Deploying a File Server Lesson 2

Similar documents
MANAGING DISK STORAGE

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Windows Server 2008 Essentials. Installation, Deployment and Management

Managing and Maintaining a Windows Server 2003 Network Environment

Windows Server 2008 R2 Essentials

NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment

Microsoft SMB File Sharing Best Practices Guide

Scalable Windows Storage Server File Serving Clusters Using Melio File System and DFS

Exam: QUESTION 1 QUESTION 2 QUESTION 3 QUESTION 4

Lesson Plans LabSim for Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Scalable Windows Server File Serving Clusters Using Sanbolic s Melio File System and DFS

Guide to SATA Hard Disks Installation and RAID Configuration

SHARING FILE SYSTEM RESOURCES

NVIDIA RAID Installation Guide

About Backing Up a Cisco Unity System

ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE CATALOG DESCRIPTION

Guide to SATA Hard Disks Installation and RAID Configuration

Guide to SATA Hard Disks Installation and RAID Configuration

DIGILIANT Windows Storage Server 2012

Lesson 5. Managing Devices. Learning Objectives. ODN Skills

Disk management. Learning Objective. Preparing a Disk. Preparation tasks: Initializing the disk, i.e. defining disk s storage structure

Introduction to Windows Server 2003

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

HP StorageWorks Automated Storage Manager User Guide

VERY IMPORTANT NOTE! - RAID

Managing Devices. Lesson 5

Hardware/Software Guidelines

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Hyper-V backup implementation guide

Managing and Maintaining a Microsoft Windows Server 2003 Environment

RAID HARDWARE. On board SATA RAID controller. RAID drive caddy (hot swappable) SATA RAID controller card. Anne Watson 1

Nimble Storage Best Practices for Microsoft Windows File Sharing

Guide to SATA Hard Disks Installation and RAID Configuration

Data Storage and Backup. Sanjay Goel School of Business University at Albany, SUNY

5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007

Security IIS Service Lesson 6

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage

VERITAS Volume Manager Delivering High Availability Storage Management Tools for Microsoft Windows

12 NETWORK MANAGEMENT

Microsoft Windows Server 2003 and Microsoft Windows Storage Server 2003: Meeting the Storage Challenges of Today s Businesses

Objectives. At the end of this chapter students should be able to:

Maintaining a Microsoft Windows Server 2003 Environment

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

Module 6. RAID and Expansion Devices

XenData Archive Series Software Technical Overview

6419: Configuring, Managing, and Maintaining Server 2008

Date: March Reference No. RTS-CB 018

Hiva-network.com. Microsoft_70-680_v _Kat. Exam A

Chapter 12 Network Administration and Support

Backup and Restore of CONFIGURATION Object on Windows 2008

MCSE Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

Filing Systems. Filing Systems

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

NSS Volume Data Recovery

IncidentMonitor Server Specification Datasheet

Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper

MS Design, Optimize and Maintain Database for Microsoft SQL Server 2008

Release Notes. LiveVault. Contents. Version Revision 0

5053A: Designing a Messaging Infrastructure Using Microsoft Exchange Server 2007

istorage Server: High-Availability iscsi SAN for Windows Server 2008 & Hyper-V Clustering

Hard Disk Drives and RAID

Active Directory Compatibility with ExtremeZ-IP

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון טל' פקס בשיתוף עם מכללת הנגב ע"ש ספיר

Configuring Windows Server Clusters

Planning Domain Controller Capacity

Acronis Backup & Recovery 10 Server for Windows. Installation Guide

Configuring Managing and Maintaining Windows Server 2008 Servers (6419B)

Acronis Disk Director 11 Advanced Server. Quick Start Guide

How to Configure Double-Take on Microsoft Exchange Server

Intel Rapid Storage Technology

How To Create A Multi Disk Raid

LearnKey's Windows Server 2003 Managing a Network Environment with Aaron Spurlock

High Availability for Exchange Server 5.5 Using Double-Take

Clustering ExtremeZ-IP 4.1

Recover a CounterPoint Database

How To Recover From A Disaster In An Exchange 5.5 Server

Understanding Data Access and Management

How To Use An Hpl Storage Manager On A 2Tb Server On A Microsoft Server On An Ubuntu 2Tv 2Tva 2Tfs 2 (Ahem) Or 2Tvi 2 (I386) On A Server

Acronis Disk Director 11 Advanced Server. User's Guide

RAID installation guide for Silicon Image SiI3114

Implementing and Managing Microsoft Server Virtualization

Blackboard Managed Hosting SM Disaster Recovery Planning Document

Lesson Plans Windows Server 2008 Server Administrator

Configuring, Managing and Maintaining Windows Server 2008 Servers

Intel Matrix Storage Manager 8.x

VERITAS Volume Management Technologies for Windows

Acronis Backup & Recovery 11.5

Directory Backup and Restore

Acronis Backup & Recovery 10 Advanced Server SBS Edition. Installation Guide

M6419 Configuring, Managing and Maintaining Windows Server 2008 Servers

10215A Implementing and Managing Microsoft Server Virtualization

MOC 6419: Configuring, Managing, and Maintaining Windows Server 2008

NAS 251 Introduction to RAID

Transcription:

Deploying a File Server Lesson 2

Skills Matrix Technology Skill Objective Domain Objective # Adding a New Disk Configure storage 1.5

File Server The most basic and the most universal type of application server, is found on almost every network. Included in every server installation include the following: Disk management Planning for fault tolerance Folder sharing Access control using share and NTFS permissions Mapping drives

Storage Technology In addition to estimating the amounts of processor speed, memory, and disk space you require, consider whether your needs call for specialized file server hardware. ATA versus SCSI Serial ATA Redundant Array of Inexpensive Disks (RAID) External Drive Arrays Storage area network (SAN) Network attached storage (NAS)

Storage Area Network (SAN)

Network Attached Storage (NAS)

RAID

RAID

Clustering Servers A cluster is a group of servers that all perform the same function, dividing the client load among them. Failover clustering provides the ultimate in scalability and fault tolerance. If you need more performance, you add another server to the cluster. If one of the servers in the cluster fails, then the others take up the slack until you can repair or replace it. Clustering can be an extremely expensive proposition, but for mission critical servers, it provides unmatched performance levels and reliability.

Working with Disks When working with disks, you must do the following: Select a partitioning style (MBR or GPT). Select a disk type (Basic or Dynamic). Divide the disk into partitions or volumes. Format the partitions with a file system.

Partition Style Two hard disk partition styles can be used in Windows Server 2008: MBR The MBR partition style has been around as long as Windows and is still the default partition style for x86-based and x64-based computers. GPT GPT has also been around for a while, but no x86 version of Windows prior to Windows Server 2008 and Windows Vista supports it. (Windows XP Professional x64 Edition does support GPT.) Now, you can use the GPT partition style on x86-, and x64-based, computers.

Partition Style

Basic Disks and Partitions When you work with basic disks in Windows Server 2008: You can create up to four primary partitions. Or three primary partitions and one extended partitions.

Partitions

Dynamic Disks A dynamic disk can contain an unlimited number of volumes that function a lot like primary partitions on a basic disk, but you cannot mark an existing dynamic disk as an active partition.

Simple and Spanned Volumes Simple volume Consists of free space contained on a single physical disk. You can configure all of the available space on a disk as a simple volume, or you can configure multiple simple volumes using the space on a single disk. Spanned volume Made up of free space from multiple physical disks. Spanned volumes are not fault-tolerant. If you lose one disk in the volume, you will lose all data contained on all disks. Created on 2 to 32 disks.

Striped Volume Made up of free space from multiple disks. Unlike a spanned volume, though, a striped volume uses RAID-0 striping to interleave the data across the disks. Improves the read performance of the volume. Striped volumes are also not fault-tolerant and will not withstand the loss of a disk in the volume. A striped volume can be created on a minimum of 2 disks and a maximum of 32 disks.

Mirrored Volume Fault-tolerant volume consisting of two physical disks, in which the data on one disk is copied exactly onto the second disk. This provides data redundancy, such that if one disk in the mirror fails, the other disk will continue to function without loss of data.

RAID-5 volume A fault-tolerant volume where data is interleaved across three or more disks much in the same way as in a striped volume. Has additional information known as parity. If one disk in a RAID-5 volume fails, the data contained on the failed disk can be rebuilt using the parity information stored on the disks in the rest of the volume. A RAID-5 volume can be created using a minimum of three disks and a maximum of 32 disks.

File Systems In Windows Server 2008, three file system options are available: NTFS, FAT32, and FAT (also known as FAT16). NTFS is the preferred file system for a file server. The main benefits are improved support for larger hard drives and better security in the form of encryption and permissions that restrict access by unauthorized users.

Disk Management Snap-in (Disk View)

Disk Management Snap-in (Volume View)

Initialize Disk

Newly Initialized Disk

Convert to Dynamic Disk

Convert to Dynamic Disk

Creating a Simple Volume

Creating a Simple Volume

Creating a Simple Volume

Creating a Mirror Disk

Reasons for File Sharing To enable users to collaborate on projects by sharing files. To back up document files more easily. To protect company information by controlling access to documents. To reduce the number of shares needed on the network. To prevent the need to share access to workstations. To monitor users storage habits and regulate their disk space consumption. To insulate users from the sharing and permission assignment processes.

Arranging Shares A well-designed sharing strategy provides each user with three resources: A private storage space, such as a home folder, to which the user has exclusive access. A public storage space, where each user can store files that they want colleagues to be able to access. Access to a shared work space for communal and collaborative documents.

File Sharing

Share and Storage Management Console

Share Folder Location

File Security

File Security

Share Protocols

SMB Settings

Advanced Options

SMB Permissions

Share Permissions

DFS Namespace Publishing

Review Settings

Permissions Permissions are privileges granted to specific system entities, such as users, groups, or computers, enabling them to perform a task or access a resource. Share permissions NTFS permissions Registry permissions Active Directory permissions

Permissions When you assign permissions to a system element, you are, in effect, creating a new ACE in the element s ACL. There are two basic types of ACE: Allow Deny

Inheriting Permissions Permissions tend to run downwards through a hierarchy. Permission inheritance means that parent elements pass their permissions down to their subordinate elements.

Effective Permissions The combination of Allow permissions and Deny permissions that a security principal receives for a given system element, whether explicitly assigned, inherited, or received through a group membership: Allow permissions are cumulative. Deny permissions override Allow permissions. Explicit permissions take precedence over inherited permission.

Effective Permissions

Share Permissions

NTFS Permissions

Combining Share and NTFS Permissions On networks already possessing a wellplanned system of NTFS permissions, share permissions are not really necessary. You can safely grant the Full Control share permission to Everyone, overriding the default Read permission, and allow the NTFS permissions to provide security. Adding share permissions to the mix would only complicate the administration process, without providing any additional security.

Mapping Drives Make sure that users can access their folders. the Folder Redirection settings in Group Policy to map each user s Documents folder to his or her home folder on the network share. Map drive letters to each user s directories with logon scripts, so they can always find their files in the same place, using Windows Explorer.

Shadow Copies Shadow Copies is a Windows Server 2008 mechanism that automatically retains copies of files on a server volume in multiple versions from specific points in time. When users accidentally overwrite or delete files, they can access the shadow copies to restore earlier versions. Shadow Copies is a file-based fault tolerance mechanism that does not provide protection against disk failures, but it does protect against the minor disasters that inconvenience users and administrators on a regular basis.

Shadow Copies

Shadow Copies

Shadow Copies

Offline Files A mechanism that individual users can employ to maintain access to their server files, even if the network service fails. Windows workstations copy server-based folders that users designate for offline use to the local drive, and the users work with the copies, which remain accessible whether the computer is connected to the network or not. If the network connection fails, or the user undocks a portable computer, access to the offline files continues uninterrupted.

Offline Files When the computer reconnects to the network, a synchronization procedure replicates the files between server and workstation in whichever direction is necessary. If there is a version conflict, such as when users have modified both copies of a file, the system prompts the user to specify which copy to retain.

Backing Up Server administrators should understand that none of the fault-tolerance mechanisms are substitute for a reliable backup solution. Regular backups to an offline, and preferably offsite, medium enable you to restore files, volumes, or entire servers when these types of disasters occur.

Summary Planning is a critical part of a file server deployment. Your deployment plan should specify how many file servers you need, what hardware they should have, how you will configure them, how you will share the server data, and how you will protect the data. The Disk Management snap-in is the primary interface you use to initialize, partition, and format disks.

Summary Windows Server 2008 supports two hard disk partition types: MBR and GPT; two disk types: basic and dynamic; five volume types: simple, striped, spanned, mirrored, and RAID-5; and two file systems: NTFS and FAT. Creating folder shares makes the data stored on a file server s disks accessible to network users.

Summary Windows Server 2008 has several sets of permissions that operate independently of each other including NTFS permissions, share permissions, registry permissions, and Active Directory permissions.

Summary NTFS permissions enable you to control access to files and folders by specifying the tasks individual users can perform on them. Share permissions provide rudimentary access control for all of the files on a network share. Network users must have the proper share and NTFS permissions to access file server shares. Mapping drive letters with logon scripts makes shared folders easily available to network users.