CSS CORE UNIT 3

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 67

CORE UNIT 3

SAIT JAMES ACADEMY OF SKILLS TECHNOLOGY, INC.


Brgy. Hika, Poblacion, Compostela, Cebu
Philippines

SECTOR : ELECTRONICS SECTOR


QUALIFICATION TITLE : COMPUTER SYSTEMS SERVICING NC II
UNIT OF COMPETENCY : SET-UP COMPUTER SERVERS
MODULE TITLE : SETTING-UP COMPUTER SERVERS

LEARNING OUTCOME NO.1: SET-UP USER ACCESS


LEARNING OUTCOME NO. 2: CONFIGURE NETWORK SERVICES
LEARNING OUTCOME NO.3: PERFORM TESTING, DOCUMENTATION AND PRE
DEPLOYMENT PROCEDURES

1
Information Sheet 3.1-1

INTRODUCTION TO SERVER CONFIGURATION

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Understand the basic concepts of a client server network.
2. Identify and define the basic terms use in server configuration.
3. Familiarize the several types of server operating systems.

Introduction
A client server network is a system where a computer named a server is used to provide
resources to other computers named clients. A server is a computer that can participate in a
client/server network to hold resources and items that other computers would need:

A server is primarily a regular computer. To create a client/server network, first identify the
computer that you will use as the server. You can use an existing computer or purchase a new one.
When planning the server, if you plan to use one of your (existing) computers as the server, check its
hardware and make sure it meets the necessary hardware requirements.
A server is a computer, a device or a program that is dedicated to managing network
resources. Servers are often referred to as dedicated because they carry out hardly any other tasks
apart from their server tasks. There are a number of categories of servers, including print servers,
file servers, network servers and database servers.
A network server is a computer designed to act as central repository and help in providing
various resources like hardware access, disk space, printer access, etc., to other computers
in the network. It helps in simplifying the different tasks for system administrators including
those centering around management.

2
A print server is a computer that can process print-related jobs on a network of computers.
Print servers are connected to a computer network in order to serve the need for printing
jobs in a network that may contain more than one printer.
A file server is a computer responsible for the central storage and management of data files
so that other computers on the same network can access the files. A file server allows users
to share information over a network without having to physically transfer files by floppy
diskette or some other external storage device. In Windows Server 2008, the File Server role
service installs the Share and Storage Management console for Microsoft Management
Console (MMC). The Deploying File Server default in Windows Server 2008 installation
includes all of the components needed for a basic file server deployment. You can manage
the server’s disk drives, share folders, and map drives and control access to those shares
with no additional software installations.
A server operating system (OS) is a type of operating system that is designed to be installed
and used on a server computer. It is an advanced version of an operating system, having features
and capabilities required within a client-server architecture or similar enterprise computing
environment.
Some common examples of server OSs include:
 Red Hat Enterprise Linux
 Windows Server
 Mac OS X Server
Some of the key features of a server operating system include:
 Ability to access the server both in GUI and command-level interface
 Execute all or most processes from OS commands
 Advanced-level hardware, software and network configuration services
 Install/deploy business applications and/or web applications
 Provides central interface to manage users, implement security and other administrative
processes
 Manages and monitors client computers and/or operating systems
Windows Server 2008 is an operating system that enables core IT resources, such as file and
print sharing, remote access, and security. It provides a network foundation from which you can
centrally manage settings on your computers that are based on the Windows® operating system,
and upon which you can run the most popular business applications. It also provides a familiar
Windows user experience that helps you manage users and safeguard business information.It
supports numerous physical interfaces including Universal Serial Bus (USB), IEEE 1394 (FireWire),
parallel (LPT), serial (COM), Infrared Data Access (IrDA), Bluetooth ports, and network printing
services such as LPR, Internet Printing Protocol (IPP), and standard TCP/IP ports.
A Windows Server 2008 computer must be running the Simple Mail Transfer Protocol
(SMTP) service to be able to send email messages.
The Routing and Remote Access service (RRAS) in Windows Server 2008 supports remote user or
site-to-site connectivity by using virtual private networking (VPN) or dial-up connections.
Network Policy Server (NPS) is the Microsoft implementation of a Remote Authentication
Dial-In User Service (RADIUS) server and proxy in Windows Server 2008. NPS is the replacement for
Internet Authentication Service (IAS) in Windows Server 2003. NPS performs centralized connection
authentication, authorization, and accounting for many types of network access, including wireless
and virtual private network (VPN) connections.

3
A Terminal Services Gateway (TS Gateway) connection enables authorized remote users to
connect to terminal servers and to remote desktops on the corporate network from any Internet-
connected device that is running Remote Desktop Connection (RDC) 6.0.
In a network, to exchange information or to share resources, computers communicate using
languages also called protocols. One of the languages or protocols is called Transmission Control
Protocol or TCP. Another language is called Internet protocol or IP. These two languages are usually
used together in a combination named TCP/IP.
The Domain Name System, named DNS, is a language (again, named a protocol) that allows
the server that receives (or is provided) the name of a computer. Then the server checks a list (called
a table) that has the names of computers and their corresponding IP addresses. That way, the server
can locate, through the IP address, the intended computer.
A DHCP server is an application, or rather a service, that automatically assigns an IP address
to a member of the network that needs an IP address.
Network File System (NFS) is a distributed file system protocol originally developed by Sun
Microsystems in 1984, allowing a user on a client computer to access files over a computer network
much like local storage is accessed. NFS, like many other protocols, builds on the Open Network
Computing Remote Procedure Call (ONC RPC) system. The NFS is an open standard defined in
Request for Comments (RFC), allowing anyone to implement the protocol.
An NFS server exports part of its file system and the NFS client integrates the exported
information, a process called “mounting,” into its own file system. The client can then access the
server’s files as if they were a local resource.
Distributed file System (DFS) is a set of client and server services that allow an organization
using Microsoft Windows servers to organize many distributed Server Message Block (SMB) file
shares into a distributed file system. DFS provides location transparency and redundancy to improve
data availability in the face of failure or heavy load by allowing shares in multiple different locations
to be logically grouped under one folder, or DFS root.A DFS namespace by itself can simplify the
process by which users locate the files they need. However, if people all over the network need
access to the same file, the requests are still directed to the same file server, which can cause a
performance bottleneck in the computer itself or on the subnet where the file server is located. By
replicating shared folders to multiple servers, DFS can distribute the access requests, thus
preventing any one server from shouldering the entire traffic load. This is called load balancing.
Windows Server 2008 DFS uses Remote Differential Compression (RDC), a protocol that
conserves network bandwidth by detecting changes in files and transmitting only the modified data
to the destination. This conserves bandwidth and greatly reduces the time needed for the
replication process.
Windows operating systems rely on a protocol called Server Message Blocks (SMB) for their
file sharing. However, in the UNIX world, the standard is the Network File System (NFS).
Server Configuration
When you have finished installing Microsoft Windows Server 2008 R2, a window titled Initial
Configuration Tasks may come up:

4
The Initial Configuration Tasks window is used to perform the most fundamental or routine
operations of Microsoft Windows Server 2008 R2. This window displays when the computer starts.
If you don't want to come up like that, click the bottom check box. If it doesn't come up when the
computer starts, to restore this window, click Start -> Run, type oobe and press Enter.
After installing the operating system, there are a few things you should (must) do before
continuing:
 You must make sure the computer is connected to the Internet
 If this is the first computer, you must make it a domain controller (this is not a requirement if
the computer will not be a domain controller; if you don't (yet) know what a domain
controller is, don't worry about that now)
 In the Initial Configuration Tasks window, click Provide Computer Name and Domain:

 In the Computer Name property page, click Change...


 Accept or change the name of the server

5
 Click OK
 A dialog box will ask you to restart your computer. Click OK

 Click Close
 Click Restart Now
Assigning an IP Address to the Server
Every computer on the network needs an IP address so that other computers of the network
can locate it (just like every house needs a physical address so that the post office and other people
can find it).
A computer has two main ways of getting an IP address:
 A server, called a DHCP server (the word "server" here represents an application; it doesn't
have to be a different server than the one you installed), can automatically assign (provide)
an IP address to each computer
 You can manually assign an IP address to each computer. Of course, you need to know a
little bit about something named TCP/IP, which means you would need to know how to
create and assign IP addresses
To assign an IP address to a server (that runs Microsoft Windows Server 2008 R2):
 In the Initial Configuration Tasks, click Configure Networking

6
 On the Taskbar, click Start and click Network. In the left frame, right-click Network and click
Properties. Click Local Area Connection. In the Local Area Connection Status dialog box, click
Properties
To assign an IP address to the server:
a. Click Start
b. Right-click Network and click Properties

c. Click Local Area Connection


d. Click Details. Make note (on a piece of paper) of the address on the right side of IPv4
Address:

(For our example, we are building a small network and we will just use a small range of IP addresses.
In the real world or for a large network, you would need to actually know TCP/IP, design a range of
IP addresses you plan to use, then assign those IP addresses, or design a way to assign the IP
addresses to the computers)

7
e. Click Close
f. In the Local Area Connection Status dialog box, click Properties
g. In the checked list box, click Internet Protocol Version 4 (TCP/IPv4)

h. Click Properties
i. Click Use the Following IP Address
j. Type the IP address you want the server to use. For our example, and based on the above
dialog box, we type 192.168.001.001
k. Press Tab
l. Type the subnet mask (normally, it should be added automatically when you press Tab from
the previous IP address text box) and press Tab
m. Type the default gateway address (use the first and the second octets of the IP address you
had provided (such as 192.168) and use 001.001 for the other two bytes)
n. Provide the Preferred DNS server address (we use 127.0.0.1 for our example) and the
Alternate DNS Server address (we leave ours empty)

8
o. Click Advanced to check the values that were put in the IP Settings and DNS property pages
p. Click OK
q. Click OK
r. Click Close
s. Click Close
Installing DNS server
The Domain Name System, named DNS, is a language (again, named a protocol) that allows
the server that receives (or is provided) the name of a computer. Then the server checks a list (called
a table) that has the names of computers and their corresponding IP addresses. That way, the server
can locate, through the IP address, the intended computer.
To make this description possible in your network, you can install an application named DNS
server. To do this:
a. From the Initial Configuration Tasks, click Add Roles
(an alternative is to click Start -> Server Manager, then in the left frame, right-click Roles and
click Add Roles)
b. In the first page of the wizard, titled Before You Begin, read the text and click Next
c. In the second page of the wizard, click the check box of DNS Server

9
d. Click Next
e. In the third page of the wizard, titled DNS Server, read the text and click Next
f. Click Install
Creating a Domain Controller
If you are creating a new network, one of your computers should (must) be able to manage
access to the computers and resources that belong to the network. That is, a central computer,
named a server, must be able to allow or deny access (this is called authentication) of the network
and its resources to people. That central computer, that server, is named a domain controller. The
first server you install usually should (must) be made a domain controller.
The Active Directory Installation Wizard, dcpromo, will guide you through adding a domain
controller to an existing environment, creating an entirely new forest structure, adding a child
domain to an existing domain, adding a new domain tree to an existing forest, and demoting
domain controllers and eventually removing a domain or forest.
To create a domain controller, you must promote your server (to a domain controller). To do
this:
a. Open the Command Prompt (Start -> Command Prompt, or Start -> All Programs ->
Accessories -> Command Prompt
i. Type CD\ and press Enter to return to the root of the disc
ii. Type dcpromo (which stands for Promote This Computer to a Domain Controller)
and press Enter
A small window will come up:

10
A wizard will start:
a. In the first page of the wizard, read the text and click Next

b. In the second page of the wizard, read the text and click Next

11
c. In the third page of the wizard, click Create a New Domain In a New Forest

d. Click Next
e. The next page asks you to create a fully-qualified domain name (FQDN). Enter a name made
of two or three parts. Examples are example.local or learning.example.com. Remember
that the computer already has a name and every computer on the network has or will have a
name. So this is what will happen with the name you give:
a. If you give a name in two parts such as example.local or example.com, the network
name to use from a browser to access this computer will
be ThisComputerName.example.local orThisComputerName.example.com. This
means that this is the name the other computers will use to "intranetly" or "webly"
access its resources. This means that, later on, you can create a web site stored in a
computer (in a server or a workstation), share resources of that computer, and make
those resources available so that other computers can access those resources from a
browser

12
b. If you give a name in three (or more) parts such
as support.example.local or intranet.example.local orWhatSUp.example.local or su
pport.example.com or intranet.example.com orWhatSUp.example.com or
anything like those, the network name of this computer will
beThisComputerName.support.example.local or ThisComputerName.intranet.exa
mple.local orThisComputerName.WhatSUp.example.local or ThisComputerName.s
upport.example.com orThisComputerName.intranet.example.com or ThisCompute
rName.WhatSUp.example.com. That's the name the other computers will use to
access this computer from a browser
There is no rule as to whether the name you use (in two parts or more parts) is bad. You just
have to decide and keep the scheme in mind.
For our example, we are using functionx.local

f. After specifying the FQDN, click Next. A window will start some operations:

g.

13
h. When a dialog box comes up, read its text and click Next

i. On the next page, read the text and click Next. A window will come and start performing
some operations:

14
j. Click Next

k. Click Next. If you didn't create (assign) an IP address on (to) the server, a dialog box will
come up, about IP address assignment:

In you didn't assign an IP address to the server; it means you plan to use a DHCP server that
will automatically assign IP addresses to the computers of the network. In this case, click
Yes,...

15
l. A dialog box comes up

m. Read the text and click Yes

n. In the next page of the wizard, click Next

o. The next page asks you to specify the administrator's password. Click the Password text box
and type the password

16
p. Click the Confirm Password text box and type the same password

q. After specifying the password, click Next

17
r. Click Next. A new dialog box will start performing an operation:

This may take a while

s. Click Finish

18
t. A new dialog box will ask you to reboot:

Therefore, click Restart Now

u. When the computer comes up, press CTRL + ALT + DELETE and log in
v. Press Tab to access the other text box and type the same password

w. Click the right-pointing button or press Enter

19
x. A message will tell you that Your Password Has Been Changed.

Click OK

y. When asked to login, press Ctrl + ALT + DELETE

z. Enter the password and press Enter

20
Self-Check 3.1-1

Multiple Choice:
Instruction: Read each item carefully and choose the best answer. Write the letter of your choice on
your answer sheet.

1. Which type of computer designed to act as central repository and help in providing various
resources like hardware access, disk space, and printer access to other computers in the
network?
a. Network server
b. Database server
c. Print server
d. File server
2. Windows Server 2008 supports numerous physical interfaces EXCEPT for which interface?
a. Universal Serial Bus (USB)
b. Infrared Data Access (IrDA)
c. Video Graphics Array (VGA)
d. Bluetooth ports
3. Which role service selection allows you to install the Share and Storage Management
console for Microsoft Management Console (MMC)?
a. DFS Namespaces
b. File Server Resource Manager
c. File Server
d. Windows Search Service
4. What will the Windows Server 2008 Deploying File Server default allow you to manage on
the server?
a. Disk drives
b. Share folders
c. Map drives
d. All of the above
5. Which of the following that performs a centralized connection authentication, authorization,
and accounting for many types of network access, including wireless and virtual private
network (VPN) connections?
a. Domain Name System (DNS)
b. Network Policy Server (NPS)
c. Terminal Services Gateway (TS Gateway)
d. Network File System (NFS)

21
Information Sheet 3.1-3

CONFIGURE USER ACCESS LEVEL IN


WINDOWS SERVER 2008 R2

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Configure user access level in Windows Server 2008 R2
2. Add a user to a group
3. Modify and change permission.

Introduction:
Managing a User Account's Rights: Adding a User to a Group

Some of the operations you will perform on the network require that the account have the
appropriate rights (also called permissions). An administrator's account is one that can do anything
on the network, such as creating users accounts or adding computers to the network.

To make a user account becomes an administrator, on the server:


a. Click Start -> Administrative Tools -> Active Directory Users and Computers
b. In the left frame, expand the domain's node
c. Click Users
d. Double-click the user name whose rights you want to manage (or right-click that user name
and click Properties)
e. Click Member Of
f. Click Add...
g. In the bottom text box (where the caret is blinking), type admin.
h. Click Check Names

i. Make sure Administrators is selected and underlined.

22
Click OK
j. Click OK
Other Option:
In the right frame, double-click Domain Admin or right-click it and click Properties. Click
Members:

23
Click Add...

In the bottom text box, you can type just the username of a user:

Click Check Names:

24
Click OK:

Click OK.

NTFS Permissions:
When you open the Properties dialog box for a system element and look at its Security tab,
the NTFS permissions you see are called standard permissions. Standard permissions are
actually combinations of special permissions that provide the most granular control over the
element.

25
1. Select the tab Security.

26
2. Select Advanced button.

3. Select change permissions.


4. Uncheck “Include inheritable permissions from this object’s parent”.

27
5. Click on Add when the warning prompt pops up.

6. Select Users and hit remove (Do this for both if you have two field with user
permissions)
7. Select Add and add the Authenticated Users group.
8. At Apply To: Select: This folder only.
9. For the permissions select allow for: Traverse folder / execute file, List folder/read
data, Read attributes, Read extended attributes, Read permissions.

28
10. Click OK, Click OK, and Click OK again.
11. Now your Security tab should look like the image below.

Share and storage management:

1. Go to Start > Administrative Tools > Share and storage management.

2. Select the share you just created: Users$.


3. Right click and select Properties

29
4. Click on the Advanced button.

5. Check the check box Enable access-based enumeration.

6. Click OK.
7. Close out the Share and storage management console.

30
Active Directory:
On Your Domain Controller.

1. Go to Start > Administrative tools > Active directory users and computers.
2. Navigate to the User you want to add the User folder to.
3. Right click and select properties on the user.
4. Select the profile tab.
5. Under the section Home folder: Select the Connect radio button.
6. Select the letter U:\
7. In the To: Text area type: \\YOURSERVER\Users$\%username%(if your server with
the share’s name is ella it would be \\ELLA\Users$\%username%)
8. Click OK
9. Close Active Directory Users and Computers.
If you now browse to the Users$ share folder on the server you created it on. You
will notice a folder in it with the users username as the folder name. If you check the
permissions for the folder the right permissions have automatically been applied. This
technique will definitely save you lots of time as if you were doing it via old net use scripts.
Congratulations you have successfully added a user folder share and added it to a user.
Please note that this can be done to multiple users at once, all you do is select all the
users in active directory and add the user share to the users.
The largest container object within Active Directory is the forest. The forest container
defines the fundamental security boundary within Active Directory, which means that a user
can access resources across an entire Active Directory forest using a single logon/password
combination.

Self-Check 3.1-3
Part I. True or False. Read each statement carefully. Write T if the
statement is true and write F if the statement is false. Write your answer on
the separate sheet.
___1. A printer is the hardware interface through which a computer
communicates with a print device.
___2. Active Directory relies on DNS to provide a locator service for clients
on the network.
___3. Configuring role services as you install them saves time and effort
later.
___4. For enterprise networks, creating workgroups is the recommended
method for managing quota assignments on a large scale.
___5. Only the primary domain controller of the entire forest must be
running an operating system supported by the targeted forest functional
level.
___6. The default location for the Active Directory database and log files is
C:\Windows\System32.
___7. To raise the domain functional level of a domain, use the Active
Directory Domains and Trusts console.

31
___8. Windows Server 2008 supports the UNIX and Linux file server clients
with Server Message Blocks (SMB).
___9. You can launch the Active Directory Installation Wizard using the
dcpromo.exe command-line tool or from the Server Manager utility that’s
installed in the Administrative Tools folder of each Windows Server 2008
server.
___10. You must install the File Services role to use the Distributed File
System.

Part II. Multiple Choice. Read the each item carefully. Choose the correct
letter which represents the best answer. Write your answers on a separate
sheet.
1. What tab of a file or folder’s properties can you locate the NTFS
permissions?
a. Sharing
b. Permission
c. NTFS
d. Security
2. Which of the following is not a type of user account that can be
configured in Windows Server 2008?
a. Local accounts
b. Domain accounts
c. Network accounts
d. Built-in accounts
3. Which of the following groups that are a collection of user accounts that
are local to one specific workstation or member server?
a. Distribution
b. Local
c. Built-in
d. Security
4. Which of the following that performs a centralized connection
authentication, authorization, and accounting for many types of network
access, including wireless and virtual private network (VPN) connections?
a. Domain Name System (DNS)
b. Network Policy Server (NPS)
c. Terminal Services Gateway (TS Gateway)
d. Network File System (NFS)
5. Which of the following groups that are non-security related groups
created for the distribution of information to one or more persons?
a. Security
b. Domain
c. Distribution
d. Local
6. Standard permissions are actually combinations of what other type of
permissions, which provide the most granular control over the element?
a. Extended permissions
b. Altered permissions
c. Special permissions
d. Granular permissions

32
7. Which type of computer designed to act as central repository and help in
providing various resources like hardware access, disk space, and printer
access to other computers in the network?
a. Network server
b. Database server
c. Print server
d. File server
8. Windows Server 2008 supports numerous physical interfaces EXCEPT
for which interface?
a. Universal Serial Bus (USB)
b. Infrared Data Access (IrDA)
c. Video Graphics Array (VGA)
d. Bluetooth ports
9. Which role service selection allows you to install the Share and Storage
Management console for Microsoft Management Console (MMC)?
a. DFS Namespaces
b. File Server Resource Manager
c. File Server
d. Windows Search Service
10. What will the Windows Server 2008 Deploying File Server default
allow you to manage on the server?
a. Disk drives
b. Share folders
c. Map drives
d. All of the above
11. What protocol conserves network bandwidth by detecting changes in
files and transmitting only the modified data to the destination?
a. Remote Desktop Protocol
b. Remote Differential Compressions
c. Load Balancing Protocol
d. Server Message Block
12. A Windows Server 2008 computer that has been configured with the
Active Directory DS role is referred to as a __________.
a. Domain controller
b. Domain manager
c. Global catalog
d. DNS server
13. What command can you use to run the Active Directory Installation
Wizard?
a. Adpromo
b. Dcpromo
c. Domainpromo
d. Adcreate
14. DFS can distribute access requests by using what feature, thus
preventing any one server from shouldering the entire traffic load?
a. Data distribution
b. Load balancing
c. Data collection
d. Server clustering

33
15. An NFS server exports part of its file system and the NFS client
integrates the exported information into its own file system. What is this
process called?
a. Mounting
b. Installing
c. Expanding
d. Exporting
16. Windows Server 2008 computers must run which protocol service to
send email messages?
a. Email Router Protocol (ERP)
b. Default Email Protocol (DEP)
c. Simple Mail Transfer Protocol (SMTP)
d. Simple Modem Target Protocol (SMTP)
17. The _____ enables you to simplify access to the shared folders on a
network by setting up folders to appear as though they are accessed from
only one place.
a. Encrypted File System
b. Distributed File System
c. Dispersed File System
d. Extended File System
18. What special identity group contains all authenticated users and
domain guests?
a. Shares
b. Power Users
c. Everyone
d. Local
19. What is the main purpose of the Active Directory?
a. Provide authentication and authorization to users and computers.
b. Provide File and Print services
c. Give administrators the ability to control access to restricted
hardware
d. Allow users to organize their files systems into a cohesive and high
performance directory structure
20. What process applies Group Policy settings to various containers within
Active Directory?
a. Attaching
b. Linking
c. Connecting
d. Nesting

34
Information Sheet 3.2-1

CHECKING NORMAL SERVER FUNCTION


Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Understand what is the normal function of a server
2. Determine how to improve performance of the server
3. Will be able to check and perform maintenance of the server

Introduction:

Checking normal function of a server

You can say Microsoft Windows Servers have a tendency of slowing down over time. Your
Windows Server can go slowly owing to many possible factors, however the following are seen as
the major factors of them. Analyzing each of them carefully will help you to determine the root
cause of the problem.
 Over usage of RAM
 High CPU Utilization
 High Disk I/O
 High Network Utilization
These four key server hardware components that can be altered to improve performance.
Three of these components are internal (i.e., CPU, memory, disk) and the fourth component is the
gateway to the network. Let we discuss each issue one by one.
Over usage of RAM
If your ‘Task Manager’ shows the memory usage up to 90%, it will not affect the performance
of your server adversely. However, if it exceeds 90% of memory usage, this will surely affect the
normal speed of your server. In order to deal with this, you can either make some memory free by
closing certain applications not being used or else add some extra memory to fix. If none of these
helps you to improve the performance, turn to determine other factors.
Another factor affecting the normal performance of your Server is High Disk I/O

High disc I/O is one more factor that affects the normal functioning of your Server badly. When
the read and write activity on your server disc goes high, your system creates a queue executing all
the tasks one-by-one. Because of this, whole resource of your server is consumed creating a
performance bottleneck.
Reasons for this could be many, but checking
(1) Available Memory;
(2) Available Virtual Memory
(3) How much Cache is utilized
(4) How much bandwidth is available
(5) Network Performance
(6) How much the processor is utilized.

35
It is possible that while you analyze the above you may come across where exactly the problem
causing the high disc i/o lies. Based on where the problem lies, you will need to find the solution
thereof.
High CPU utilization is yet one more factor affecting the smooth performance of your server
When your processor experiences sudden increase in excessive utilization of your CPU, this
may halt your system or even damage it. Many reasons could be responsible for this, but running
multiple heavy applications simultaneously can be said to be the main reason for this. Apart from
this, vulnerability of your server that may eventually allowing virus attack. This suck up all of the
available CPU resource resulting into sudden spikes. Check out which process is loading the CPU.
User can manage which tasks he / she would like to keep running, and terminate high CPU
consuming tasks.
Sometime, some applications start generating sudden and frequent Error Logs and that keeps
on generating every time you attempt to run that application/s. This eventually ends up in piling the
large size error logs making the system performance slower. In all such cases, you will need to
analyze and fix the root cause and thereafter remove the large sized error logs to get rid of this
problem. Or you may want to temporarily disable the error log generation; this will also fix this
problem temporarily.
Increase in high network utilization also makes your Server to run slowly
When the traffic activity on your network reaches to its peak and does not come down, these
results into a slower performance of your Server. For example, if any component starts using >75%
of your network capacity, it is bound to affect the normal function of your server badly.
Many tools are now available that can identify the component/application that sucks up
most resource of your network. Once identified, you can easily fix this and improve the performance
of your server.
Avoid running backup only during the relatively idle hours, so that high business activities and
backup do not conflict. Because this is also one important factor that can affect the performance of
your server. Following image shows an over utilized server:
Other factors responsible for Low Performance of your Server
Certain processes need a significant amount of bandwidth under normal situations. Data
backups, teleconferences as well as virus scanners may cause network utilization to become high; as
a result these will slow down other normal processes too. Disabling automatic virus updates as well
as scanning, will ensure the stability of your server.

Self-Check 3.2-1
ENUMERATION:

1. Another factor affecting the normal performance of your Server is High


Disk I/O
Reasons for this could be many, but checking

36
Information Sheet 3.2-2

DHCP AND REMOTE DESKTOP SERVICES CONFIGURATION

Learning Objectives:
After reading this INFORMATION SHEET, YOU MUST be able to:
1. Understand what is network services
2. Determine what is the services of DHCP server and Remote Desktop connection
3. Configure DHCP server and perform Remote Desktop Connection

Introduction:

Network Services

In computer networking, a network service is an application running at the network


application layer and above, that provides data storage, manipulation, presentation,
communication or other capability which is often implemented using a client-server or peer-
to-peer architecture based on application layer network protocols.
Each service is usually provided by a server component running on one or more
computers (often a dedicated server computer offering multiple services) and accessed via a
network by client components running on other devices. However, the client and server
components can both be run on the same machine.
Clients and servers will often have a user interface, and sometimes other hardware
associated with it.
Examples of Network Services:
Examples are the Domain Name System (DNS) which translates domain names to
Internet protocol (IP) addresses and the Dynamic Host Configuration Protocol (DHCP) to
assign networking configuration information to network hosts. Authentication servers
identify and authenticate users, provide user account profiles, and may log usage statistics.
E-mail, printing and distributed (network) file system services are common services on
local area networks. They require users to have permissions to access the shared resources.
DHCP Server
A DHCP Server is a network server that automatically provides and assigns IP
addresses, default gateways and other network parameters to client devices. It relies on the
standard protocol known as Dynamic Host Configuration Protocol or DHCP to respond to
broadcast queries by client. A DHCP server automatically sends the required network
parameters for clients to properly communicate on the network. Without it, the network
administrator has to manually set up every client that joins the network, which can be
cumbersome, especially in large networks. DHCP servers usually assign each client with a
unique dynamic IP address, which changes when the client’s lease for that IP address has
expired.

37
The figure above shows how DHCP server works. DHCP server assign unique dynamic IP
address to each client PC.

DHCP Configuration

Back to the Server and Open oobe and click Add Role, Check DHCP Server then Click
Next.

38
a. Click next.
b. Check Network connections 192.168.1.2 and Click Next. Parent domain will be visible
and Click validate preferred DNS Server address then finally Click Next.

c. Click WINS is required for application on the network and type Server IP Address
(192.168.1.2).

d. At this moment, Click Add and Add Scope box will appear and create scope name:

Example:

a. After creating scope name, create a Starting and Ending IP Address, Click OK

39
b. Click Next, the Choose Disable DHCPv6 mode for this Server and Click Next

c. Choose current credentials and Click Next and finally Click Install.

d. Go to the client PC and right click network, click properties and click change adapter
settings. Right click ethernet and click properties. Double click Internet Protocol Version 4 (TCP/IP
v4). Click obtain an IP address automatically and obtain DNS server automatically. Click OK.

40
REMOTE DESKTOP SERVICES

Remote Desktop Services in Windows Server® 2008 R2 provides technologies that


enable users to access Windows-based programs that are installed on a Remote Desktop
Session Host (RD Session Host) server, or to access the full Windows desktop. With Remote
Desktop Services, users can access an RD Session Host server from within a corporate
network or from the Internet.

a.Click Start -> Run, type oobe and press Enter. Add roles and Check Remote Desktop
Services and Click Next

41
b. Click Next – In Select Role Services – Check Remote Desktop Session Host – Choose Install
Remote Desktop Session Host and Click Next.

a. Choose Require Network Level Authentication and Click Next – Choose Configure later then
Click Next

d. Click Next – Click Next and Click Install

42
This may take a moment… After the installation proceed to the Client computer.

43
b. Go to Start and Click Remote Desktop – connect to the Domain
(training.com) Click Connect. Logon using Server account (user name:
administrator / password: P@ssword) Click OK

d. It will then connect to the domain (training.com) – Click Yes – Now you are connected to
the Server Account remotely, the windows server environment will be seen.

44
You now have created a Server Account with Administrator Rights which you can use
as a Remote Desktop.
Now, open remote desktop and connect to server (training.com) then log-on the user
(admin101).

SERVER COMPUTER CLIENT COMPUTER

Self-Check 3.2-2
ENUMERATION:

1. Examples of Network Services:

45
Information Sheet 3.2-3

TIPS IN RESPONDING TO UNPLANNED


EVENTS OR CONDITIONS

Learning objectives
After reading the INFORMATION SHEET, YOU MUST be able to:
1. Identify the different techniques and basic tips in handling unplanned events and conditions.

Introduction:

When unforeseen events occur that require repair or damage control, it can be a huge hit to
our budget and timeline. However, there are some things to do to mitigate and handle damages
effectively, including creating a contingency plan. Inorder to have the best responses to unforeseen
events that affect projects.
Tips:
1. Create a Contingency Plan
A contingency plan is like a plan B for all of the things that could go wrong on a project.
Contingency plans should be created after assessing all risks to the project and all potential
unforeseen events. After the assessment, execs and project managers should work to create
effective ways to handle or solve the problems those possible risks would cause, giving organizations
a guide to overcoming them, should they ever happen.
2. Designate someone Who Handles Responses Ahead of Time
Before the project begins, designate who will handle responses to the unexpected.
Responses usually have four phases:
 First response: Gather information about what exactly happened and have a meeting of
stakeholders to decide how to proceed.
 Implementation of necessary safeguards: After the damage has been assessed and
discussed, implement any safeguards to prevent any more damage. Also, come up with a
plan to get the project back on track.
 Learning: The last part of response is analyzing the event and the response to figure out
what worked, how the event happened, and how operations can be improved.
 Triage: This is the immediate action that must be taken to stop losses or overruns.
Before the project begins, designate who handles what task. A triage team should handle
the first stage of response. A communications team should bring together a meeting of stakeholders
and let customers and employees know the status of the project. Finally, an IT team should help
handle things like data backups and other vital network operations.

3. Don’t take too long


While it's good to make smart decisions if something goes wrong on a project, time is usually
of the essence in these situations, so it's more important to execute a good plan than to take too
much time trying to execute a perfect one. Taking too long to create a plan and respond to the
unforeseen can result in major losses or overruns.

46
4. Assess the Budget
We should all build a contingency plan. There's a good chance that a plan is already in place
for most unforeseen events. However, we think it's essential to make sure the cost of that plan is
assessed to ensure the organization can afford it. A tip for making a successful contingency plan
before a project starts is to include multiple options for responses to the unexpected. Try to include
an ideal option and one that can be taken advantage of is money is tight and there's not as much
wiggle room.
Managing a project can be rewarding, but it can have its fair share of challenges, especially
when unexpected events arise. By planning properly, designating roles, spending wisely and acting
quickly, it's possible to ensure that a team is ready to handle anything and that the project succeeds,
no matter what comes its way.

Self-Check 3.2-3

ENUMERATION:

1. Enumerate the four tips in handling unplanned events and conditions.

Information Sheet 3.3-1

PERFORM TESTING, DOCUMENTATION


AND PRE-DEPLOYMENT PRACTICES

Learning Objectives
After reading the INFORMATION SHEET, YOU MUST be able to:
2. Determine the hardware that is needed to implement an application
deployment
3. determine what users are likely to experience when they are using
your planned infrastructure and whether Service Level Agreements
(SLAs), Operating Level Agreements (OLAs), and Operating Level
Requirements (OLRs) are met or not

47
Introduction:

Pre-Deployment Sizing Best Practices


During the infrastructure planning phase for your IT environment, System Center Capacity
Planner 2007 can help you create a pre-deployment sizing model. You can use the following
best-practice guidelines as you develop your infrastructure plan:
1. Identify key scenarios Identify the scenarios in which performance is important and
the scenarios that pose the most risk to performance objectives.
For example, suppose you want to deploy Exchange Server 2007 to one Mailbox site
that is connected to two client-only sites by a T1 network connection. Users at the
client-only sites access their e-mail messages over the T1 connection, so there needs
to be sufficient network bandwidth for the e-mail workload.
2. Identify workload Identify the workload as it applies to each scenario. You can use
Capacity Planner to enter workload information to model your scenario. For
example, you might have the following workload requirements:
o You need to support 5,000 Outlook Cached users.
o All users send 10 percent of their e-mail to Internet recipients.
3. Identify performance objectives Define and enter performance objectives for each
of your key scenarios in Capacity Planner. Performance objectives reflect business
requirements, such as meeting workload requirements and SLAs, and they usually
include the following:
o Response time—For example, Microsoft Outlook Web Access transactions
should not take longer than 2 seconds to complete.
o Throughput—For example, the system should support 100 transactions per
second.
o Resource utilization—For example, a server should not use more than 50
percent of its available processor power.
4. Identify budget and hardware resources Identify your budget, which establishes
resource constraints. For example, how many servers can your organization afford?
Common resources to consider include the following:
o CPU
o Memory
o Disk usage
o Network usage
o Hardware price
5. Allocate budget You can use exported Microsoft Excel workbooks from Capacity
Planner to add details about the cost of hardware to help you calculate the budget
for the deployment.
In terms of budgeting time and device utilization, latency of transactions and
percentage of device utilization is calculated by Capacity Planner. This is done by
simulating the server application, hardware devices, and projected user load.
6. Evaluate your design against objectives and budget. Repeat this step as often as
necessary. You might have to modify your design or allocate your resource budget
differently to meet performance objectives.
Capacity Planner can help you accomplish the following tasks:
o Modify your design.
o Reevaluate requirements.

48
7. Validate your model and estimates. Repeat this step as often as necessary. This is an
ongoing activity and includes prototyping, assessing, and measuring.The further
along you are in your project's life cycle, the greater the accuracy of the validation.
Validation is based on available benchmarks or on a proof of concept in a lab
environment.
Creating Copy of Deployment Procedure
The first step towards customizing a Deployment Procedure is to create a
copy of the default Deployment Procedure that is offered by Enterprise
Manager Grid Control. Note that only a copy can be edited and customized
with your changes; the default Deployment Procedures must always and will
always remain unchanged.
To create a copy of a default Deployment Procedure, follow these steps:
1. In Grid Control, click the Deployments tab.
2. On the Deployments page, from the Deployment Procedure Manager
section, click Deployment Procedures.
3. On the Deployment Procedure Manager page, select the Deployment
Procedure you want to customize, and click Create Like.
4. On the Create Like Procedure page, edit the procedure to customize it
according to your needs, and click Save.
Step by Step for Exchange Server 2007 Deployment Planning
In this end-to-end Exchange Server 2007 usage scenario for System Center Capacity
Planner 2007, Woodgrove National Bank is considering replacing its current e-mail
infrastructure with Microsoft Exchange Server 2007. You are the messaging administrator at
Woodgrove National Bank who has been charged with planning a possible Exchange
Server 2007 migration.
In this Capacity Planner scenario for deploying Exchange Server 2007, you use all the
features of Capacity Planner to model the hardware, software, and network infrastructure.
Using a portfolio of capacity models to simulate multiple infrastructure deployments, you
present the results to your management, seeking purchase authorization for the necessary
hardware and software needed for the deployment.
You need to create multiple infrastructure deployment models because there might be a
variety of issues that you might want to consider. For example, your company, Woodgrove
National Bank, is interested in all of the following results and goals:
 Capacity
 Availability
 Security
 Fast transaction latencies
 Cost
 Future growth needs of the organization
Based on the preceding factors, you perform a number of tasks to model
deployments of Exchange Server 2007 infrastructures, as shown in the following diagram.

49
From the set of capacity models that you produce, you review the results to build a
compelling business case that justifies recommended hardware purchases to support the
single-most preferred capacity mode
Steps to Create Exchange Server Clients
At this stage of the Exchange Server 2007 scenario for System Center Capacity
Planner 2007, you add Exchange Server clients to a site. You can repeat this step when you
need to add additional client profiles that uniquely identify a group of users with similar
resources.
To create Exchange Server clients
1. In the Model Editor, open the site that you want to add Exchange Server clients to.
2. Click Add a client profile.

50
3. Enter a client profile name in the Name box and the number of users in the Count
box.
4. In the Select usage profile list, select the client usage profile that most closely
describes the amount of information that is sent to and from an Exchange Server
client.
If the available client profiles do not accurately represent how users use their
Exchange Server client, you can use the Edit Usage Profile task to define a new usage
profile client template.
5. In the Component list, click the type of Exchange client that users of the profile use,
and then click the SiteName\ServerName to associate the component to the Mailbox
server.
6. Select the Network the clients use to connect to Exchange Server with, and then
select the Bandwidth that the clients have.

Self-Check 3.3-1
Test I. ENUMERATION.

1. Write the Procedure in Creating Copy of Deployment Procedure (10


pts.)

Information Sheet 3.3-2

UNDERTAKE AND CONFIGURE PERIPHERALS/DEVICES

Learning objectives
After reading the INFORMATION SHEET, YOU MUST be able to:
1. Recognize the procedure in configuring peripheral/devices
2. Identify its functions in configuring a peripheral/devices
3. Install and configure peripherals/devices

Introduction:
If you add a first or even second device to a basic system, you may have no conflicts,
but as you add more, the chances are greater for a conflict. Each device uses one or more
resources of the computer, and two devices cannot generally share the same one. If the CD-
ROM, sound card, scanner, etc., that you add uses the same setting as an existing board,
you have to figure out where the conflict is and choose another resource.
ISA, EISA AND Micro Channel Buses

51
The ISA bus was the original PC bus and does not have any advanced installation features.
PCs that used the EISA and Micro Channel buses still had configuration problems, but had
two advantages. First, when a board is added, a setup program was run to install the board,
and conflicts were identified ahead of time. Although you still had to participate in this "plug
and tell" capability, it was better than the "plug and hope" offered by ISA-bus cards.

Secondly, the boards were configurable by software, which eliminated the need to set
switches or jumpers on the boards themselves. If you have to change a setting, you did not
have to pull the board out of the socket in order to do it. You ran the setup program and
selected the configuration option.

The Resources
The PC uses several resources to transfer signals to a peripheral device, and the settings
associated with these resources are often arbitrary.
1. IRQ
2. I/O address (port address)
3. Memory address
Most peripherals use an IRQ and an I/O address. Many use a memory address. When you
install a new board in your PC, you MUST read the installation manual in order to find out
what the initial settings are and how to change them if necessary. If a new board uses the
same setting as an existing board, it won't work properly or at all. Or, it will work and the old
one won't, or both won't work.

Keep a List
If you plan on installing several peripherals in non-Plug and Play PCs, it is IMPERATIVE that
you write down the resources used for each board you install when you install it. It will save
you much time later. Utility programs, such as MSD.EXE, which comes with Windows,
Quarterdeck's Manifest (QEMM386) and Helix's Discover (NETROOM), will help you identify
most current settings, but not all of them.
Make a chart like the one below and keep it handy:

Device IRQ I/O Memory address


COM1
COM2
LPT1
scanner
CD-ROM
IRQ (Interrupt Request)
An interrupt is a method of signaling the computer for attention. There are 16 IRQ lines in a
PC, but only 15 are usable, because one line (IRQ 2) is used to connect the first bank of eight
to the second bank (the early XTs had only eight lines).

If the device uses an interrupt, it must use a unique IRQ line. IRQ settings are changed by
setting DIP switches or changing jumpers on the board itself or by running a setup program.
Just be sure that no two devices use the same interrupt number.

Early expansion boards were preset to one IRQ. If two such boards are preset to the same

52
number and cannot be changed with DIP switches, jumpers or software, they cannot co-
exist in the same PC. Following are the typical IRQ settings.
IRQ Assignment
0 System timer
1 PS/2 port
2 Connects to IRQ 9
3 COM2, COM4
4 COM1, COM3
5 Sound
6 Floppy disk
7 LPT1
8 Real-time clock
9 VGA, 3270 emulation**
10 **
11 **
12 PS/2 port
13 Math coprocessor
14 IDE primary
15 IDE secondary
** For general use.

I/O Address
The I/O address, or port address, is one way a peripheral device is identified, or addressed, from
another. The addresses are numbered in hex; for
example:

280h
290h
2A0h

Like IRQs, they are set with DIP switches or jumpers on the board, or preferably by a
software setup program. If you change settings, you may have to identify that change
elsewhere, such as by changing a parameter in a device= line in the CONFIG.SYS file. Read
the manual for your new device. There is no other source for that kind of information.

If you change I/O addresses and still have a problem, try an address that is one or two
numbers apart on the list. For example, if one board is set to 280h and another at 290h,
change 280h to 270h or 260h and try again. For details on this architecture, see PC I/O
addressing.
Following are the default I/O addresses for the serial and parallel ports on a PC.

Port PC PS/2
COM1 3F8h
COM2 2F8h
COM3 2E8h
COM4 2E0h
LPT1 378h 3BCh

53
LPT2 278h 378h
LPT3 3BCh 278h
Memory Address
A peripheral device often requires a block of upper memory (between 640K-1M) for
transferring data, which must be reserved for its exclusive use. Some common devices, such
as VGA video, use fixed areas in upper memory that are automatically reserved. With other
devices, you have to find an unused block in this area (for a diagram, see PC memory map).

This is why you will usually find a number of memory addresses to select, typically in the
C800h to F000h range (800-960K) so that you can find an unused block without conflict
(hopefully). Addresses are given in hexadecimal as a beginning address or as a beginning
and ending address, for example:

CC00 CC00-CEFF
CE00 or CE00-D0FF
D000 D000-D2FF

When a block is chosen, it is also necessary to inform your memory manager not to load
other drivers or TSRs into it. This may be done by a setup program or you may have to do it
yourself by adding an "exclude" to the line in CONFIG.SYS that loads the memory manager.
For example, EMM386.EXE is the memory manager in DOS 5 and Windows. To exclude the
E800-EFFF block, the x= parameter is added to the device= line as follows:

device=emm386.exe noems x=e800-efff

See DOS EMM386.EXE for more on the above syntax. For other memory managers, such as
QEMM and 386MAX, a similar "exclude" parameter is also used.
If you use Windows, an "exclude" line is also added to the [386Enh] section in the
SYSTEM.INI file; for example:
EMMExclude=e800-efff
If you later change the board to another memory area, both CONFIG.SYS and SYSTEM.INI
must be updated.
DMA - Yet Another!
Although not as frequently used as IRQs and I/O addresses, some peripheral devices, such as
sound cards, use the PC's DMA channels to transfer data directly from memory to memory
without going through the CPU. Like everything else, there is no standard assignment for
DMA channels, and they can conflict.
There are eight DMA channels commonly used as follows. Most sound cards are set to use
DMA channel 1.
DMA Used for
0 8-bit transfer
1 8-bit transfer
2 Floppy disk controller
3 8-bit transfer
4 Cascaded from 0-3

54
5 16-bit transfer
6 16-bit transfer
7 16-bit transfer
How to Configure a Device in Device Manager
To configure a device in Device Manager, follow these steps.
Important Use caution when you configure resource settings for a device. If
you configure resources incorrectly, you can disable your hardware, and you
can cause your computer to stop working. Change resource settings only
when you are sure that the settings that you want to use are unique and do
not conflict with settings for other devices, or when a hardware
manufacturer has provided you with specific resource settings for a device.

1. Log on to your computer as an administrator or as a member of the Administrators


group.
2. Click Start, point to Administrative Tools, and then click Computer Management.
3. Under System Tools in the console tree, click Device Manager.
The devices that are installed on your computer are listed in the right pane.
4. Double-click the type of device that you want to configure -- for example, Ports (COM
& LPT).
5. Right-click the device that you want to configure, and then click Properties.
6. Click the Resources tab.
7. Click to clear the Use automatic settings check box.
Note The Use automatic settings check box is unavailable and appears dimmed, both
on devices for which there are no other settings to configure and on devices that are
controlled by Plug and Play resources and which do not require user modification.
8. In the Settings based on box, click the hardware configuration that you want to modify
-- for example, Basic configuration 0000.
9. Under Resource type in the Resource settings box, click the type of resource that you
want to modify -- for example, Interrupt Request.
10. Click Change Setting.
11. In the Edit Resource dialog box, type the value that you want for the resource, and
then click OK.
12. Repeat steps 8 through 11 to configure the resource settings that you want for the
device.
13. Quit Device Manager.
How to View Resource Settings in Device Manager
To view a list of resources and the devices that are using them by type
or by connection, follow these steps:
1. Click Start, point to Administrative Tools, and then click Computer Management.
2. Under System Tools in the console tree, click Device Manager.
The devices that are installed on your computer are listed in the right pane. The default
view lists devices by type.
3. Use one of the following methods:
 To view a list of resources by type, click Resources by type on the View menu.
-or-

55
 To view a list of resources by connection type, click Resources by connection on
the View menu.

Troubleshooting
Use Device Manager to Search for Device Conflicts
A device conflict occurs when the same resources are allocated to two or more devices. Use
Device Manager to search for device conflicts. To do so, follow these steps:
1. Click Start, point to Administrative Tools, and then click Computer Management.
2. Under System Tools in the console tree, click Device Manager.
The devices that are installed on your computer are listed in the right pane.
3. Double-click the type of device that you want to test -- for example, Sound, video and
game controllers.
4. Right-click the device that you want to test for conflicts, and then click Properties.
5. Click the Resources tab.
Any conflicts that exist for the device are listed under Conflicting device list.
Windows Hardware Troubleshooter
Use the Windows Hardware Troubleshooter to help you troubleshoot and resolve a
hardware conflict or other hardware-related issues. To start the Hardware Troubleshooter,
follow these steps:
Log on to your computer as an administrator or as a member of the Administrators group.
1. Click Start, point to Administrative Tools, and then click Computer Management.
2. Under System Tools in the console tree, click Device Manager.
The devices that are installed on your computer are listed in the right pane.
3. Double-click the type of device that you want to troubleshoot -- for example, Modems.
4. Right-click the device that you want to troubleshoot, and then click Properties.
5. Click the General tab.
6. Click Troubleshoot.

REFERENCES
For additional information about how to modify resource settings in Device Manager, click
the following article numbers to view the articles in the Microsoft Knowledge Base:

269491 Unable to change a resource setting in Device Manager


252420 General description of IRQ sharing in Windows 2000
275180 Windows 2000 claims IRQ-6 settings even if floppy disk controllers are not present
For additional information about how to manage devices by using Device Manager, click the
following article numbers to view the articles in the Microsoft Knowledge Base:
199276 How to manage devices in Windows
244601 How to troubleshoot unknown devices listed in Device Manager
125174 Explanation of error codes generated by Device Manager
How to Add a Peripheral Device
1. Become super user.
2. Follow steps 2 and 3 of "How to Add a Device Driver" if you need to add a
device driver to support the device.
3. Create the /reconfigure file.

56
# touch /reconfigure

4. The /reconfigure file will cause the Solaris software to check for the
presence of any newly installed devices the next time you turn on or boot
your system.
5.

Shut down the system.

# shutdown -i0 -g30 -y

-i0 Brings the system to the 0 init state, which is the appropriate state
for turning the system power off for adding and removing devices.

- Shuts the system down in 30 seconds. The default is 60 seconds.


g30

-y Continues the system shutdown without user intervention; otherwise,


you are prompted to continue the shutdown process.

7. Turn off power to the system after it is shut down.

On SPARC based Platforms ... On Intel based Platforms ...

It is safe to turn off power if It is safe to turn off power if the


the ok or > prompt is displayed. type any key to continue prompt is
displayed.

8. Refer to the hardware installation guide that accompanies your system


for the location of the power switch.
9. Turn off power to all external devices.
For location of power switches on any peripheral devices, refer to the
hardware installation guides that accompany your peripheral devices.
10. Install the peripheral device, making sure the device you are adding has
a different target number than the other devices on the system.
You often will find a small switch located at the back of the disk for this
purpose.
Refer to the hardware installation guide that accompanies the peripheral
device for information on installing and connecting the device.
11. Turn on the power to the system.
The system will boot to multiuser mode and the login prompt will be
displayed.
12. Verify that the peripheral device has been added by attempting to
access the device. See Chapter 26, Accessing Devices (Overview) for
information on accessing the device.

57
How to Add a Device Driver
This procedure assumes that the device has already been added to the
system. If not, see "Adding a Peripheral Device to a System".
1. Become superuser.
2. Place the tape, diskette, or CD-ROM into the drive.
3. Install the driver.

# pkgadd -ddevicepackage-name

-d device Identifies the device path name.

package- Identifies the package name that contains the device


name driver.

5. Verify that the package has been added correctly by using


the pkgchk command. The system prompt returns with no response if
the package is installed correctly.

# pkgchkpackagename
#
Example--Adding a Device Driver
The following example installs and verifies a package called XYZdrv.

# pkgadd XYZdrv
(licensing messages displayed)
.
.
.
Installing XYZ Company driver as <XYZdrv>
.
.
.
Installation of <XYZdrv> was successful.
# pkgchk XYZdrv
#
How to Write a Project Status Report:
The most common type of project report, a project status report provides a general state of
the project to its stakeholders. It quantifies work performed and completed in measurable
terms. It compares this with an established baseline to see if the project is on track or; if
adjustments have to be made if the project is behind its schedule. It keeps everyone on the
same page and manages each other’s expectations.

58
Project status reports are accomplished to serve the following purposes;
1. to keep an updated flow of information in relation to the project’s progress
2. to immediately address issues and concerns that may come up at any point of the
project’s implementation or duration
3. to document reasons for changes and adjustments made to the original plan for the
project
4. to monitor fund utilization and to ensure that the project expenses are still within the
budget
5. to serve as a basis for decision-making and addressing problems
6. to keep track of the team’s performance and individual contributions
7. to act as a uniform procedure for communicating project development to the
stakeholders.
Status reports are most effective when they follow a standard form with predefined fields
that need to be regularly updated. Doing so will save time and provide consistency and
predictability of the information the stakeholders will receive about the status of the
project.

WHAT TO INCLUDE
For a status report to be comprehensive, it must include the following elements:
 Summary/Overall Health of the Project
At a glance, this portion of the status report must provide an overall idea of how the project
is progressing without going into too much detail. A person who does not have time to
read the entire report thoroughly must be able to get a picture of the current status of
the project through the summary of the status report.
 Facts on the Project Progress
The status report must contain full information on accomplishments, timelines, and most
importantly, project milestones. Project milestones are the completion of highly
important tasks. They serve as a standard of project progress management. What
constitutes a project milestone should be identified during the project planning stage.
 Target vs. Actual Accomplishments
It should present a comparison between what has actually been accomplished versus what
was supposed to have been achieved at this point of the project. It should tell us whether
the project is on track, if it is ahead, or if it is behind schedule.
 Analysis
For any variances recorded and reported between the targets and actual accomplishments,
an analysis of the impact on the project should be made and presented in the status
report. The reasons for such differences must also be stated in the report.
 Action(s) Taken
What has been done to address the variances? It is important to give an account of how the
team addressed the variances and other problems that came up during the period
covered by the status report. Additionally,, the report must also include the expected
milestones or accomplishments for the next status report.
 Risks and Issues
The report should contain all the problems and challenges that the team faced and what
they did to address them. The report should also inform the stakeholders of the current
risks to the project.

59
 Resources
The state of resource utilization must also be presented in the status report. It should show
how these resources were used or consumed on a periodic basis. The forecast can also
show if the team is running out of resources and replenishment is needed.
 Budget
Just like the resources, it is also important to present the financial aspects of the project,
most especially, the utilization of its budget. Stakeholders will want to know if the project
is within budget or not. Be prepared with explanations, especially if there are notable
variances in the budget.
 Schedule
Indicate whether the project is operating within its expected timelines, and if it is not,
provide reasons why. This is important since delays or extensions in the plan will entail
additional costs and resources. Additionally,, the report must also include the expected
milestones or accomplishments for the next status report.
Keys to an Effective Project Status Report:
1. Submit the report on time. A status report is time sensitive and sending it late defeats
the purpose of such a report.
2. Giving complete but inaccurate information is just as bad as giving accurate but
incomplete information. Since stakeholders rely on the status report for a heads-up on
the project, and its content is used as the basis for decision-making, it is critical that the
report provides both complete and accurate information.
3. Do not cover up bad news or adverse reports as these are all part of the transparency
of the status report. Keep in mind that being open with the stakeholders, whether the
project is sailing smoothly or not, will benefit both the team and the client, since any
problems there are will be immediately given attention and solved.
4. Be proud of the team’s accomplishments, after all, this is what the clients and the
stakeholders will want to know about.
5. Anticipate questions from the clients or stakeholders and be prepared to answer them.
6. Be familiar with the culture of the organization and respect the information hierarchy
they observe. There are instances when the CEO wants to be the first to know about the
contents of these reports before cascading it to his downlines. On the other hand, middle
managers will want a head start on these reports so they can also anticipate and prepare
for any reaction from the top executives.
7. Craft the status report in such a way that there will be no information overload. It
should contain necessary information that the stakeholders need to know. Lengthy
reports will consume not only the writer’s time but also that of the reader. Too many
details also give an impression of micro management.
Risk Registers
All projects, or any activities of business, face risks. It is just a matter of how an organization
identifies, assesses, analyzes, and monitors these risks. With a Risk Register, an organization
is equipped with a tool to better respond to problems that may arise because of these risks.
It helps in the decision-making process and enables the stakeholders to take care of the
threats in the best way possible.
A Risk Register, also called an Issue Log, is iterative because it will be updated periodically
depending on how often the team identifies a potential risk. It may also be updated if the
characteristics of the existing potential risks change as the project progresses.

60
WHAT TO INCLUDE
The Risk Register document contains information about the following:
 Risk Identification
 Risk Category: Grouping these risks under different categories is helpful. Doing so will
provide a way to make a plan of action that will address most, if not all of the risks falling
under the same category, saving time, effort, and resources.
 Risk Description: Provide a brief explanation of the identified potential risk. The description
can be done in a variety of ways depending on the level of detail. A general description can
be difficult to address while giving too much detail about the risk may entail a significant
amount of work. Three factors to consider when making a risk description are: the way
these risks are going to be managed, who will handle them, and the reporting requirements
of the person receiving the risk register.
 Risk ID: Assign a unique identification code to each risk identified to track it in the risk
register easily. Create a system of coding in such a way that the category to which the said
risk belongs is easily identifiable.
 Risk Analysis
 Project Impact: Indicate the potential effect of the assumed risk on different aspects of the
project such as budget, timelines, quality, and performance.
 Likelihood: Referring to the possibility of the risk occurring, the likelihood can be expressed
qualitatively—high, medium, low—or quantitatively, if there is enough information
available. Whatever criteria are to be used, assign a number—with the highest value
corresponding to that which is most likely to occur.
 Consequence: This refers to the severity or the extent of the risk’s impact on the project. It
can be expressed using the following adjectives to describe the magnitude of severity but
remember to assign a number to each level, with the highest value assigned to the level
which has the most severe impact.
A. Negligible
B. Minor
C. Moderate
D. Significant
E. Severe. Here’s how it will look in a tabular form:

Severity Negligible Minor Moderate Significant Severe


Likelihood (1) (2) (3) (4) (5)

Low
(1)

Medium
(2)

High
(3)
 Risk Evaluation

61
 Risk Rank: Combining the likelihood of occurrence of a risk and the severity of its impact
gives the risk rank. If there are corresponding numerical values assigned to each level, these
can be multiplied, and the resulting value can be used to rank the identified risks.

Severity Negligible Minor Moderate Significant Severe


Likelihood (1) (2) (3) (4) (5)

Delay in the Natural


delivery of calamities are
Low office damaging the
(1) supplies infrastructure.

Absence of
Medium key Running out
(2) personnel of budget

High
(3)
Using the table above, the identified risk can be ranked this way:

Risk Likelihood Severity Result Rank

Natural
calamities
damaging the
infrastructure 1 5 5 2

Running out of
budget 2 4 8 1

Delay in the
delivery of
office supplies 1 2 2 4

Absence of key
personnel 2 2 4 3

 Risk Trigger: These are the potential risk events that will trigger the implementation of a
contingency plan based on the risk management plan. This plan should have been prepared
prior to the development of a risk register.
 Risk Treatment
 Prevention Plan: This enumerates the steps or action to be taken to prevent the risks from
occurring.
 Contingency Plan: On the other hand, the contingency plan determines the steps or action
to be taken once the risk events have occurred. This program also contains the measures to
be taken to reduce the impact of such risks to the project.

62
 Risk Owner: The person responsible for managing risk, and the implementation of the
prevention and contingency plans, it can be anyone among the stakeholders—members of
the team, a project manager, or project sponsors.
 Residual Risk: Sometimes, a risk cannot be entirely eliminated after treatment. Part of it
may linger throughout the duration of the project, but once it has been treated, it can be
considered as a low-level risk.
Keys to an Effective Risk Register
1. The first risk register must be created as soon as the project plan and the risk
management plan has been approved. This initial risk register must be integrated
into the project plan.
2. Active risks during a particular period must also be included in the project status
report.
3. Risk management is an iterative process which is why the risk register must also be
updated from time to time. Updates can be made when new risks are identified or
there have been changes in the risks already in the register.
4. The numerical value assigned to the likelihood and severity levels must remain
constant throughout the duration of the whole project.
5. Likewise, any terms used must be defined, and this definition must be utilized
consistently.

Project Closure Report


As the end of a project, a Project Closure Report signals its culmination. Its submission
officially concludes a project and implies that funds and resources will no longer be needed,
and everything will go back to its status prior to the implementation of the project.
This process is critical as it will officially tie up all loose ends and prevent confusion among
stakeholders.

WHAT TO INCLUDE
This particular type of project report summarizes information on the project results, the
criteria used to measure the effectiveness of the project delivery process, and the feedback
from the stakeholders. Each performance metric includes an assessment and a narration of
how the team performed on such metrics.
 Budget
This performance metric describes how the team utilized the budget in carrying out the
project effectively. Under this performance metric, the following aspects are measured:
 Final Cost
Indicate the total expenditures for the duration of the project.
 Component Breakdown
Each category of the expenses is tracked and recorded, stating the price per category and
what percentage of the total budget was spent on each category.
 Budget Variance
Show the difference between the projected budget and the actual cost and present a
detailed variance for each cost category.
 Explanations for Key Variances
Briefly explain the reasons for each variation and its impact on the project’s
implementation.
 Schedule

63
Describe how the team implemented the project within the expected time frame and
schedule.
 Overall Project Duration
State how long it took for the completion of the entire project, including the start and end
dates. A lot of people will find it surprising to know how long they have been working on
the project.
 Schedule Variance
Narrate the difference between the projected duration of the project and the actual time it
took for the project to be completed. State the details in a number of days and as a
percentage.
 The explanations for Key Variances
Include an explanation for the occurrence of the variations and quantify how much each
difference accounts for the total, in days or as a percentage.
 Change Management
This metric refers to the team’s ability to handle and manage changes throughout the
project’s implementation effectively. It is measured through the following:
 Total Number of Changes
Provide details on how many changes were requested and how many were approved and
implemented.
 The impact of the Changes
State how these changes impacted the overall project in terms of project timelines and cost.
 The highlight of Changes
Provide a brief description of the changes that were implemented. It is also good to mention
those changes that were requested, but were not approved—especially if the reason for
disapproval was to defer it for a future project or product release.
 Quality Management
This particular metric refers to the team’s ability to observe and comply with quality
standards during the project’s implementation.
 Total Number of Defects Identified
State a brief description of the errors identified during the structured walkthrough process
per stage.
 The explanation for Resolved Defects
Give a narrative on how each defect identified was addressed and how it made an impact on
the project and its deliverables.
 Risk and Issue Management
This metric deals with how risks and matters that occurred during project implementation
were handled and resolved by the team. Key points to include are the following:
 Risks
Provide a list of risks identified and analyzed. From this list, determine which ones were
accepted, transferred, mitigated, or avoided. Also, provide a summary of how key risks
were reduced.
 Issues
Provide a list of problems ranked according to priority and determine which among these
were resolved by the team, how many were escalated to a higher-level decision maker,
and how many were left unresolved.
 The impact of the Risks and Issues to the Project
State how these risks and challenges affected the project timeline, budget, and scope.

64
 Human Resource Management
This refers to the team’s ability to carry out the project effectively.
 Manpower
Give an analysis of whether enough manpower was provided for the project and if they
were equipped with the right skills to implement the project. Also note if the team was
given the proper training to handle the project effectively.
 Project Organization Structure
This metric looks at how the stakeholders participated in the project.
 Decision-makers
Discuss how the team’s collaboration with the primary decision-makers worked. State if
they made themselves available beyond regular working hours if needed. Also give an
account of how escalated issues were resolved and if they were delivered in a timely
manner.
 Communication Management
Under this metric, communication throughout the duration of the project is assessed.
 Communication Management Plan
Describe how the communication management plan was implemented and if it was
delivered as expected. Give an account on which items on the communication
management plan worked well and which ones need to be improved.
 Feedback
 Summarize essential feedback collected. Describe the method by which these comments
were gathered and who was solicited for feedback. Also include how they responded to
each question and briefly discuss which items received great responses from the
participants and which ones got few answers.
 Take note of common themes or trends of feedback gathered.
 From the feedback gathered, also take note of any opportunities from this feedback
and discuss how these opportunities can be applied to future projects, or in the
organization itself.
 Lesson Learned
 Give a brief discussion of what the team learned when carrying out the project. Among
these learnings, discuss which ones can be applied to future projects and how it will
impact not only those future projects but also the whole organization.
 Other Metrics
Other points of interest may not have been captured in the Project Status Report and may
be included in the Project Closeout Report. Some of these factors include:
 Duration and Effort by Project Phase
A brief account of how long it took for each phase of the project to be implemented is an
excellent addition to the report. Insights from this information may be used to plan
properly for following projects. It is also interesting to account for the percentage of
effort allotted for each phase.
This will guide sufficient manpower allocation for each stage of future projects.
 Benefits Realized
It is worthwhile to discuss which among the expected advantages of the plans were realized
at the time the project closure report is written.
 Benchmark Comparisons

65
Describe how the project performed in comparison with other projects of the same
department, company, or within the same industry. Briefly discuss the positive and
negative points of the plan as compared to others.

Keys to an effective project closure report:


1. The closure report is mostly a summary of all efforts related to the project. It is
important to ensure that all highlights of the project have been properly documented so
that retrieval of these reports is easier and all efforts will be acknowledged.
2. Emphasize the high points the project delivered, how efficiently it was done, and what
has been learned from the process.
3. If there are notable variances during the project implementation, make sure to provide
a fact-based explanation on it. In addition, the impact of this difference must also be
described.
4. A critical point in a project closure report is establishing the link between the project
performance, the lessons learned, and the steps that will be taken by the organization
for its continuous improvement. Aside from the project deliverables, another valuable
output of a project is the learning’s derived from the process and how it will be
translated into concrete concepts applicable to the business processes of the
organization.

Self-Check 3.3-2

Test I. Enumeration. (30 points)

1. Write the list of peripheral devices that involves adding peripheral device
system.

2. What are the procedures in adding a devices to a system.

66
67

You might also like