Professional Documents
Culture Documents
I did work in HCL as a Desktop Engineer for 1 year and worked as a Solaris Administrator for 3
year and as a Storage Administrator for 1 year in Infosys. Presently working as a Storage
administrator since 3 years in current Organization
I am having working experience on EMC DMX-3/4 Arrays, Clariion CX series Arrays, IBM Storage,
SRDF, TimeFinder, Snapshots, clone, mirro view, symcli, ECC, Replication Manager, Zoning,
managing cisco and brocade switches, Windows, Linux and Solaries platforms, etc..
I have done Engineering in Computer Science from Andhra University In the year of 2002 with
the 78% of marks, completed Intermediate in the year of 1998 with the 70% of marks,
completed X Class in the year of 1996 with the 68% of marks
Example:
Monitoring alerts using Monitoring Tool like EMC Control Center
Example:
Performing Zoning
Example:
Tell him the reason why do you want to leave the present company, keep in mind that the
answer should be positive.
Example:
Career growth.
Normal Data management Enhanced Data Management server using File Classification
server Infrastructure (FCI)
Difference between Windows Server 2008 R2 and Windows Server 2012 completed
Virtual processors/VM 64 4
Virtual processors/VMs 64 4
1. Nano Server
2. UEFI Secure Boot
3. The Resilient File System (ReFS)
4. Server & Hyper V Container
5. Nested Virtualization
6. Hyper V Hot-Add Virtual Hardware, to
add any hardware into VM while its
runing
7. Shielded VMs
8. PowerShell direct to the Hyper V host
IPAM (IP Address Management) IPAM is a means of planning, tracking, and managing the
Internet Protocol address space used in a network.
ReFS (Resilient File System) :- Short for “Resilient File System”, ReFS is a new file system built
using code from the current NTFS file system. At the moment, ReFS is not just a replacement
for NTFS. ReFS Protects Against Data Corruption
Active Directory Certificate Services (ADCS) – enables Windows Server 2012 to provide
certificates to clients and servers.
Active Directory Domain Services (ADDS) – configures server to host Active Directory database,
and to use this database to authenticate users to logon to the network and authorize their use
of resources.
Active Directory Federation Services (ADFS) – enables a Windows Server 2012 sever to use
login information for a variety of severs and services so that a single login provides users with
access to all resources.
Active Directory Lightweight Directory Services (ADLDS) – used to setup a small version of
Active Directory database for the purpose of Active Directory – integrated applications.
Active Directory Rights Management Services (ADRMS) – enables Active Directory to exchange
information with AD RMS- compatible software. Enabling an additional layer of security that
content owners can use to protect their documents. Content owners can specifically set
permissions that controls who can open, modify, forward or print each document.
Application Server – a server on which you have installed an server application such as
Microsoft SQL Server or Microsoft Exchange Server.
DHCP Server – enables a Windows server to automatically lease IP addresses to different clients
such as computers and printers instead of requiring you to manually configure each devices IP
address settings.
DNS Server – configures a Windows server to provide name resolution services the process by
which a computer finds a computer’s IP address based on a provide computer name.
FAX Server – a fax server sends and receives faxes for multiple users. When it receives faxes, a
fax server forwards those faxes to the relevant users mailbox.
File and Storage Services – a server service, used to manage access to files on the server. Also
used to implement Distributed File Services (DFS) and access to network storage.
Hyper-V – Hyper –V service is installed and configured to support the implementation of virtual
machines.
Print and Document Services – enables you to centrally manage printers and scanners, as well
as their queues on the network.
Network Policy and Access Services – enables you to secure remote access to the network,
meeting requirements that all remote users authenticate to the server running Network Policy
and Access Services before gaining access to the corporate network.
Remote Access - enables users to connect to the network remotely without requiring virtual
private network (VPN) connections.
Remote Desktop Services – enables a Windows server to provide access to virtual desktops,
session-based desktops, and applications that encompass Remote App.
Volume Activation Services – configures a Windows server to automate the process of tracking
volume license keys and their activation. The service can also be used to implement Key
Management Services (KMS) host or Active Directory-based license activation for domain
members.
Web Server (IIS) – enables the setup of a Windows server as a web server.
Windows Deployment Services (WDS) – a service used to install and configure Windows
operating systems across the network.
Windows Server Update Services (WSUS) – enables automated deployment of updates for
Microsoft products such as Windows and Microsoft Office.
IP Address Management (IPAM) Server – enables central management of both DHCP and DNS
servers. Can also be used to discover, monitor, and audit DHCP and DNS servers.
New Cmdlets – new cmdlets for configuring and managing Active Directory replication and
replication topology.
Resilient File System (ReFS) – included in Windows Server 2012 is this new file system provides
enhanced reliability, better data integrity, and compatibility with existing API’s and file system
filters.
Revised Task Manager – The new Task Manager includes a new Processes Tab, enabling you to
identify the processes that are consuming server resources.
User interface – you are prompted during installation whether you want to install a Server Core
installation, a Minimal Server Interface, a server with a graphical user interface (GUI), or full
desktop experience interface. After installing a server different options can be chosen by using
PowerShell cmdlets.
Windows BrancheCache® - a bandwidth optimization technology designed to optimize the
traffic on a wide area network (WAN). BranchCache optimizes performance by caching content
from a headquarters office and storing it locally on the BranchCache Server.
What is the difference between Server Roles and Features?
A server, consist of one or more programs that enable a server to perform a specific function
for users and/or computers on a network.
In contrast, features are applications that can increase the functions the server can perform.
Features can add support or add functions, to server roles. In many cases, a single role contains
a number of features.
The following are new Windows Server 2008 R2 Hyper-V features that were also in the
R2 beta.
Live Migration
Jumbo Frame Support
Hot Add/Remove of storage (VHDs and Pass Through Disks)
Second Level Address Translation (SLAT) processor support for both Intel (EPT) and
AMD (RVI)
Core Parking
Improved network performance via support for TCP Chimney and VMQ (specific
hardware NICs required)
Improved VHD performance for dynamic and difference disks.
1 2008 is combination of vista and windows 2003r2. Some new services are introduced in it
1. RODC one new domain controller introduced in it [Read-only Domain controllers.]
2. WDS (windows deployment services) instead of RIS in 2003 server
3. shadow copy for each and every folders
4.boot sequence is changed
5.installation is 32 bit where as 2003 it is 16 as well as 32 bit, that’s why installation of 2008 is
faster
6.services are known as role in it
7. Group policy editor is a separate option in ads
2) The main difference between 2003 and 2008 is Virtualization, management.
2008 has more inbuilt components and updated third party drivers Microsoft introduces new
feature with 2k8 that is Hyper-V Windows Server 2008 introduces Hyper-V (V for Virtualization)
but only on 64bit versions. More and more companies are seeing this as a way of reducing
hardware costs by running several ‘virtual’ servers on one physical machine. If you like this
exciting technology, make sure that you buy an edition of Windows Server 2008 that includes
Hyper-V, then launch the Server Manger, add Roles.
The above command will allow you to access the database using port 10289.
Now you can use LDP.exe tool to connect to this mounted instance.
4. Disconnecting from the Active Directory snapshot:
In order to disconnect from the AD snapshot all you need to do is to type CTRL+C at the
DSAMAIN command prompt window. You’ll get a message indicating that the DS shut down
successfully.
What are some of the new tools and features provided by Windows Server 2008?
Windows Server 2008 now provides a desktop environment similar to Microsoft Windows Vista
and includes tools also found in Vista, such as the new backup snap-in and the BitLocker drive
encryption feature. Windows Server 2008 also provides the new IIS7 web server and the
Windows Deployment Service.
What are the different editions of Windows Server 2008?
The entry-level version of Windows Server 2008 is the Standard Edition. The Enterprise Edition
provides a platform for large enterprisewide networks. The Datacenter Edition provides support
for unlimited Hyper-V virtualization and advanced clustering services. The Web Edition is a
scaled-down version of Windows Server 2008 intended for use as a dedicated web server. The
Standard, Enterprise, and Datacenter Editions can be purchased with or without the Hyper-V
virtualization technology.
What two hardware considerations should be an important part of the planning process for a
Windows Server 2008 deployment?
Any server on which you will install Windows Server 2008 should have at least the minimum
hardware requirement for running the network operating system. Server hardware should also
be on the Windows Server 2008 Hardware Compatibility List to avoid the possibility of
hardware and network operating system incompatibility.
What are the options for installing Windows Server 2008?
You can install Windows Server 2008 on a server not currently configured with NOS, or you can
upgrade existing servers running Windows 2000 Server and Windows Server 2003.
How do you configure and manage a Windows Server 2008 core installation?
This stripped-down version of Windows Server 2008 is managed from the command line.
Which Control Panel tool enables you to automate the running of server utilities and other
applications?
The Task Scheduler enables you to schedule the launching of tools such as Windows Backup
and Disk Defragmenter.
What are some of the items that can be accessed via the System Properties dialog box?
You can access virtual memory settings and the Device Manager via the System Properties
dialog box.
When a child domain is created in the domain tree, what type of trust relationship exists
between the new child domain and the trees root domain?
Child domains and the root domain of a tree are assigned transitive trusts. This means that the
root domain and child domain trust each other and allow resources in any domain in the tree to
be accessed by users in any domain in the tree.
What is the primary function of domain controllers?
The primary function of domain controllers is to validate users to the network. However,
domain controllers also provide the catalog of Active Directory objects to users on the network.
What are some of the other roles that a server running Windows Server 2008 could fill on the
network?
A server running Windows Server 2008 can be configured as a domain controller, a file server, a
print server, a web server, or an application server. Windows servers can also have roles and
features that provide services such as DNS, DHCP, and Routing and Remote Access.
Which Windows Server 2008 tools make it easy to manage and configure a servers roles and
features?
The Server Manager window enables you to view the roles and features installed on a server
and also to quickly access the tools used to manage these various roles and features. The Server
Manager can be used to add and remove roles and features as needed.
What Windows Server 2008 service is used to install client operating systems over the
network?
Windows Deployment Services (WDS) enables you to install client and server operating systems
over the network to any computer with a PXE-enabled network interface.
What domain services are necessary for you to deploy the Windows Deployment Services on
your network?
Windows Deployment Services requires that a DHCP server and a DNS server be installed in the
domain
How is WDS configured and managed on a server running Windows Server 2008?
The Windows Deployment Services snap-in enables you to configure the WDS server and add
boot and install images to the server.
What is the difference between a basic and dynamic drive in the Windows Server 2008
environment?
A basic disk embraces the MS-DOS disk structure; a basic disk can be divided into partitions
(simple volumes).
Dynamic disks consist of a single partition that can be divided into any number of volumes.
Dynamic disks also support Windows Server 2008 RAID implementations.
What is RAID in Windows Server 2008?
RAID, or Redundant Array of Independent Disks, is a strategy for building fault tolerance into
your file servers. RAID enables you to combine one or more volumes on separate drives so that
they are accessed by a single drive letter. Windows Server 2008 enables you to configure RAID 0
(a striped set), RAID 1 (a mirror set), and RAID 5 (disk striping with parity).
What conceptual model helps provide an understanding of how network protocol stacks such
as TCP/IP work?
The OSI model, consisting of the application, presentation, session, transport, network, data
link, and physical layers, helps describe how data is sent and received on the network by
protocol stacks.
What protocol stack is installed by default when you install Windows Server 2008 on a
network server?
TCP/IP (v4 and v6) is the default protocol for Windows Server 2008. It is required for Active
Directory implementations and provides for connectivity on heterogeneous networks.
How is a server running Windows Server 2008 configured as a domain controller, such as the
domain controller for the root domain or a child domain?
Installing the Active Directory on a server running Windows Server 2008 provides you with the
option of creating a root domain for a domain tree or of creating child domains in an existing
tree. Installing Active Directory on the server makes the server a domain controller.
What are some of the tools used to manage Active Directory objects in a Windows Server
2008 domain?
When the Active Directory is installed on a server (making it a domain controller), a set of
Active Directory snap-ins is provided. The Active Directory Users and Computers snap-in is used
to manage Active Directory objects such as user accounts, computers, and groups. The Active
Directory Domains and Trusts snap-in enables you to manage the trusts that are defined
between domains. The Active Directory Sites and Services snap-in provides for the management
of domain sites and subnets.
How are domain user accounts created and managed?
The Active Directory Users and Computers snap-in provides the tools necessary for creating
user accounts and managing account properties. Properties for user accounts include settings
related to logon hours, the computers to which a user can log on, and the settings related to
the user’s password.
What type of Active Directory objects can be contained in a group?
A group can contain users, computers, contacts, and other nested groups.
What type of group is not available in a domain that is running at the mixed-mode functional
level?
Universal groups are not available in a mixed-mode domain. The functional level must be raised
to Windows 2003 or Windows 2008 to make these groups available.
What types of Active Directory objects can be contained in an Organizational Unit?
Organizational Units can hold users, groups, computers, contacts, and other OUs. The
Organizational Unit provides you with a container directly below the domain level that enables
you to refine the logical hierarchy of how your users and other resources are arranged in the
Active Directory.
What are Active Directory sites in Windows Server 2008?
Active Directory sites are physical locations on the network’s physical topology. Each regional
domain that you create is assigned to a site. Sites typically represent one or more IP subnets
that are connected by IP routers. Because sites are separated from each other by a router, the
domain controllers on each site periodically replicate the Active Directory to update the Global
Catalog on each site segment.
Can servers running Windows Server 2008 provide services to clients when they are not part
of a domain?
Servers running Windows Server 2008 can be configured to participate in a workgroup. The
server can provide some services to the workgroup peers but does not provide the security and
management tools provided to domain controllers.
What does the use of Group Policy provide you as a network administrator?
Group Policy provides a method of controlling user and computer configuration settings for
Active Directory containers such as sites, domains, and OUs. GPOs are linked to a particular
container, and then individual policies and administrative templates are enabled to control the
environment for the users or computers within that particular container.
What tools are involved in managing and deploying Group Policy?
GPOs and their settings, links, and other information such as permissions can be viewed in the
Group Policy Management snap-in.
How do you deal with Group Policy inheritance issues?
GPOs are inherited down through the Active Directory tree by default. You can block the
inheritance of settings from upline GPOs (for a particular container such as an OU or a local
computer) by selecting Block Inheritance for that particular object. If you want to enforce a
higher-level GPO so that it overrides directly linked GPOs, you can use the Enforce command on
the inherited (or upline) GPO.
How can you make sure that network clients have the most recent Windows updates
installed and have other important security features such as the Windows Firewall enabled
before they can gain full network access?
You can configure a Network Policy Server (a service available in the Network Policy and Access
Services role). The Network Policy Server can be configured to compare desktop client settings
with health validators to determine the level of network access afforded to the client.
What is the purpose of deploying local DNS servers?
A domain DNS server provides for the local mapping of fully qualified domain names to IP
addresses. Because the DNS is a distributed database, the local DNS servers can provide record
information to remote DNS servers to help resolve remote requests related to fully qualified
domain names on your network.
In terms of DNS, what is a caching-only server?
A caching-only DNS server supplies information related to queries based on the data it contains
in its DNS cache. Caching-only servers are often used as DNS forwarders. Because they are not
configured with any zones, they do not generate network traffic related to zone transfers.
How the range of IP addresses is defined for a Windows Server 2008 DHCP server?
The IP addresses supplied by the DHCP server are held in a scope. A scope that contains more
than one subnet of IP addresses is called a superscope. IP addresses in a scope that you do not
want to lease can be included in an exclusion range.
RAID 0, RAID 1, RAID 5, and RAID 10 Explained with Diagrams
by Ramesh Natarajan on August 10, 2010
RAID stands for Redundant Array of Inexpensive (Independent) Disks.
On most situations you will be using one of the following four levels of RAIDs.
RAID 0
RAID 1
RAID 5
RAID 10 (also known as RAID 1+0)
This article explains the main difference between these raid levels along with an easy to
understand diagram.
Follo
wing are the key points to remember for RAID level 10.
Minimum 4 disks.
This is also called as “stripe of mirrors”
Excellent redundancy ( as blocks are mirrored )
Excellent performance ( as blocks are striped )
If you can afford the dollar, this is the BEST option for any mission critical applications
(especially databases).
Additional RAID Tutorials:
RAID 2, RAID 3, RAID 4, RAID 6 Explained with Diagram
In most critical production servers, you will be using either RAID 5 or RAID 10.
However there are several non-standard raids, which are not used except in some rare
situations. It is good to know what they are.
RAID 6
Just like RAID 5, this does block level striping. However, it uses dual parity.
In the above diagram A, B, C are blocks. p1, p2, p3 are parities.
This creates two parity blocks for each data block.
Can handle two disk failure
This RAID configuration is complex to implement in a RAID controller, as it has to
compressed
LTO Tape Native capacity
LTO 3 400 GB 800 GB
LTO 4 800GB 1.6 TB
LTO 5 1.6 TG 3.TB
LTO 6 3 TB 5 TB
I’m going to keep this explanation very simple for you to understand the basic concepts well. In
the following diagrams A, B, C, D, E and F represents blocks.
RAID 10
RAID 10 is also called as RAID 1+0
It is also called as “stripe of mirrors”
It requires minimum of 4 disks
To understand this better, group the disks in pair of two (for mirror). For example, if you
have a total of 6 disks in RAID 10, there will be three groups–Group 1, Group 2, Group 3 as
shown in the above diagram.
Within the group, the data is mirrored. In the above example, Disk 1 and Disk 2 belongs
to Group 1. The data on Disk 1 will be exactly same as the data on Disk 2. So, block A written
on Disk 1 will be mirroed on Disk 2. Block B written on Disk 3 will be mirrored on Disk 4.
Across the group, the data is striped. i.e Block A is written to Group 1, Block B is written
to Group 2, Block C is written to Group 3.
This is why it is called “stripe of mirrors”. i.e the disks within the group are mirrored.
But, the groups themselves are striped.
If you are new to this, make sure you understand how RAID 0, RAID 1 and RAID 5 and RAID 2,
RAID 3, RAID 4, RAID 6 works.
RAID 01
What is a Cluster?
Cluster is a group of machines acting as a single entity to provide resources and services to the
network. In time of failure, a failover will occur to a system in that group that will maintain
availability of those resources to the network.
A failover cluster is a group of independent computers, or nodes, that are physically connected
by a local-area network (LAN) or a wide-area network (WAN) and that are programmatically
connected by cluster software. The group of nodes is managed as a single system and shares a
common namespace. The group usually includes multiple network connections and data
storage connected to the nodes via storage area networks (SANs). The failover cluster operates
by moving resources between nodes to provide service if system components fail.
Normally, if a server that is running a particular application crashes, the application will be
unavailable until the server is fixed. Failover clustering addresses this situation by detecting
hardware or software faults and immediately restarting the application on another node
without requiring administrative intervention—a process known as failover. Users can continue
to access the service and may be completely unaware that it is now being provided from a
different server
Active/Passive is defined as a cluster group where one server is handling the entire load and, in
case of failure and disaster, a Passive node is standing by waiting for failover.
· One node in the failover cluster typically sits idle until a failover occurs. After a failover, this
passive node becomes active and provides services to clients. Because it was passive, it
presumably has enough capacity to serve the failed-over application without performance
degradation.
3. Active/Active failover cluster model
All nodes in the failover cluster are functioning and serving clients. If a node fails, the resource
will move to another node and continue to function normally, assuming that the new server has
enough capacity to handle the additional workload.
4. Resource. A hardware or software component in a failover cluster (such as a disk, an IP
address, or a network name).
5. Resource group.
A combination of resources that are managed as a unit of failover. Resource groups are logical
collections of cluster resources. Typically a resource group is made up of logically related
resources such as applications and their associated peripherals and data. However, resource
groups can contain cluster entities that are related only by administrative needs, such as an
administrative collection of virtual server names and IP addresses. A resource group can be
owned by only one node at a time and individual resources within a group must exist on the
node that currently owns the group. At any given instance, different servers in the cluster
cannot own different resources in the same resource group.
6. Dependency. An alliance between two or more resources in the cluster architecture.
7. Heartbeat.
The cluster’s health-monitoring mechanism between cluster nodes. This health checking allows
nodes to detect failures of other servers in the failover cluster by sending packets to each
other’s network interfaces. The heartbeat exchange enables each node to check the availability
of other nodes and their applications. If a server fails to respond to a heartbeat exchange, the
surviving servers initiate failover processes including ownership arbitration for resources and
applications owned by the failed server.
The heartbeat is simply packets sent from the Passive node to the Active node. When the
Passive node doesn’t see the Active node anymore, it comes up online
8. Membership. The orderly addition and removal of nodes to and from the cluster.
10. Cluster registry. The cluster database, stored on each node and on the quorum resource,
maintains configuration information (including resources and parameters) for each member of
the cluster.
Applications and services running on a server cluster can be exposed to users and workstations
as virtual servers. To users and clients, connecting to an application or service running as a
clustered virtual server appears to be the same process as connecting to a single, physical
server. In fact, the connection to a virtual server can be hosted by any node in the cluster. The
user or client application will not know which node is actually hosting the virtual server.
12. Shared storage.
All nodes in the failover cluster must be able to access data on shared storage. The highly
available workloads write their data to this shared storage. Therefore, if a node fails, when the
resource is restarted on another node, the new node can read the same data from the shared
storage that the previous node was accessing. Shared storage can be created with iSCSI, Serial
Attached SCSI, or Fibre Channel, provided that it supports persistent reservations.
13. LUN
LUN stands for Logical Unit Number. A LUN is used to identify a disk or a disk volume that is
presented to a host server or multiple hosts by a shared storage array or a SAN. LUNs provided
by shared storage arrays and SANs must meet many requirements before they can be used with
failover clusters but when they do, all active nodes in the cluster must have exclusive access to
these LUNs.
Storage volumes or logical unit numbers (LUNs) exposed to the nodes in a cluster must not be
exposed to other servers, including servers in another cluster. The following diagram illustrates
this.
Cluster resources are contained within a cluster in a logical set called a Services and
Applications group or historically referred to as a cluster group. Services and Applications
groups are the units of failover within the cluster. When a cluster resource fails and cannot be
restarted automatically, the Services and Applications group this resource is a part of will be
taken offline, moved to another node in the cluster, and the group will be brought back online.
15. Quorum
The cluster quorum maintains the definitive cluster configuration data and the current state of
each node, each Services and Applications group, and each resource and network in the cluster.
Furthermore, when each node reads the quorum data, depending on the information retrieved,
the node determines if it should remain available, shut down the cluster, or activate any
particular Services and Applications groups on the local node. To extend this even further,
failover clusters can be configured to use one of four different cluster quorum models and
essentially the quorum type chosen for a cluster defines the cluster. For example, a cluster that
utilizes the Node and Disk Majority Quorum can be called a Node and Disk Majority cluster.
A quorum is simply a configuration database for Microsoft Cluster Service, and is stored in the
quorum log file. A standard quorum uses a quorum log file that is located on a disk hosted on a
shared storage interconnect that is accessible by all members of the cluster
When network problems occur, they can interfere with communication between cluster nodes.
A small set of nodes might be able to communicate together across a functioning part of a
network, but might not be able to communicate with a different set of nodes in another part of
the network. This can cause serious issues. In this “split” situation, at least one of the sets of
nodes must stop running as a cluster.
To prevent the issues that are caused by a split in the cluster, the cluster software requires that
any set of nodes running as a cluster must use a voting algorithm to determine whether, at a
given time, that set has quorum. Because a given cluster has a specific set of nodes and a
specific quorum configuration, the cluster will know how many “votes” constitutes a majority
(that is, a quorum). If the number drops below the majority, the cluster stops running. Nodes
will still listen for the presence of other nodes, in case another node appears again on the
network, but the nodes will not begin to function as a cluster until the quorum exists again.
For example, in a five node cluster that is using a node majority, consider what happens if
nodes 1, 2, and 3 can communicate with each other but not with nodes 4 and 5. Nodes 1, 2, and
3 constitute a majority, and they continue running as a cluster. Nodes 4 and 5 are a minority
and stop running as a cluster, which prevents the problems of a “split” situation. If node 3 loses
communication with other nodes, all nodes stop running as a cluster. However, all functioning
nodes will continue to listen for communication, so that when the network begins working
again, the cluster can form and begin to run.
o Node Majority: Each node that is available and in communication can vote. The
cluster functions only with a majority of the votes, that is, more than half.
o Node and Disk Majority: Each node plus a designated disk in the cluster storage
(the “disk witness”) can vote, whenever they are available and in communication. The cluster
functions only with a majority of the votes, that is, more than half.
o Node and File Share Majority: Each node plus a designated file share created by
the administrator (the “file share witness”) can vote, whenever they are available and in
communication. The cluster functions only with a majority of the votes, that is, more than half.
o No Majority: Disk Only. The cluster has quorum if one node is available and in
communication with a specific disk in the cluster storage. Only the nodes that are also in
communication with that disk can join the cluster. This is equivalent to the quorum disk in
Windows Server 2003. The disk is a single point of failure, so only select scenarios should
implement this quorum mode.
– The witness disk is a disk in the cluster storage that is designated to hold a copy of the cluster
configuration database. (A witness disk is part of some, not all, quorum configurations.)
Multi-site cluster is a disaster recovery solution and a high availability solution all rolled into
one. A multi-site cluster gives you the highest recovery point objective (RTO) and recovery time
objective (RTO) available for your critical applications. With the introduction of Windows Server
2008 failover clustering a multi-site cluster has become much more feasible with the
introduction of cross subnet failover and support for high latency network communications.
The failover cluster feature is available in Windows Server 2008 R2 Enterprise and Windows
Server 2008 R2 Datacenter. The feature is not available in Windows Web Server 2008 R2 or
Windows Server 2008 R2 Standard
Network Considerations
All Microsoft failover clusters must have redundant network communication paths. This
ensures that a failure of any one communication path will not result in a false failover and
ensures that your cluster remains highly available. A multi-site cluster has this requirement as
well, so you will want to plan your network with that in mind. There are generally two things
that will have to travel between nodes: replication traffic and cluster heartbeats. In addition to
that, you will also need to consider client connectivity and cluster management activity
Quorum model:
Add the Failover Clustering feature to both nodes of your cluster. Follow the below steps:
1. Click Start, click Administrative Tools, and then click Server Manager. (If the User Account
Control dialog box appears, confirm that the action it displays is what you want, and then click
Continue.)
2. In Server Manager, under Features Summary, click Add Features. Select Failover Clustering,
and then click Install
3. Follow the instructions in the wizard to complete the installation of the feature. When the
wizard finishes, close it.
4. Repeat the process for each server that you want to include in the cluster.
5. Next you will want to have a look at your network connections. It is best if you rename the
connections on each of your servers to reflect the network that they represent. This will make
things easier to remember later.
Go to properties of Cluster (or private) network and check out register the connection’s
addresses in DNS.
6. Next, go to Advanced Settings of your Network Connections (hit Alt to see Advanced Settings
menu) of each server and make sure the Public network (LAN) is first in the list:
7. Your private network should only contain an IP address and Subnet mask. No Default
Gateway or DNS servers should be defined. Your nodes need to be able to communicate across
this network, so make sure the servers can communicate across this network; add static routes
if necessary.
3. we need this cluster to be supported so we must run all the needed tests
Note: This is also the computer name that will need permission to the File Share Witness as
described later in this document.
First, we need to identify the server that will hold our File Share witness. This File Share witness
should be located in a 3rd location, accessible by both nodes of the cluster. Once you have
identified the server, share a folder as you normally would share a folder. In my case, I create a
share called MYCLUSTER on a server named NYDC01
The key thing to remember about this share is that you must give the cluster computer name
read/write permissions to the share at both the Share level and NTFS level permissions. You
will need to make sure you give the cluster computer account read/write permissions in both
shared and NTFS for MYCLUSTER share.
Now with the shared folder in place and the appropriate permissions assigned, you are ready to
change your quorum type. From Failover Cluster Manager, right-click on your cluster, choose
More Actions and Configure Cluster Quorum Settings.
On the next screen choose Node and File Share Majority and click Next.
In this screen, enter the path to the file share you previously created and click Next.
Confirm that the information is correct and click Next till summary page and click Finish.
Now when you view your cluster, the Quorum Configuration should say “Node and File Share
Majority” as shown below.
The steps I have outlined up until this point apply to any multi-site cluster, whether it is a SQL,
Exchange, File Server or other type of failover cluster. The next step in creating a multi-site
cluster involves integrating your storage and replication solution into the failover cluster
Ans:- A GPO (Group Policy Object) is a collection of Group Policy settings, it consists of GPC and
GPT.
GPC (Group Policy Container) contains the information of property of GPO like Security
Filtering, GPO Status, and GPO GUID etc.
GPT (Group Policy Template) contains the data of GPO in Sysvol folder that can be checked
after the configuration of the GPO that what settings have been configured to the client.
Locator)
Ans:-
Dumpchk,exe
Ans:- You can use AD inbuilt features to troubleshoot group policy issue like RSOP.msc or can
run RSOP by selecting users in Active Directory users and computers, gpresult -v, gpt.ini in
sysvol under Group Policy GUID folder can be checked to find out the GPO settings configured
Q: What is a Domain?
A: A domain is defined as a logical group of network objects (computers, users, devices) that
share the same Active Directory database. A tree can have multiple domains.
Q: What is Domain Controller?
A: A domain controller (DC) or network domain controller is a Windows-based computer
system that is used for storing user account data in a central database. It is the centrepiece of
the Windows Active Directory service that authenticates users, stores user account information
and enforces security policy for a Windows domain.
A domain controller allows system administrators to grant or deny users access to system
resources, such as printers, documents, folders, network locations, etc., via a single username
and password.
Q: What is Group Policy?
A: Group Policy allows you to implement specific configurations for users and computers.
Group Policy settings are contained in Group Policy objects (GPOs), which are linked to the
following Active Directory service containers: sites, domains, or organizational units (OUs).
Q: What are GPOs (Group Policy Objects)?
A: A Group Policy Object (GPO) is a collection of settings that control the working environment
of user accounts and computer accounts. GPOs define registry-based policies, security options,
software installation and maintenance options, script options, and folder redirection options.
There are two kinds of Group Policy objects:
Q: What is LDAP?
A: LDAP (Light-Weight Directory Access Protocol) determines how an object in an Active
Directory should be named. LDAP is the industry standard directory access protocol, making
Active Directory widely accessible to management and query applications. Active Directory
supports LDAPv2 and LDAPv3.
Lightweight Directory Access Protocol is an Internet protocol that email and other programs
use to look up information from a server.
logical structure:
Schema partition, configuration partition, domain
partition and application partition
What domain services are necessary for you to deploy the Windows Deployment Services on
your network?
Windows Deployment Services requires that a DHCP server and a DNS server be installed in the
domain.
Domain naming master—ensures that any newly created domains are uniquely identified by
names that adhere to the proper naming conventions for new trees or child domains in existing
trees. Only one domain controller in the forest holds this role.
PDC emulator—Serves as a primary domain controller (PDC) for Windows NT 4.0 client
computers authenticating to the domain and processes any changes to user properties on these
clients, such as password changes. This server also acts as a time synchronization master to
synchronize the time on the remaining domain controllers in the domain. One domain
controller in each domain holds this role.
Infrastructure master—Updates references in its domain from objects such as domain group
memberships to objects in other domains. This server processes any changes in objects in the
forest received from global catalog servers and replicates these changes to other domain
controllers in its domain. One domain controller in each domain holds this role.
RID master—Assigns security identifiers (SIDs) to objects created in its domain. A SID consists of
a domain identifier common to all objects in its domain and a relative identifier (RID) that is
unique to each object. This server ensures that no two objects have the same RID and hands
out pools of RIDs to every domain controller in its domain. One domain controller in each
domain holds this role.
A basic disk embraces the MS-DOS disk structure; a basic disk can be divided into partitions
(simple volumes).
Dynamic disks consist of a single partition that can be divided into any number of volumes.
Dynamic disks also support Windows Server 2008 RAID implementations.
DNS servers use UDP port 53 but DNS queries can also use TCP port 53 if the former is not
accepted.
Q: What are main Email Servers and which are their ports?
The incoming mail server is the server associated with an email address account. There cannot
be more than one incoming mail server for an email account. In order to download your emails,
you must have the correct settings configured in your email client program.
Most outgoing mail servers use SMTP (Simple Mail Transfer Protocol) for sending emails. The
outgoing mail server can belong to your ISP or to the server where you setup your email
account.
* SMTP – port 25
* HTTP – port 80
1) Primary Zone
2) Secondary Zone
4) Stub Zone
DNS servers are used to resolve FQDN hostnames into IP addresses and vice versa
What is CIDR?
CIDR stands for classless inter domain routing. It was developed in the 1990s as a standard
scheme for routing network traffic across the Internet. It helps in preventing the wasting of IP
address and nowadays we are facing the shortage of the IP address. So this CIDR helps to
prevent the waste of IP address. CIDR notation is syntax of specifying IP addresses and their
associated routing prefix. It appends a slash character to the address and the decimal number
of leading bits of the routing prefix, e.g., 192.168.1.0/24
SOA records must be included in every zone. What are they used for?
SOA records contain a TTL value, used by default in all resource records in the zone. SOA
records contain the e-mail address of the person who is responsible for maintaining the zone.
SOA records contain the current serial number of the zone, which is used in zone transfers.
What is a zone?
Also called a zone of authority, zone is a subset of the Domain Name System (DNS) namespace
that is managed by a name server.
The query that has been sent to the DNS server from a Client is called iterative query.
(i. e., iterative query is nothing but gives the answer for my question, don’t ask to contact that
person or this person or don’t say something else. Simply just answer to my question. That’s all)
Your DNS server requests the root level DNS server for specific IP address. Now DNS server says
I don’t know but I can give the address other person who can help you in finding IP address.
What type of records do we find in DNS database?
PTR record is created in Reverse lookup zone. It is the record to main database for reverse
lookup zone purposes (to convert from IP address to host names). Each host record in forward
lookup should have an associated pointer record in reverse lookup zone
What is DNS?
DNS stands for Domain Name System. It is a hierarchical system for identifying hosts on the
Internet or on a private, corporate TCP/IP internetwork.
It resolves the IP addresses to host names (or friendly internet names) and Host names to IP
addresses.
The structure of DNS starts with root domain. Then it (root domain) braches to TOP level
domains, then second level domains, and so on to the individual host names.
Root Domain –> Top level Domains–> Second level Domains–> So on so forth up to individual
host systems
General
Start of Authority (SOA)
Named servers
WINS
Zone transfers
Interface
Forwarders
Advanced
Root hints
Logging
Monitoring
What are the standard port numbers for SMTP, POP3, IMAP4, RPC, LDAP and Global
Catalog? – SMTP – 25, POP3 – 110, IMAP4 – 143, RPC – 135, LDAP – 389, Global Catalog –
3268
• Hosts file used for DNS to resolve Hostnames to IP Address and Vice Versa
• LMHOSTS file is used for WINS to resolve NetBIOS names to IP Address and Vice Versa
DFS is a distributed file system used to provide common environment for users toaccess files
and folders even when they are shared in different servers physically.There are two types of
DFS domain DFS and Stand alone DFS. We cannot provideredundancy for stand alone DFS in
case of failure. Domain DFS is used in a domainenvironment which can be accessed by /domain
name/root1 (root 1 is DFS root name).Stand alone DFS can be used in workgroup environment
which can be accessedthrough /server name/root1 (root 1 is DFS root name). Both the cases we
need tocreate DFS root ( Which appears like a shared folder for end users) and DFS links
( Alogical link which is pointing to the server where the folder is physically shared)The
maximum number of Dfs roots per server is 1.The maximum numbers of Dfs root replicas are
31.The maximum number of Dfs roots per domain is unlimited.The maximum number of Dfs
links or shared folders in a Dfs root is 1,000
In authoritative restore, Objects that are restored will be replicated to all domaincontrollers in
the domain. This can be used specifically when the entire OU isdisturbed in all domain
controllers or specifically restore a single object, which isdisturbed in all DC’sIn non-
authoritative restore, Restored directory information will be updated by other domain
controllers based on the latest modification time
On most situations you will be using one of the following four levels of RAIDs.
RAID 0
RAID 1
RAID 5
This article explains the main difference between these raid levels along with an easy to
understand diagram.
RAID LEVEL 0
Following are the key points to remember for RAID level 0.
Minimum 2 disks.
RAID LEVEL 1
Minimum 2 disks.
RAID LEVEL 5
Following are the key points to remember for RAID level 5.
Minimum 3 disks.
Best cost effective option providing both performance and redundancy. Use this for DB that is
heavily read oriented. Write operations will be slow.
RAID LEVEL 10
Following are the key points to remember for RAID level 10.
Minimum 4 disks.
If you can afford the dollar, this is the BEST option for any mission critical applications
(especially databases).
RAID 6
Just like RAID 5, this does block level striping. However, it uses dual parity.
I’m going to keep this explanation very simple for you to understand the basic concepts well. In
the following diagrams A, B, C, D, E and F represents blocks.
RAID 10
RAID 01
A page file (also known as a "paging file") is an optional, hidden system file on a hard disk. The
page file can be used to "back" (or support) system crash dumps and extend how much system-
committed memory (also known as “virtual memory”) a system can back.
Server core improvements: no need of fresh installation, you can add/remove GUI from server
manager
Remotely manage servers , add/remove roles etc using Server manager-manage 2008 and 2008
R2 with WMF 3.0 installation, installed by default in Server 2012
Remote server administration tools available for windows 8 to manage Windows server 2012
infrastructure
Powershell v3
Hyper-V 3.0
Shared nothing live migration, move around VMs without shared storage
ReFS(Resilient file system), upgraded version of NTFS- supports larger file and directory sizes.
Removes the 255 character limitation on long file names and paths, the limit on the
path/filename size is now 32K characters!
Improved CHKDSK utility that will fix disk corruptions in the background without disruption
A mask used to determine what subnet an IP address belongs to. An IP address has two
components,the netwoek address and subnet address.
for example, consider the IP address 150.215.017.009 assumong this is part of a class B
network,the first two numbe(150.215) represent the class B network address,and the second
two number(017.009)identify a particular host on this network.
what is APiPA ?
when a DHCP server fails,APIPA allocates IP addresses in the private range 169.254.0.1 to
169.254.255.254
An address send outgoing signal back to thr same computer for testing .
what is MAC address ?
Short for medium access control.a Mac address also known as a physical address and hardware
address is a unique address number formatted in hexadecimal format.
What is ARP ?
address resolution protocol(ARP)is a protocol for mapping an internet Protocol address (IP
address) to aphysical machine address that is recognized in the local network.
Primary zone
secondary zone
stube zone
what is DHCP ?
Dynamic Host Configuration Protocol (DHCP) is a network protcol that enables a server to
automatically assign an IP address to a computer from defined range of number.
Descirbe the steps taken by the client and DHCP server in order to obtain an IP adres
the router direct the DISCOVER packet to the correct DHCP server.
server group can be created with this version,remote management of the member serers is also
supported.
if we compare windows server 2008 with server 2012 & server 2012R2 is been add by 19 roles
and 53 features and if we talk about 2012 the role and features are 20 55 respectively
In server 2008 physicsl RAM can be extened up to 1 TB but in server 2012 it can be extened up
to 4 TB.
In server 2008 Virtual Processor per virtual machine 4 Processor it can be extned 64 Processor.
>Storage replica
>networking enchancement.
?PoerShell updates.
what id RFC ?
A Request for comments document defines a protocol or policy used on the internet.
SMB
So what is SMB? SMB stands for “Server Message Block.” It’s a file sharing protocol that was
invented by IBM and has been around since the mid-eighties. Since it’s a protocol (an agreed
upon way of communicating between systems) and not a particular software application, if
you’re troubleshooting, you’re looking for the that is said to implement the SMB protocol.
The SMB protocol was designed to allow computers to read and write files to a remote host
over a local area network (LAN). The directories on the remote hosts made available via SMB
are called “shares.”
CIFS
CIFS stands for “Common Internet File System.” CIFS is a dialect of SMB. That is, CIFS is
a particular implementation of the Server Message Block protocol, created by Microsoft.
This is among top 10 interview questions asked for Windows Server Administrator profile. Here
I have summarized the difference between WIndows Server 2008 and Windows Server 2012
R2.Hope you find it useful.
Windows Server 2008 had two releases i.e 32 bit and 64 bit but Windows Server 2012 is only 64
but Operating System.
The Active directory in Windows Server 2012 has a new feature that allows you to add personal
devices like tablets to the domain.
The Active directory recycle bin is another feature of windows Server which allows us to restore
deleted AD objects using a GUI.
Server core was introduced in Windows Server 2008. Windows Server has additional feature
that allows you to switch between Server core and GUI and vice versa.
Hyper-V in Windows Server 2012 has a feature called live migration which allows you to move
virtual machine from one Hyper-V server to another Hyper-V Server while virtual machine is
running. This feature was there in Windows Server 2008 but the virtual machine had to be
clustered for migration to happen.
In Windows Server 2008 Hyper-V the merging of a snapshot in the virtual machine required the
virtual machine to be turned off where as in windows Server 2012 it can be done while the
machine is running.
In Windows Server 2008 Hyper-V the dynamic memory cant be given to the virtual machine is
its running where as in Windows Server 2012 the running virtual machine can take dynamic
memory from host while its runn
New Live Migration options in Windows Server 2012
Here are the new Live Migration options introduced in Windows Server 2012
The underlying principle will remain same irrespective of the migration solution “the VM will always be running somewhere”. This principle ensures that before
source VM is shut down and deleted from the source Hyper-V host, all necessary checks should be performed to ensure that new VM is healthy and should be
running properly. It also ensures that there should always be failback option- so that if migration fails, the source VM will still be running and available.
This option allows administrator to move virtual machines directly between two Hyper-V hosts without any shared infrastructure. Only prerequisites are:
There should be gigabit connectivity to ensure that there should not be any downtime
It moves entire virtual machine disk with its running state without any downtime.
This migration doesn’t move the storage, but only running virtual machine. It requires SMB 3.0 and both users and computers need access to the share. Before
moving virtual machines, make sure permissions are set correctly, means the users account initiating the migration and the source and destination computer
accounts need security access on the share. Permissions must be configured both on the folder and file level.
Live Migration between clusters
As we know, Windows Server 2012 now supports up to 64 nodes in a cluster so moving of nodes between or within clusters is now more flexible. Windows Server
2012 now supports VM migrations both between clusters and within clusters. Similarly, we can migrate VMs from a stand-alone host into a cluster and from a cluster
to a stand-alone host.
Use Hyper-V Manager to Live Migrate the VM to a node in the destination cluster
Through this feature, we can now move virtual machine with its associated VHDs, without any downtime to a new location. The need of this migration arises if you
are upgrading your existing storage for any maintenance and want to move machines located on this storage to the new storage device. Live Storage migration is
available for both SAN-based and file-based storage. Virtual machines can now be moved between SAN, local disks and SMB in any of the combination
Details
Written by Administrator
Hits: 2434
Most of us would be aware of iSCSI Target for Windows Server 2008 R2 that was available to download from the internet. Windows Server 2012 contains a native
iSCSI Target that doesn’t any requires to download any software, any license, any separate installation as it comes as a build-in feature.
Windows Server 2012 can now be configured as iSCSI Target. Windows Server 2012 allows block-based access to storage from an iSCSI initiator over the network. In
other words, we can start up a server from network storage on the iSCSI Target. With this feature, we can create a Storage Area Network (SAN) device on hardware
The iSCSI Software Target feature in Windows Server 2012 supports diskless network boot without the need for special hardware or additional software. iSCSI
Software Target fully complies with the iSCSI protocol in RFC 3720.
iSCSI Initiator: This is generally an application server, the system that consumes the storage. For example, the SQL Server can be an iSCSI initiator storing
iSCSI Target: This is an object accepting iSCSI initiator connections. It keeps track of initiators that are allowed to connect and also, iSCSI virtual disks
iSCSI virtual Disk: Also referred to as iSCSI LUN, which can be mounted by the iSCSI initiator. The iSCSI virtual disk is backed by the VHD file.
IQN: It is a unique identifier of the Target and Initiator. The Target IQN is shown when it is created on the server.
Follow below steps to configure iSCSI Target and Initiator that could be done via Server manager or PowerShell Cmdlet
iSCSI Target can be enabled using Add roles and features in the Server Manager as shown below:
Using Cmdlet
Open the PowerShell cmdlet and run the below command to install iSCSI Target Server:
Add-WindowsFeature FS-iSCSITarget-Server
iSCSI LUN, also known as iSCSI virtual disk, should be created to share the storage. Use the Server Manager to create iSCSI LUN as shown below. After clicking the
Using Cmdlet
LUN creation:
Target creation:
Once iSCSI virtual is created and assigned, iSCSI Initiator needs to be created so that application server can connect to the iSCSI Target. For this, you will need to
provide the iSCSI Target server hostname or IP address to the initiator. Once Initiator is connected to the Target, all the Targets would be listed to the Initiator.
Once you click the iSCSI Initiator, you will be asked to enter the Target IP or DNS name. Also, make sure to check the “Enable CHAP log on” box from the Advanced
tab.
Using Cmdlet
By default iSCSI initiator service is stopped. You must start this service from this command:
Start-Service msiscsi
Get-IscsiTarget
Connect:
Once the connection is established, the iSCSI virtual disk will be presented to the initiator. This disk will be offline, by default, that can be bring online by simply right
clicking on it, else you can create a new volume and assign any drive letter to it once formatted.
Details
Parent Category: WinServer2012_Section
Created on Monday, 05 November 2012 07:16
Written by Vivek Mehandiratta
Hits: 1403
Also known as Live Migration without shared storage, allows us to move VMs between stand-
alone Hyper-V hosts without the use of any shared storage. Before VMs are migration between
hosts, below prerequisites should be met. As the name implies, Nothing…there is no shared
storage, no shared cluster membership… all we need is a Gigabit Ethernet connection between
the Windows Server 2012 Hyper-V hosts. Once network connection is established, VMs can be
moved between Hyper-V hosts, including VM’s virtual hard disk (VHDs), processor, memory
content and VM state with no downtime to the VM.
In other cases, we can also move a VM running on a laptop local hard disk to another laptop
connected by a single Gigabit Ethernet network cable as shown below:
Don’t confuse yourself by considering Shared Nothing Live Migration as an alternate to Failover
Clustering. Shared Nothing Live Migration provides us a new solution for moving VMs between
Hyper-V hosts, whereas Failover Clustering provides a high availability solution.
Prerequisites:
Both hosts use the processors from the same manufacturer, all Intel or AMD,
for instance
Both hosts should be running Windows Server 2012 installation with the
Hyper-V role installed
Servers must be connected by at least 1Gbps connection
Both hosts should be joined in the same Active Directory domain
User account should be a member of Domain Administrator Group
Live migration without shared storage saves lot of downtime and migration process works like
this (see below figure):-
1. The first host negotiates the Virtual Machine Management Service, Vmms.exe,
(where the VM originally resides) negotiates and establishes a Live Migration
connection with the VMMS on the second host.
2. A storage migration is performed, which creates a mirror on the second host of
the VM’s VHD fi le on the first host.
3. The VM state information is migrated from the first host to the second host.
4. The original VHD fi le on the first host is then deleted
Details
Parent Category: WinServer2012_Section
Created on Tuesday, 16 October 2012 09:48
Written by Sachin Mehandiratta
Hits: 2911
There are many third-party software available in the market that backup and restores the VMs
running on Hyper-V hosts, the Hyper-V Replica is an in-box solution being offered in Windows
Server 2012.
With this feature, administrators can replicate their Hyper-V virtual machines from their
primary site to the replica site during disaster recovery or similar kind of situations. VMs can be
replicated between Hyper-V hosts located at different geographical locations periodically and
asynchronously over IP-based networks across different storage subsystems. This feature
doesn’t require any shared storage or any other replication technologies.
Using Failover Clustering with Hyper-V allows VMs to maintain availability by moving them
between nodes in the same datacenter. Hyper-V Replica allows VMs to maintain availability
across the datacenter where each node is located at the different physical location.
Hyper-V Replica can be used in different scenarios like replicating VMs from head office to
branch office, between two datacenters owned by a hosting provider to provide disaster
recovery services etc.
Hyper-V Replica keep on tracking the write operations on the primary site and replicate those
changes to the replica site over a WAN by using HTTP protocol. Authentication is supported by
Kerberos and Certificates with optional support for encryption.
Also, we can store VHDs in remote locations to assist recovery in the case the datacenter goes
down.
Data that is rapidly changing and not used by the Replica server after failover, such as
page file disk, should we excluded from replication to preserve network bandwidth.
Servers specs of Primary and Replica server (like CPU and RAM) need not be same.
Replica server will take the load to its maximum limits if Primary server has more resources.
However, if some resources are missing in the Replica server, those resources will not be used
during failover.
Test failover can be conducted at any time. A temporary virtual machine is created on the
Replica server during test failover. Any application can be tested without interrupting the
ongoing replication. Once test is completed, the temporary virtual machine is deleted.
As the name implies, in load balance relation, both servers respond to client requests. Let us
see how each DHCP server receives client’s request:
As we know, each client has their own unique MAC address. Once DHCP server receives client’s
request, it calculate hash on the client’s MAC address as per hashing algorithm specified in the
RFS 3074. Each DHCP server can hashes any MAC address to a value between 1 and 256. We
can configure the two DHCP servers to equally distribute the load that is 50:50, of default. If
this is the scenario, and MAC address hash falls between 1 and 128, the first server will respond
to the client request and if the hash is between 129 and 256, the other server responds to the
client.
This process ensures that only one DHCP server should respond for a specific client.
Administrator can change this load balance proportion as shown below:
How IP Address pool managed in load balance
Just like the load balancing ration, the free IP addresses in each failover scope are distributed in
the same proportion. Example, let’s say you have the failover scope- 192.168.0.0/24 with an IP
address range of 192.168.0.1 through 192.168.0.250. Suppose first 50 addresses are already
leased out and rest of the IPs starting from 192.168.0.51 are free. We have now 200 IP
addresses left in the address pool. As load balance ratio is set to 50:50, the first 100 IPs, from
192.168.0.51 through 192.168.0.150 would be assigned to the first server and rest of the range
to the second server.
Below figure shows two DHCP servers in load balancing mode sharing lease information.
In load sharing mode, you enable both DHCP servers to respond to IPv4 lease requests and
grant leases to devices on connected subnets for which there is a corresponding DHCP scope.
NIC Teaming Options
Windows Server 2012 NIC teaming features offers a choice of teaming mode and load
balancing mode.
The following teaming modes are available:-
· Switch-Independent Teaming - Switch doesn’t require becoming a member of
teaming. The adapters may be connected to different switches.
· Active/Standby Teaming - Network adapters can be configured for failover by
binding them in Active/Standby Teaming mode without leveraging the benefits of
bandwidth aggregation capabilities in NIC Teaming. Set the team in Switch-Independent
Teaming to use this feature.
· Switch-Dependent Teaming - This configuration require switch to be participating
in the teaming. All members of the team should be connected to the same physical
switch.
The following load balancing modes are available:-
Below algorithms are supported to distribute the outbound traffic from the available
links:
· Hyper-V Switch Port - Decision taken on the basis of VM’s MAC address or the
port it’s connected on the Hyper-V switch.
· Address Hashing - Hash is created on address components of the packets like
Source/Destination MAC/IP addresses and port numbers.
o MAC Address hashing
o 2-tuple hashing (Source and destination IP address, with or without MAC addresses)
o 4-tuple hashing (Source and destination TCP ports, usually with IP addresses, this is
the default hashing mode).
How to enable NIC Teaming
Configuring NIC Teaming in Windows Server 2012 is pretty easy. Again, use Server
Manager to enable this feature as shown below in RED:
In Windows Server 2012, NIC teaming is vendor, hardware, and line-speed agnostic. For
example, you can configure a NIC team by using a combination of a one-gigabit
Broadcom NIC, a one-gigabit Intel NIC, and a 100-megabit Realtek NIC.
When you create a NIC team, Windows Server 2012 creates a default team NIC (tNIC) to
represent the team interface.
What are the new Features in Windows Server 2012
Details
Parent Category: WinServer2012_Section
Created on Monday, 24 October 2011 04:53
Written by Sachin Mehandiratta
Hits: 2051
Microsoft claimed to have introduced more than 300 new features in Windows Server
2008, but for the sake of this article, let’s share with you the key features in Windows
Server 2008. Other features will be incorporated in the later stages.
· Support of Cisco Nexus 1000V Virtual switch
· Deduplication of files within a VHD file
· Turn on- off GUI version for a Hyper-V host
· Virtual machines on a Windows File server through SMB 2.2
· Replicate a VM to another Hyper-V host without replication software
· Startup on Task Manager
· IE 10
· PowerShell 3.0
· ARM (Advanced RISC Machine) for extended battery life
· USB 3.0
· AD Recycle Bin GUI Interface
· Intellisense PowerShell auto fills appropriate command line syntax as you type
· NIC Teaming-To provides aggregate bandwidth & failover. Upto 32 NICs. Earlier
dependent upon Vendors support. NIC Teaming in Win 2008 R8 is achieved through
Failover Cluster Virtual Adapter
· Cluster Aware Updating without downtime of cluster nodes when performing
Windows updates
· Claim Definitions is used for controlling access and auditing information like file
having social security nos. will be provided limited access from GPO
· Large Hyper-V Clusters by supporting 64 hosts and 4,000 VMs per Cluster
· Fibre Channel support to Hyper-V guests
· Live storage migration, the ability to migrate virtual hard disks or configuration
files for a running VM without interruption
6. Loadbalancer vs Clustering
o Clustering
i. Used to forward requests to either one server or other, but one server
does not use the other server’s resources. Also, one resource does not
share its state with other resources.
i. Assigning
ii. Publishing
o Assign :
i. If you assign the program to a user, it is installed when the user logs on to
the computer. When the user first runs the program, the installation is
completed.
ii. If you assign the program to a computer, it is installed when the
computer starts, and it is available to all users who log on to the
computer. When a user first runs the program, the installation is
completed.
o Publish :
8. Group policy security filtering for users. Which all users are in there by default.
Members of Authenticated Users group
o Security filtering is a way of refining which users and computers will receive and
apply the settings in a Group Policy object (GPO)
o In order for the GPO to apply to a given user or computer, that user or computer
must have both Read and Apply Group Policy (AGP) permissions on the GPO,
either explicitly, or effectively through group membership
o By default, all GPOs have Read and AGP both Allowed for the Authenticated
Users group.
o The Authenticated Users group includes both users and computers. This is how
all authenticated users receive the settings of a new GPO when it is applied to an
organizational unit, domain or site
11.
o VLAN works at layer 2 while subnet is at layer 3
o Subnets are more concerned about IP addresses.
o VLANs bring more network efficiency
o Subnets have weaker security than VLANs as all the subnet uses the same
physical network
16.
Explain GPO, GPC & GPT
o GPO - Group Policy Object : Refers to the policy that is configured at the Active
Directory level and is inherited by the domain member computers. You can
configure a GPO at the site level, domain level or OU level. GPO stores policy
settings in two locations GPC and GPT
o GPO behaviour : Local Policy > Site GPO > Domain GPO > OU GPO > Child OU
GPO
o GPC - Group Policy Container :This is the AD portion of the group policy. This can
be viewed using ADSI edit. It stores version information, status information, and
other policy information. When you create a new GPO, an AD object of class
groupPolicyContainer gets created under the System\Policies container within
your AD domain
o GPT - Group Policy Template : The GPT is where the GPO stores the actual
settings. It stores software policy script, and deployment information.
o GPT is stored in SYSVOL share (\\DomainNameHere\SYSVOL\Policies) whereas
GPC is stored in the AD
o ReFS(Resilient file system), upgraded version of NTFS- supports larger file and
directory sizes. Removes the 255 character limitation on long file names and
paths, the limit on the path/filename size is now 32K characters!
o Improved CHKDSK utility that will fix disk corruptions in the background without
disruption
Shutdown
11. vMotion
o vMotion enables live migration of running virtual machines from one host to
another with zero downtime
o Prerequisites
i. Fully automated - The VMs are moved across the hosts automatically. No
admin intervention required.
ii. Partially automated - The VMs are moved across the hosts automatically
during the time of VM bootup. But once up, vCenter will provide DRS
recommendations to admin and has to perform it manually.
iii. Manual - Admin has to act according to the DRS recommendations
21. DRS prerequisites
o Shared storage
o Processor compatibility of hosts in the DRS cluster
o vMotion prerequisites
o ReFS(Resilient file system), upgraded version of NTFS- supports larger file and
directory sizes. Removes the 255 character limitation on long file names and
paths, the limit on the path/filename size is now 32K characters!
o Improved CHKDSK utility that will fix disk corruptions in the background without
disruption
1) A Records.
2) NS Records.
NS ( Name Server ) records are normally given to you by your webhost.
3) MX Records.
MX (Mail Exchanger ) records are used to map a domain to a list of Message Transfer Agents
(MTAs ).
4) AAAA Records.
SOA records are used to specify authoritative information about a domain/DNS zone.
Domain
Time To Live of the domain,
Data contained in the SOA.
6) TXT Records
8) CNAME - Canonical Name - Used to create an alias to reference one host by multiple
names.
When you want to guide traffic from a sub domain, e.g. www.example.com or
mail.example.com to another server, you can use CNAME records.
10) A DNAME-record is used to map / rename an entire sub-tree of the DNS name space to
another domain.
It differs from the CNAME-record which maps only a single node of the name space.
Windows DNS Server Interview Question and Answers:-
Q . What is DNS?
DNS (Domain Name System) it resolves the IP Address to host names (or friendly internet
names) and Host names to IP Address.
DNS is a hierarchical system for identifying hosts on the internet or on a private corporate
TCP/IP Intranet or internet
Q . What is the structure of DNS?
The Structure of DNS (Domain Name System) starts with root domain. then it root Domain
braches to TCP Level Domains then second level domain, and so on to the individual host
names
ROot Domain
Top Level Domains
Second Level Domains
Q . What is Name Resolution in DNS?
that process of translating the name into some object or information that the name represent is
called name resolution a telephone books forms a namespace in which the names of
telephones subscribers can be resolved to the phone number
Q . What is ZONE in DNS
DNS (Domain Name System) Zone is the name space that is allocated for a specific servers. also
called DNS ZONE Zone files on these servers contain information about one or more domain
name
Also Called a ZONE of authority a Subnet of the Domain Name System namespace that is
managed by a name server
A Database of records is called a Zone
Q . What is an Interative Quary
Iterative : – where your client makes a DNS query to your primary DNS server asking it for the
best information it has without requesting information form other DNS Server ForEX . you ask
for the IP Address of MSN.com your primary DNS Server dose not know and refers you to
another Server
Q . What is Recursive Quary?
Recursive :- where your client Makes a DNS query to your Primary DNS Server Asking for a
Definitive Answer even if it has to ask other DNS Servers. forEX . you ask for the IP address of
MSN.com your primary Server dose not know so it ask another DNS Server if it has the
information if so your primary Server returns the answer if not the primary Server ask yet
another server and so on until it can return the answers to you
Q . What is the main purpose of DNS Server?
DNS (DOmain Name System sre used to reslove FQDN (Fully Qualified Domain Name) Hostname
into IP Addresses and vice versa
Q . DNS Server Port Number?
DNS Server Port Number. is 53
Q . What is Forward Lookup Zone?
Resolving Host Names to the IP Addresses
Q . What is Reverse Lookup ZOne?
Reverse lookup is is a file contains host names to IP Mapping Information
Q . What is a Resource Record
It is a records provides the information about the resource available in the Network
infrastructure
in other word
Name and address in the DNS zone are referred to as resource records
Q . what is Caching Only Server?
A Caching only server refer to a DNS (Domain Name System) Server with no Configuration Zone
it resolveHOT name to IP Address and stores the Mapping info in it’s cache. if a client request
a host name the DNS Server Provide the mapping information in its cache’s
Q . what are Forwarder in DNS ?
Forwarder : when a DNS Server Dose not know the answer of a particular name resolution the
query is sent to forwarder
Active Directory Group Policy Interview Questions
Find below best group policy interview questions asked in windows server, active directory and
system admin interviews. The answers provide you immense knowledge on group policies and
you can use these answers for latest windows 2008 and 2012 servers.
We call the actual unit that we are creating, deleting, managing, working with is called Group
Policy object. Group Policy objects have two components:
It is the container in the Active Directory where the Group Policy can be applied. (i.e., either
Organizational unit or Domain or Site)
When you create a group policy container automatically a template will be created in the hard
drive, in sysvol folder of the Domain Controller that is called Group Policy template.
Start –>Programs –>Administrative tools ->Active Directory Users and computers ->Right click
on the container on which you want to apply Group Policy->Select properties-> Click on Group
Policy tab->Click on New
7. What are the steps do we have when we are creating Group Policy?
There are two steps, one is creating Group policy and linking to the container. Generally we
create the group policy at container only so when you click on New it creates and links the GPO
to that container at a time. Suppose if you want to link a group policy object to a container
which is already created click on Add select the group policy.
8. What are the buttons available on Group policy tab in properties of a container?
Generally the policies set at one level will be overridden in other level, so if don’t want to
override this policy under the sub levels of this one you can set this.
EX : If you set No override at Domain level then that GPO will be applied through out the
Domain, even though you have the same policy differently at OU level.
The Block inheritance GPO option blocks the group policies inheriting from the top level, and
takes effect of this present GPO.
Right click on the container –> click on Group Policy –ègo to properties >on the bottom of the
General tab you will find Block inheritance check box
EX : If you select Block inheritance at OU level then no policy from the Domain level, or Site
level or local policy will not applied to this OU.
11. You have set the No override option at Domain level and Block inheritance at OU level.
Which policy will take effect?
If you have set both then No override wins over the Block inheritance. So No override will take
effect.
12. What are the options that are available when you click on option button on general tab?
General
Disable computer configuration settings (The settings those are set under computer
configuration of this GPO will not take effect.)
Disable user configuration settings (The settings those are set under User configuration
of this GPO will not take effect.)
Links (Displays the containers which have links to this GPO)
Security (With security option you can set level of permissions and settings to the
individual users and groups.EX : If you want to disable this GPO to a particular user on
this container, on security tab select that user and select the deny check box for apply the
Group Policy. Then the GPO will not take effect to that user even though he is in that
container.)
13. What will you see in the Group Policy snap in?
You will see two major portions, and under those you have sub portions, they are
Computer Configuration
Software settings
Software installations
Windows settings
Administrative templates
User configuration
Software settings
Software installations
Windows settings
Administrative templates
Note: Administrative templates are for modifying the registry of windows 2000 clients.
Enterprise Admin
Domain Admin
Domain Admin
Refresh interval for Domain Controllers is 5 minutes, and the refresh interval for all other
computers in the network is 45 minutes (this one doubt).
21. What is Group policy loop back process? How to set it?
Start –>programs –>Administrative tools –>Active Directory users and computers –>Right click
on the container –>click on Group policy tab –>Click on edit –>click on Computer settings –
>click on Administrative templates –>system –>Group policy –>click on User group policy loop
back processing mode –> click OK –> Select enable
22. What are the players that are involved in deploying software?
Group Policy: Within GP we specify that this software application gets installed to this
particular computer or to this particular user.
Active Directory: Group Policy will be applied somewhere in Active Directory.
Microsoft Installer service
Windows installer packages: The type of package that can be used by Group Policy to
deploy applications is .msi packages i.e., Microsoft Installer packages.
23. What is the package that can be used to deploy software through Group Policy?
Microsoft Installer Service runs on the client machines in the Windows 2000 domain. It installs
the minimum amount of an application, as you extend functionality it installs the remaining
part of application. It is responsible for installing software in the client. It is also responsible for
modifying, upgrading, applying service packs.
25. What is Local security policy, Domain security policy, and Domain controller security
policy in the administrative tools?
Minimize linking: Because there may be a chance deleting the original one with seeing
who else are using this GPO. Minimizing linking for simplicity.
Minimum number of GPO’s: Microsoft suggests that one GPO with 100 settings will
process faster than 100 GPO’s each with one setting. This is for performance.
Delegate
Minimize filtering: To keep simple your environment, try to minimize filtering.
If you have more number of GPO’s for a container, whatever GPO is on top will be applied first.
If you want, you can move GPO’s up and down.
If there is conflict between two GPO’s of same container, the last applied GPO will be effective.
i.e., the bottom one will be effective.
DHCPInform is a DHCP message used by DHCP clients to obtain DHCP options. While PPP
remote access clients do not use DHCP to obtain IP addresses for the remote access
connection, Windows 2000 and Windows 98 remote access clients use the DHCPInform
message to obtain DNS server IP addresses, WINS server IP addresses, and a DNS domain name.
The DHCPInform message is sent after the IPCP negotiation is concluded. The DHCPInform
message received by the remote access server is then forwarded to a DHCP server. The remote
access server forwards DHCPInform messages only if it has been configured with the DHCP
Relay Agent.
Describe the integration between DHCP and DNS?
Traditionally, DNS and DHCP servers have been configured and managed one at a time.
Similarly, changing authorization rights for a particular user on a group of devices has meant
visiting each one and making configuration changes.
DHCP integration with DNS allows the aggregation of these tasks across devices, enabling a
company’s network services to scale in step with the growth of network users, devices, and
policies, while reducing administrative operations and costs. This integration provides practical
operational efficiencies that lower total cost of ownership.
Creating a DHCP network automatically creates an associated DNS zone, for example, reducing
the number of tasks required of network administrators. And integration of DNS and DHCP in
the same database instance provides unmatched consistency between service and
management views of IP address-centric network services data.
It is important to realize that the cluster requires more than half of the total votes to achieve
quorum. This is to avoid having a ‘tie’ in the number of votes in a partition, since majority will
always mean that the other partition has less than half the votes. In a 5-node cluster, 3 voters
must be online; yet in a 4-node cluster, 3 voters must also be online to have majority. Because
of this logic, it is recommended to always have an odd number of total voters in the cluster.
This does not necessarily mean an odd number of nodes is needed since both a disk or a file
share can contribute a vote, depending on the quorum model.
A node
1 Vote
Every node in the cluster has 1 vote
A “Disk Witness” or “File Share Witness”
1 Vote
Either 1 Disk Witness or 1 File Share Witness may have a vote in the cluster, but
not multiple disks, multiple file shares nor any combination of the two
Quorum Types
There are four quorum types. This information is also available
here: http://technet.microsoft.com/en-us/library/cc731739.aspx#BKMK_choices.
Node Majority
This is the easiest quorum type to understand and is recommended for clusters with an odd
number of nodes (3-nodes, 5-nodes, etc.). In this configuration, every node has 1 vote, so there
is an odd number of total votes in the cluster. If there is a partition between two subsets of
nodes, the subset with more than half the nodes will maintain quorum. For example, if a 5-
node cluster partitions into a 3-node subset and a 2-node subset, the 3-node subset will stay
online and the 2-node subset will offline until it can reconnect with the other 3 nodes.
This disk is called the Disk Witness (sometimes referred to as the ‘quorum disk’) and is simply a
small clustered disk which is in the Cluster Available Storage group. This disk is highly-available
and can failover between nodes. It is considered part of the Cluster Core Resources group,
however it is generally hidden from view in Failover Cluster Manager since it does not need to
be interacted with.
Since there are an even number of nodes and 1 addition Disk Witness vote, in total there will be
an odd number of votes. If there is a partition between two subsets of nodes, the subset with
more than half the votes will maintain quorum. For example, if a 4-node cluster with a Disk
Witness partitions into a 2-node subset and another 2-node subset, one of those subsets will
also own the Disk Witness, so it will have 3 total votes and will stay online. The 2-node subset
will offline until it can reconnect with the other 3 voters. This means that the cluster can lose
communication with any two voters, whether they are 2 nodes, or 1 node and the Witness Disk.
This file share is called the File Share Witness (FSW) and is simply a file share on any server in
the same AD Forest which all the cluster nodes have access to. One node in the cluster will
place a lock on the file share to consider it the ‘owner’ of that file share, and another node will
grab the lock if the original owning node fails. On a standalone server, the file share by itself is
not highly-available, however the file share can also put on a clustered file share on an
independent cluster, making the FSW clustered and giving it the ability to fail over between
nodes. It is important that you do not put this vote on a node in the same cluster, nor within a
VM on the same cluster, because losing that node would cause you to lose the FSW vote,
causing two votes to be lost on a single failure. A single file server can host multiple FSWs for
multiple clusters.
Generally multi-site clusters have two sites with an equal number of nodes at each site, giving
an even number of nodes. By adding this additional vote at a 3rd site, there is an odd number of
votes in the cluster, at very little expense compared to deploying a 3 rd site with an active cluster
node and writable DC. This means that either site or the FSW can be lost and the cluster can
still maintain quorum. For example, in a multi-site cluster with 2 nodes at Site1, 2 nodes at
Site2 and a FSW at Site3, there are 5 total votes. If there is a partition between the sites, one of
the nodes at a site will own the lock to the FSW, so that site will have 3 total votes and will stay
online. The 2-node site will offline until it can reconnect with the other 3 voters.
Legacy: Disk Only
Important: This quorum type is not recommended as it has a single point of failure.
The Disk Only quorum type was available in Windows Server 2003 and has been maintained for
compatibility reasons, however it is strongly recommended to never use this mode unless
directed by a storage vender. In this mode, only the Disk Witness contains a vote and there are
no other voters in the cluster. This means that if the disk becomes unavailable, the entire
cluster will offline, so this is considered a single point of failure. However some customers
choose to deploy this configuration to get a “last man standing” configuration where the cluster
remain online, so long as any one node is still operational and can access the cluster disk.
However, with this deployment objective, it is important to consider whether that last
remaining node can even handle the capacity of all the workloads that have moved to it from
other nodes.
A: In Windows Server 2012 R2, you always configure a witness, and clustering automatically
decides when it needs a vote based on if there are an even or odd number of nodes in the
cluster. Prior to Server 2012 R2, there were still many scenarios where you would configure a
witness, especially if you had an even number of nodes, as an additional vote is required for
quorum reasons. The decision has to be made to use a file-share witness or a disk witness.
If you have a multi-site cluster, then most likely you will have to use a file-share witness as
there wouldn't be shared storage between the two sites. Additionally the file-share witness
should be placed in a third site to provide protection from a site failure.
In a cluster where shared storage is available, always use a disk witness over a file-share cluster,
and there's a very good reason for this.
When you use a file-share witness, a folder is created on the file share named with the GUID of
the cluster. Within that folder, a file is created that's used in times of arbitration, so only one
partition of a cluster can lock the file. The file shows a timestamp (see screen shot below) of the
last time a change was made to the main cluster database, although the file share doesn't
actually have a copy of the cluster database.
Consider a scenario of a two-node cluster: node A and node B. If Node A goes down, then Node
B carries on running and makes updates to the cluster database, such as new resources added.
It would update the timestamp of the Witness.log on the fileshare witness.
Then Node B goes down and Node A tries to start. Node A would see the timestamp is in
advance of its own database and realize its cluster database is stale, and so wouldn't start the
cluster service. This prevents partition-in-time occurring, since Node A is out-of-date, which is a
good thing, as you don't want the cluster to start out of date (that would mean different cluster
states on different nodes). You can't start the cluster without Node B coming back or forcing
quorum on Node A.
Now consider a disk witness which actually stores a complete copy of the cluster database.
In the same two-node cluster scenario, when Node A tries to start and sees its database is out
of date, it can just copy the cluster database from the disk witness, which is kept up-to-date.
Thus a file-share witness prevents partition-in-time occurring, and a disk witness solves
partition-in-time.
For this reason, always use a disk witness over a file-share witness, if possible.
The first is the benefit of being able to have one Namespace that all users can use, no matter what
their location, to locate the files they share and use.
The second is a configurable automatic replication service that keeps files in sync across various
locations to make sure that everyone is using the same version.
The trick to this is that those folders and files can be on any shared folder on any server in your
network without the user having to do any complicated memorization of server and share names.
This logical grouping of your shares will also make it easier for users at different sites to share files
without resorting to emailing them back and forth.
Why would you need this? Well if you want to improve performance for your DFS users you can
have multiple copies of your files at each site. That way a user would be redirected to the file local
to them, even though they came through the DFS Namespace. If the user changed the file it would
then replicate out to keep all copies out in the DFS Namespace up to date. This feature of course is
completely configurable.
What's New in DFS Server 2008?
Distributed File System in Server 2008 has added some additional functionality and improved
stability from some of the problems that might have plagued earlier DFS implementations.
Most new features are contingent on running your DFS NameSpace in Server 2008 mode which
means all servers are Windows Server 2008 AND the domain is running at Server 2008 domain
functional level.
DFS NameSpaces Changes in Server 2008:
Access-based Enumeration – Users are only allowed to see files and folders that they have access
to through permissions.
This feature requires either a standalone Server 2008 NameSpace or a domain based NameSpace
running in 2008 domain functional level. It is not enabled by default and has to be activated
through the following command line:
Improved Command Line Tools – Windows Server 2008 DFS NameSpaces has a new version
of dfsUtil and a diagnostic tool to help troubleshoot issues named dfsdiag.
Search within the DFS NameSpace – Windows Server 2008 has the ability to run a search through
the NameSpace and target folders.
Convenient if you want to do a targeted search across all the documents in the NameSpace instead
of having to attach to each server.
Improved Functionality in DFS Replication in Server 2008:
Improved Unexpected Shutdowns Handling – There are a few reasons for unexpected shutdown
of the DFS NameSpace, and when they occur it can cause the NameSpace database to become
corrupt or out of sync. In earlier versions of DFS, this could cause the entire database to be rebuilt
which would be very time consuming and resource intensive. The Windows Server 2008 DFS rarely
has to rebuild its database after an unexpected shutdown and allows a much quicker recovery.
Content Freshness – A new feature in Windows Server 2008 DFS keeps servers that are part of the
DFS NameSpace that might be offline for an extended period of time from overwriting other servers
when it comes back online.
Replicate Now – Administrators now have the ability to force replication in the NameSpace on
demand, temporarily ignoring the replication schedule.
Support for Read Only Domain Controllers (RODC) - Any changes detected on the RODC are rolled
back by the DFS Replication service.
SYSVOL Replication – Server 2008 replaces the use of FRS (File Replication Service) with DFS
Replication for Active Directory DS for domains that are running at the Server 2008 functional level.
Propagation Report – Shows a report based on a test file created during a diagnostic propagation
test.
Install DFS Role on Windows Server 2008
Now that we know more than we probably wanted to about Windows Server 2008 DFS
NameSpaces let's go ahead and run through installing the role on a server. For our example I am
using a Windows Server 2008 Domain Controller running Active Directory DS at the Server 2008
functional level.
2. Go to Roles in the left pane, then click Add Roles in the center pane.
3. Select File Services from the list of roles.
You will see a short description of what the File Services role provides in the upper right corner in
case you needed it. Click Next when done.
4. Now you will get an Introduction to File Services information screen; read through it and move
on by clicking Next.
5. In Select Service Roles you can click on Distributed File System and it should also place a check
next to DFS Namespaces & DFS Replication; after this click Next.
NOTE: At the bottom you will see Windows Server 2003 File Services and File Replication Service.
You would only choose this if you were going to be synchronizing the 2008 server with old servers
using the FRS service.
6. On the Create a DFS Namespace screen you can choose to create a namespace now or later.
For this tutorial I am going to create one later as I will have another article going into greater details.
So I am going to choose Create a namespace later using the DFS Management snap-in in Server
Manager and then click Next.
7. The next screen allows you to confirm your installation selections, so review and then
click Install.
8. After a short interval of loading you will see the Installation Results screen which will hopefully
have Installation succeeded in the top right. Go ahead and click Close.
9. In Server Manager you should now see File Services and under the Role Services you will see the
installed components:
DFS Namespaces
DFS Replication
Now that you have DFS installed the next step is to create a namespace and configure replication. I
will be covering these in my next article.
Differential The backup software looks at which Faster to create than Restoration is slower
Backup: files have changed since you last a full backup. than using a full
did a full backup. Then creates backup.
copies of all the files that are
different from the ones in the full
backup.
Restoring from
incremental backups
The backup software creates copies
is the slowest
of all the files, or parts of files that
because it may
have changed since previous
require several sets
backups of any type (full,
This method is the of data to fully
differential or incremental).
fastest when restore all the data.
Incrementa creating a backup. For example if you
For example if you did a full backup
l Backup: had a full backup and
on Sunday. An incremental backup
The least storage six incremental
made on Monday, would only
space is needed. backups. To restore
contain files changed since Sunday,
the data would
and an incremental backup on
require you to
Tuesday, would only contain files
process the full
changed since Monday, and so on.
backup and all six
incremental backups.
Content
All in all, this configuration will use three servers:
Note: Though the manual says that SSD and SAS disks are supported for Storage Replica,
I couldn’t get them connected. As the same thing went with virtual SAS disks, emulated
by Microsoft Hyper-V or VMware ESXi, I tried to connect the iSCSI devices created in the
MS Target. It seems like the only option that managed to work somehow.
I’m starting MS iSCSI Target on a separate machine and create 2 disks for each node (4
disks total). As this is not shared storage, the first and the second disks are connected to
the first node, while the third and the fourth – to the second node. One disk from the first
pair will be used as a replica source, while the other one – as a source log disk. On the
second pair, the disks will be respectively – replica destination and destination log. The log
disk must be at least 2 GB or a minimum 10% of the source disk.
The screenshot shows the two 35 Gb disks, created for source and destination, as well as
two 10 Gb disks for the source log and destination log.
Connecting the devices through the initiator on both the nodes, where I’m going to test
Storage Replica. Initializing them, choosing GPT (this is important!) and formatting the
disks. For both the nodes, I choose the same letters (this is important too!).
Using Add Roles and Features wizard, I’ll add Failover Clustering, Multipath I/O and
Windows Volume Replication on the nodes.
Reboot. After it’s complete, I will create a cluster (as we mentioned above, SMB 3.0 share is
used for witness).
Going to the Storage->Disks in the cluster, adding disk by clicking Add Disk. Here’s what
we see in the next window (2 disks on each node):
Adding all of them.
Now I’ll go to Add Roles and choose the file server role.
Going through the standard wizard, I see the Select Storage step, where I’m choosing only
the data disk, not the disk for logs.
Successfully finishing the wizard, I’m getting the role. Highlight it and choose the Resource
stab. Right-click the added cluster disk and choose Replication – Enable.
Choose the log disk in the replica creation wizard that appears.
The next step is choosing the replica destination. The list on the next screenshot is empty. If
you get an empty list (as shown on the next screenshot), return to the Storage – Disks.
You need to change the owner of all the disks to the replica destination node. This can be
done through Move Available Storage – Best Possible Node.
Here’s what I got:
Getting back to the Storage Replica creation wizard – now the disk is available there.
Setting the log disk for the replication.
The disks are not synchronized, so I’m choosing the second option.
Confirm the creation.
The data is being synchronized.
The next screenshot shows my success.
Note: If you’re getting an error like the one on the next screenshot, recreate the devices
and connect them again. Otherwise, you’d have a hard time getting the disks to operate
normally.
The replica and a slightly changed disk display are the signs of success.
Here on the screenshot, you can see that cluster disk 1 and others have different sizes from
the initial ones. The reason is in the need to create them again – so they were added under
new numbers.
The next step is to create a file share – it’s a standard wizard dialog, so you’ll surely figure it
out without my instructions. The only thing I’d like to point out the log disk is also available
as the share location. I sure hope Microsoft will repair this issue, because it may cause
some trouble for inexperienced users.
After having created the share, I’ll upload something there and crash the owner node of the
cluster during the process.
The Continuous Availability option is enabled in the share, so when a node crashes, SMB
Transparent Failover must occur. Well, it did not. At the moment of the node crash, the
speed went down, so the copying died as well because of the timeout.
Conclusion
As you can clearly see, Failover Cluster in File Server role works fine with Storage Replica
with only a slight trouble. Though we’ve enabled Continuous Availability in the SMB share,
the operation was disrupted during failover. Doesn’t look like transparent failover at all.