

(26) Single IP Address VS. Multiple IP Address.

Page 43: Practical File of Hos

59

(26a) Single IP address option

(26b) Multiple IP address option

(27) This next screen just shows the components that will be installed. Click [NEXT] to continue.

Page 44: Practical File of Hos

59

(28) In this situation you will notice that we are creating a CA. The reason for this is because this is the first server into the tree. If the CA is properly installed then you won't have many of the issues that can occur with SSL. If the CA portion of the screen is grayed out then you already have a CA. If you already have one then make sure that it is functioning properly before you continue. For our training installation, this will be the only server in the tree so the CA should be fine.

(29) This section has caused much confusion. The warning on this screen explains that if you select this option it will create a security risk. Well, that is true to a point and we will discuss this in much more detail under the deployment section, but let's quickly discuss the advantages, disadvantages, and when we should and should not deploy this option. To do this we will look at an example of a product that uses LDAP for its communication.

Page 45: Practical File of Hos

59

(30) First thing to note is that this in NOT GroupWise WebAccess. NetWare WebAccess was built off of Novell Portal Services. It ships with a few basic gadgets that provide services such as file access, email, printing, address book, etc. To create the objects needed to configure and run this service, we will need to decide where the WebAccess container will reside. You cannot change the name of the container. It will remain WebAccess.

(31) When you choose the option of multiple IP address vs. single IP address, make sure you know which service (Apache or Enterprise) will be running the NetWare 6 home page. NetWare WebAccess will reference several files that are contained within that same location. If the default configuration is kept and the NetWare 6 home page information is hosted by NES, NetWare WebAccess will

Page 46: Practical File of Hos

59

require configuration after the installation is complete. The reason for this is that the NetWare WebAccess configuration will point to Apache by default.

(32) A very common issue is related to the screen shown above. What this is basically saying is that there are some template files that are required in order for NetWare WebAccess to be able to pull in the information from GroupWise WebAccess. If the files are not copied out to the proper location, or if they are not copied at all, then the users will receive the error that webaccess is unreachable.

(33) iFolder Server Options (33a) Let's start with the User Data location in this screen. This is where the files are going to be stored for each user's iFolder

Page 47: Practical File of Hos

59

account. If you leave this on the SYS volume, you have the potential of filling up your SYS volume.

(34) If I can stress anything here it would be rights. In order for you to create this object and to properly assign roles you will need to be installing the server with rights to the root of the tree.

Page 48: Practical File of Hos

59

(35) NetStorage is a new type of configuration. Most of its configuration is done in the registry. In order to be able to edit that information after that installation is complete you will need to put on SP1.

(36) This screen is just giving you one last chance to back up and change anything if needed. Click [NEXT] to continue.

(37) After the installation has completed, be sure that you remove any diskette and CD from the server and then click YES to restart the server.

Page 49: Practical File of Hos

59

Write the steps to create a user and group in Windows NT server?

You must have system administrator permissions on the server to create user and group accounts on a Windows NT Server. Before you can create SQL Server logins and database roles, you should create the appropriate Windows NT accounts for users and groups that will be working with the team solutions.

To make managing solution users easier, it is recommended you create Windows NT group accounts corresponding to the database roles in your team solution. It is easier to manage only the Windows NT group account rather than managing SQL Server logins and database role membership for many users.

Creating a New Windows NT User Account

Because SQL Server uses Windows NT user authentication, your SQL Server users must have valid Windows NT accounts. Before creating SQL Server logins, use the following steps to create Windows NT user accounts.

In addition, before you can add users to Windows NT groups, each user must have a valid Windows NT domain account.

To create a new user account

1. From the Start menu, select Programs, then Administrative Tools (Common), and then User Manager for Domains.

2. From the User menu, select New User.

3. Type appropriate information in the dialog box:

o In Username, type a user name.

o In Full Name, type the user's complete name.

o In Description, type a description of the user or the user account.

o In both Password and Confirm Password, type a password of up to 14 characters.

o Click to select or clear the check boxes for User Must Change Password at Next Logon, User Cannot Change Password, Password Never Expires, and Account Disabled.

Page 50: Practical File of Hos

59

4. To administer a Group, Profile, or Dialin associated with the New User box, click the button, and complete the dialog box that appears. Then click OK.

5. Click Add.

To add another user account, repeat steps 2 through 5.

Note The buttons available in the New User dialog box depend on whether you are administering domains or workstations.

The Groups, Profile, and Dialin buttons always appear.

The Hours, Logon From, and Account buttons appear only when you administer domains.

Creating a New Local Group Account

A local group name cannot be identical to any other group or user name on the domain or computer being administered. It can contain up to 256 uppercase or lowercase characters except for the backslash character (\).

You can add user accounts and global groups from this domain and from trusted domains.

To create a new local group

1. From the Start menu, select Programs, then Administrative Tools (Common), and then User Manager for Domains.

2. In the User Manager for Domains window, do one of the following:

o Select the user accounts you want as the initial members of the new group.

o Select any group to ensure no user accounts are initially selected.

3. From the User menu, click New Local Group.

4. In the Group Name field, type a name for the new group.

5. If necessary, click Show Full Names.

Page 51: Practical File of Hos

59

Note This can be a lengthy operation if the group is large.

6. In the Description field, type a description of the new group.

7. To add members, click Add, and then complete the Add Users and Groups dialog box.

8. To remove members from the new group, select one or more names in Members, and then click Remove.

Creating a New Global Group Account

The New Global Group option is unavailable when Low Speed Connection is selected or when you administer a computer running Windows NT Workstation or a Windows NT Server that is not a domain controller.

To create a new global group

1. From the Start menu, select Programs, then Administrative Tools (Common), and then User Manager for Domains.

2. In the User Manager for Domains window, do one of the following:

o Select the user accounts you want as the initial members of the new group.

o Select any group to ensure no user accounts are initially selected.

3. From the User menu, select New Global Group.

4. In the Group Name field, type a group name.

5. In the Description field, type a description for the group.

6. To add members, select one or more user accounts in Not Members, and then click Add.

7. To remove members from the new group, select one or more user accounts in Members, and then click Remove.

Page 52: Practical File of Hos

59

Installation steps of window NT 4.01. Insert your Windows NT 4.0 CD and Disk 1 of your 3

NT Workstation setup disks2. Once this is done boot up system.

The following "Hardware Configuration" will appear and Windows NT will detect your hardware configuration.

Soon you will be prompted to Insert NT setup disk 2, does this and hit enter.

Now the "Welcome to Setup"  menu will appear, press "ENTER" to start Install.

You will be now prompted to search for mass storage devices (CD-Rom in most cases), press enter to continue or "S" if you have a SCSI device.

Now insert disk 3 of your Win NT Workstation setup.

Windows has found a CD-Rom. Press enter to continue. If you have SCSI devices you will have to hit "S" to specify.

Now the NT License agreement, Click on page down until you get to the bottom

Now the "Components" menu. The standard setting that NT now picks should be ok,  make changes if needed else hit "ENTER" to  continue.

Win NT has now detected your hard drive. This, if it has been setup before will have to be deleted if you are looking to install a Fresh operating system. Press "D" to delete the partition that is highlighted.

****MAKE SURE YOU HAVE BACKED UP BEFORE DELETING ANYTHING****

You are now given your  last chance to not delete a  partition. To continue Press "ENTER"

Actually there is another last chance, which appears in the next menu. Press "L" and the contents of that drive/partition are gone.

Now the partition  menu appears, Press C to create a partition..

Page 53: Practical File of Hos

59

You will now be asked size of Hard drive, default is Max space on your hard drive.

As we are going to use FAT16 you will set up the drive to any size below 2048mb. Click enter when happy with size.

The partition is setup. We recommend that you leave any remaining space until later, when in windows, otherwise you can setup the remaining space by following the steps we just did for the main drive.

You will now be asked how you wish the drive to be formated, we recommend FAT for most users, for more security use NTFS.

Setup will now format your Hard drive partition

You will now be asked where you wish NT to be installed, unless doing a parallel install leave the default and hit "ENTER"

The next page will now appear, we advise that you let setup run the tests, hit "ENTER" to continue.

Be patient while it examines your system.

Setup will then copy files

Part of setup is now complete. You will now remove any floppy disks or CD's in the drives and hit "ENTER" to reboot your  system

Hit enter to continue from the startup menu.

You will now be prompted for the NT CD again, please insert and when  drive is ready click "OK"

NT will copy more files....

Then when the "Windows NT Setup" screen appears click "NEXT" to continue....

Now your setup options, for normal users select typical and for laptop users select portable, then click next

Now fill in your name and organization, click on next to continue...

Now enter your certificate of Authenticity, click enter to continue

Page 54: Practical File of Hos

59

Now your OEM number which is your CERTIFICATE of AUTHENTICITY which located on your Windows NT manual.

And now enter the name by which you wish the computer to be known, click on enter to continue...

And now the all important Admin password, enter it and then enter it again to confirm it, make sure you don't forget it or you'll not get into windows. Or you could leave it blank, then you will not need it for entering windows. 

Click next to continue.

 Windows NT will now prompt you to make Emergency Repair Disk. It is up to you if you wish to create these, make your selection and click next.

Leave the "NT Components" at default, click next  to continue.

Now NT Network, click next to continue...

The "NT Network" menu shall appear, we recommend you select "do not connect" option and hit next,  you are best setting up networks when NT is installed.

Now Click on finish to continue

Now select your time zone, click apply and close when finished.

Now your display adapter, don't install until you get into windows, so click on "OK" and then "OK" again.

NT will then continue to copy files and finally completed, click on "RESTART COMPUTER" to continue, remove any CD and floppy disks first.

After rebooting you will arrive at the login screen, press "CTRL"  and "ALT" and "DELETE" to enter password section

Now enter your password and press "ENTER", if you didn't set one just press "ENTER"

At last the desktop.... NT Installed, you can now start configuring and  installing drivers for personal use in the control panel

Page 55: Practical File of Hos

59

Draw neat and clean diagrams for all the levels of RAID?

RAID is a technology that is used to increase the performance and/or reliability of data storage. The abbreviation stands for Redundant Array of Inexpensive Disks. A RAID system consists of two or more disks working in parallel. These disks can be hard discs but there is a trend to also use the technology for solid state drives. There are different RAID levels, each optimized for a specific situation. These are not standardized by an industry group or standardisation committee. This explains why companies sometimes come up with their own unique numbers and implementations.

RAID level 0 – Striping

In a RAID 0 system data are split up in blocks that get written across all the drives in the array. By using multiple disks (at least 2) at the same time, this offers superior I/O performance. This performance can be enhanced further by using multiple controllers, ideally one controller per disk.

Advantages RAID 0 offers great performance, both in read and writes operations. There

is no overhead caused by parity controls. All storage capacity is used, there is no disk overhead.

Page 56: Practical File of Hos

59

The technology is easy to implement.

Disadvantages

RAID 0 is not fault-tolerant. If one disk fails, all data in the RAID 0 array are lost. It should not be used on mission-critical systems.

Ideal use

RAID 0 is ideal for non-critical storage of data that have to be read/written at a high speed, such as on a Photoshop image retouching station.

RAID level 1 – Mirroring

Data are stored twice by writing them to both the data disk (or set of data disks) and a mirror disk (or set of disks) . If a disk fails, the controller uses either the data drive or the mirror drive for data recovery and continues operation. You need at least 2 disks for a RAID 1 array.

RAID 1 systems are often combined with RAID 0 to improve performance. Such a system is sometimes referred to by the combined number: a RAID 10 system.

Page 57: Practical File of Hos

59

Advantages RAID 1 offers excellent read speed and a write-speed that is comparable to

that of a single disk. In case a disk fails, data do not have to be rebuild, they just have to be

copied to the replacement disk. RAID 1 is a very simple technology.

Disadvantages The main disadvantage is that the effective storage capacity is only half of

the total disk capacity because all data get written twice. Software RAID 1 solutions do not always allow a hot swap of a failed disk

(meaning it cannot be replaced while the server keeps running). Ideally a hardware controller is used.

Ideal use

RAID-1 is ideal for mission critical storage, for instance for accounting systems. It is also suitable for small servers in which only two disks will be used.

RAID level 3

On RAID 3 systems, data blocks are subdivided (striped) and written in parallel on two or more drives. An additional drive stores parity information. You need at least 3 disks for a RAID 3 array.

Page 58: Practical File of Hos

59

Since parity is used, a RAID 3 stripe set can withstand a single disk failure without losing data or access to data.

Advantages RAID-3 provides high throughput (both read and write) for large data

transfers. Disk failures do not significantly slow down throughput.

Disadvantages This technology is fairly complex and too resource intensive to be done in

software. Performance is slower for random, small I/O operations.

Ideal use

RAID 3 is not that common in prepress.

RAID level 5

RAID 5 is the most common secure RAID level. It is similar to RAID-3 except that data are transferred to disks by independent read and write operations (not in parallel). The data chunks that are written are also larger. Instead of a dedicated parity disk, parity information is spread across all the drives. You need at least 3 disks for a RAID 5 array.A RAID 5 array can withstand a single disk failure without losing data or access to data. Although RAID 5 can be achieved in software, a hardware controller is recommended. Often extra cache memory is used on these controllers to improve the write performance.

Page 59: Practical File of Hos

59

Advantages

Read data transactions are very fast while write data transaction are somewhat slower (due to the parity that has to be calculated).

Disadvantages Disk failures have an effect on throughput, although this is still acceptable. Like RAID 3, this is complex technology.

Ideal use

RAID 5 is a good all-round system that combines efficient storage with excellent security and decent performance. It is ideal for file and application servers.

RAID level 10 – Combining RAID 0 & RAID 1

RAID 10 combines the advantages (and disadvantages) of RAID 0 and RAID 1 in one single system. It provides security by mirroring all data on a secondary set of disks (disk 3 and 4 in the drawing below) while using striping across each set of disks to speed up data transfers.

Page 60: Practical File of Hos

59