Академический Документы
Профессиональный Документы
Культура Документы
It store the data permanently . It is also called as non volatile memory or ROM
RAM/MEMORY
It is an electronic device which holds the data or instruction during the execution time .
It is also called as volatile memory
Eg :- When you open an application which is permanently stored in the harddisk ,goes to the
memory and memory send the application data to the processor for execution where the
work of memory is only hold the data or instruction during the execution.
PROCESSOR :-
It is a electronic device which take the instruction from memory ,execute it and gives
output again to the memory
The processor is plugged into the mother board , where the place holder named as
socket
CORE :-
TYPES :-
HDD CONSTRUCTION :-
TYPES :-
Ans :-
There are different type of RPM (rotation per minute ) present in harddisk or hard disk
rotate in certain RPM
Depending upon the RPM hard disk do read write operation
Head reads the data depending upon the RPM, more the RPM better read write operation
The general RPM of HDD is 7200 rpm and max RPM is 15,000
The time to read a data by the head in the cylinder is called latency time
Data write to the disk by SCSI protocol
Here electrical signal converted into mechanical signal and depending on rpm we do I/O
operation
There are 2 types of read write operation generally happen
o Block level
o File level
Due to this we get less place as compared to the space mentioned in the disk
X86 Architecture :-
Processor :-
Ep-5600 8
Ex – 7600 12
Bridge 16
3600 22
Cache :- it is a small memory holds the instruction for execution purpose . it is present in
processor
Processor process a data in layer wise
L1 , L2 , L3 these are cache memory
But immidiate action instruction dirctly goes to L3
Memory or Rom:-
It is available as 2gb,4gb,8gb,16gb,32gb,64gb
in slots 12,24,48,96 – slots are present in mother board
DMI (Direct memory interface ) is used in memory and processor
Data goes from ram to processor with SPI (Serial perpheral Interface )
Processor will interact with another processor with QPI(Quick path interconnect )
To add multiple processor we need QPI
SIMM/DIMM are two interface of memory
Dimm slot connected to processor through SPI
o SIMM – single inline memory module
o DIMM – dual inline memory module
4 channel = 1 chipset
4 DIMM solt = 1 channel
MAPPING TECHNIQUES :-
TYPES OF MEMORY :-
Less pin more pin 204 & 240 pin 260 & 288 PIN
Servers :-
Q:- Why we need server?
To run the application and in server there are multiple components are present and
it is more faster than desktop
The main part is we can use multiple processor in server and multiuser can access
server
Types :-
o Tower server
o Rack server
o Blade server
PCI :-
PCI PCI-e
It consume more power to process the data It consume less power to process the data
Data transfer rate is very slow Data transfer rate is faster then PCI
X4 = 10 gbps
COMPONENT OF SYSTEM :-
Processor
Memory
Harddisk
Adapter
ADAPTER :-
1. NETWORK
a. Intel
i. I 350 , 82576 - 1G
ii. X520 , x540 - 10G
b. Broadcom
i. 5709 - 1G
ii. 57711 , 57712 - 10G
2. HBA (HOST BUS ADAPTER )
a. QLogic
i. QLE 2462 - 4G
ii. QLE 2562 – 8G
iii. QLE 2662 – 16G
b. Emulex
i. LPE 11002 – 4G
ii. LPE 12002 – 8G
3. CNA (Converged Network adapter )
a. Qlogic
i. 8152 – 10G
b. Emulex
i. OCE 10102 – 10G
c. CISCO
i. P81E – 10 G
4. RAID (Redundant Array of Independent Disk )
a. LSI
i. 8708 , 3708
ii. 1064e , 1064 e – Mezzine based
iii. 9260 – 4i ,9261 – 8e – PCI based
SAS SATA
SAS stands for serial attached SCSI SATA stands for Seriel Attached
Data transfer parallely Technology Advanced
It has dual port Data transfer serielly
It has speed like 3,6, 12 GBPS & latest is It has single port
16 Gbps It has speed like 1.5 , 3,6 GBPS & latest is
SAS offer backward compactibility with 16 Gbps
sata , That means SATA drive to be SATA can be conneted to SAS backplane
connected with SAS but the reverse but the reverse is not possible
connecting SAS drive to SATA backplane It has half duplex concept, data can be
is not possible either read or write in both end
It is full duplex concept , means the data SATA can be connected upto 1 m distace
can be read and write at both end SAS supports multipath I/O but SATA
SAS can be connected upto 8 metere doesn’t
distance .
SCSI
HDD SSD
It stands for hard disk drive It stands for solid state drive
Here data store in platter as block level Here data strore in register or flash
and file level memory.it works of D-ram concept or
HDD speed upto 50 – 120 mbps flipflop concept
HDD is slower than SSD SSD speed upto 200 – 550 mbps
Heat is more SSD is 30% faster than HDD
Vibration present Heat is low
Noise present No vibration present
Capacity is 2TB for notebook and 4TB for No noise
desktop 512 gb for notebook and 1TB max for
It is cheap desktop
It drown more power It is expensive
It draws less power
SDRAM
SIMM DIMM
SIMM stands for single inline memory DIMM stands for dual inline memory
module module
It is an older RAM memory module It is latest RAM memory module
standard standard
SIMM has 72 pins to cownnect with RAM Normal or typicall DIMM has 168 pins
It supports 32 bit data other DIMM have 72 ,100 , 144 ,172
Size of SIMM is 4.25 ‘’ in length 1’’in ,184,204 ,240 PINS
width It supports both 32 and 64 bit data
Data transfer in one way , so there is one Size of DIMM is 1.67 ‘’ to 5.25’’ length
side gold platter and 1’’ to 1.75 breth
RAM inserted in SIMM at an angle Data transfer in two way so there is gold
platter in two side
RAM inserted in DIMM in parallely
HOT PLUGGABLE:-
While the application is running at that time we can insert or remove the HDD ,network card
,RAM ..etc, without any damagged, if the componet supports hot pluggable technology .
THROUGH PUT :-
HOT SWAPPABLE :-
It is technology in which while the application is running at that time ,you can swap the
component one place to other
It is possible if the component supports hot swappable technology
Ans :-
Cat 6 transfer data in 1gbps for a limitted area, where cat 5 fails to transfer the data at same
speed . We need cat6 cable
cat5 & cat6 defferentiate on basis of data transfer distance , other hand both are same
network cable
NETWORKING :-
1. Physical layer :-
Data flows line bit over cable (0,1) as electrical signal
Encoding happens in this layer
Devices use are RJ45 , network cable , Repeater ,Hub
Data transfer in physical media , ISDN protocol (integrate service digital network )
2. Data link layer :-
Data bit converted to frames and a logical link established between nodes
This layer keep track of frame acknowledgement , frame error checking and frame
traffic control
Device used are network cable and switch
In this layer devices communicate through MAC address
It used as L2 layer .CSMA/CD and LLC are used
3. Network layer:-
Data frames converted to data packets.
This layer decides in which path data will go to reach at the destination
Devices uses are router
Routing protocol are used which decides the path of data to be transfer
Here devices communicate through ip address
4. Transfer layer:-
Transfer the data to the destination by routed protocol TCP & UDP
This layer ensure that the data delivered error free , with order & there is no loss
5. Session layer:-
It manages the session that how long the session will be open for the process
running in definition station
All authentication permission given in this layer
It maintain the data transfer the rate between source & destination
6. Presentation layer:-
This layer present or format the data into relevant fronts to understand by below
layers. It act like a translator in n/w
The formats used are ACSI, Encoding, Decoding
This layer perform data compression , encryption, translation
7. Application layer:-
In this layer the normal application which need to communicate are installed mostly
all the s/w installed by this layer
Like ping , telnet are used
HTTP , FTTP are used in this layer
Networking
The port which are directly connected to the mother board is called LOM
LOM stands for Lan On Mother board
MLOM stands for Modular LOM( Mezzine LOM)
LOM can’t be replaced but MLOM can be replaced
Eg. Mezzine slot
Topology
Star
Ring
Bus
Tree
REPEATER :-
HUB :-
MAC ADDRESS:-
SWITCH:-
CSMA/CD :-
LLC :-
ROUTER :-
GATEWAY :-
It is a port in router through which a system can go out and comes in to the network
Switch is connected to this port
We can set gateway address in the router manual. Generally it take the 1st IP of the series ip
given in the network
Router maintain an access list, it contains the IP of the systems, which will able to go out of
network
IP ADDRESS :-
IPV4 IP ADDRESS :-
CLASS B:-
Here it reserve 2 bit in subnet mask , so the recent bit is 64
So the range is 128+64 = 192 ; As it starts from 0 ; 192-1 = 191
o The range became 128-191
o Subnet mask for class B is 255.255.0.0
o No of Ip generate for Class B is 2^16 -2
Class C:-
SUBNETTING :-
TCP :- UDP:-
It is connection oriented It is connection less
It stands for Transfer control Protocol It stands for user datagram protocol
Data delivery in order Data delivery not order
It has secure data transfer It may have insecure data transfer
Data transfer rate slow Data transfer rate fast
TCP header is 20 byte UDP header is 8 byte
Acknowledgement given at every packet No such Ack. Given in this case
of data receive It is fast .so used in better performance
It is secure so used in banking sector like film industry or voice transfer
Connection oriented means dedicated
connection.
Routing protocol used in network layer and routed protocol used in transport layer
Routing protocol routs the data based upon distance, traffic and bandwidth
Routed protocol only carry the data from source to destination but the path decided by the
routing protocol
Tcp and udp are routed protocol
Rip – Routing Information Protocol
Igrp- Interior Gateway Routing Protocol
Ospf – Open Shortest Path Fast
Bgp – Border Gateway Protocol
Rip has only limitation upto 16 router, more than this It can’t access
VLAN
it stands for virtual lan
it is use to segregate the port or bind the port in the switch for security purpose
switch can broadcast the message to the system connected through single vlan
this broadcast message only go to the system in that vlan not to other
standard vlan ranges from 1 to 1009
here if switch will send msg for vlan 10,only the system in vlan 10 can receive it,not
other system will receive
so it provide access control or security to the network
total no of vlan ranges from 0 to 4095
we can’t use or see 0 and 4095 as they used for system
default vlan for sisco is vlan1
normal vlan ranges from 2 to 1005
after that extended vlan which ranges from 1006 to 4094
SWITCH CONFIGURATION
Hyper terminal in windows and minicom in linux are application to configure the system
In windows
Start -> program -> accessories -> communication -> HyperTerminal
Catalyst is family name of series switch of cisco
o ISO is the operating system of cisco switch (Inter operating System )
Symbols
o > user mode
It only view the access but it can’t change the access
o # Enable mode
Press en to go from user to enable mode
In this mode we can view and change the access
It is known as privileged mode
#show running-config
o It show what configuration running in your system currently
o It fetches information from RAM
#show startup-config
o It shows what configuration is present in NVRAM
#show interface fastethernet 0/1
o It show the port information
#configure terminal
o It is used to change the mode of terminal
#shutdown
o It is used to make the port down
#no shutdown
o It is used to make the port active
#copy running-config startup-config
o To save the configuration
#config t
#hostname san
o To change the hostname to san
#no switch port access Vlan 2
o To remove Vlan2
Serial port -> press E -> press E(to set bps 9600) -> save as default -> exit
creating VLAN:-
#config t
#vlan 22
#name san
#exit
#show vlan
#config t
#interface fastethernet 0/21
#switchport access vlan 22
#exit
#show vlan
#copy running-config startup-config
#show mac-table
Booting process of OS
When we power on the system SMPS (switching mode power supply) regulate the voltage
from AC to DC
Then POST (power on self test) will distribute the regulated voltage among the components
present in the system.
After that ACPI (Advance configuration power interface ) will manage the power internally in
the system
Then the control passes to BIOS (Basic input output system) through Smbios (System
management bios)
BIOS checks whether the basic component of the system present or not.
It talks to the firmware of each component present in the system and display during booting
process
It displays all hardware information of the component.
It manages which device or hardware to boot or not.
Firmware is a low level program which placed in the hardware at the time of manufacture to
direct interact with the component
Low level program means microcontroller level language.
After bios completed its work control passes to MBR
MBR (Master Boot Record) keeps the information about the booting devices.
it stores the 1st sector of the booting device
size of MBR is 512 byte as it stores 1st sector of the booting device
once MBR found the booting device it point to the booting files to load into the system
Here Vmlinuz and initrd are two major files to load into the system during initial boot
process
Vmlinuz is the kernel in OS which contains hardware information and driver details.
It loads the basic driver that are required to boot the system
It is loaded to the memory by the help of initrd.
Initrd
It stands for initial ram disk
It is used to create the space in memory to load vmlinuz and act as file system
once vmlinuz loaded into the memory it tries to interact with the rest of the device to load
into the memory
it loads the device driver for the hardware to interact
Once vmlinuz completes its work it starts services and mount the devices
Then it look for runlevel files from which init level is going to boot (starting point of booting)
Enter into login give valid username and PWD
Errors
Ans:- The adapter card may not be properly connected to the PCI
Ans :- The network cable or physical connectivity error or cable not connected
Ans:-
Ans:-
Ans:-
Ans:-
Ans:-
Ans:-
Server management s/w will help us to check which processor is damaged &then open
inventory tab, it’ll show which processor will damaged
Then we have to remove the processor from socket & insert the new one in that place
Eg. Management s/w we can see or view management h/w
Ans:-
It is typically consists of firmware that is called by the system bios. It helps the bios to talk
with the firmware of the device.
Without option ROM bios can’t talk to the firmware of the device
OS
| |
Windows Unix
| |
Desktop version - 95 / 98/ME/2010 prof/vista/7/8 linux
Server version - NT/2000/2003/2008/2008r2/2012
LINUX
|
↓ ↓ ↓ ↓ ↓ ↓ ↓
Redhat Novell Oracle HP IBM Mandreke Ubuntu
RHEL SUSE OEL 5.0 Hp-UX AIX
RHEL 4.0 SLES 10 OEL 6.0
4.1 10sp1 OEL 7.0
: 10sp4
RHEL 5.0 SLES 11 sp1
5.1 11sp2
:
RHEL 6.0 SLES 12 sp1
6.1 :
RHEL 7.0
:
Installation of OS
Hardware requirement
I. Hard disk 15-20 gb
II. RAM 2gb
III. Processor p4
IV. Keyboard, Mouse
V. Os cd
Types of installation
I. DVD
II. Pendrive
III. Network (PXE , FTP , NFS)
#ls
List of file to show or Enter into the directory
#pwd
To view present working directory
#cd
To go to the root
#ctrl+l
To clear the screen
Create file in Linux
#touch <file name>
To create file
#ls – ltr
Display details about file and directory
#man ls
Help command
Vi editor
I. Insert mode
II. Append mode
III. Escape mode
I. Insert mode
This mode enables you to insert text into the file
Vi is always starts with command mode or escape mode
To come to the insert mode simply type i
Then press esc to go to the escape mode again
In this mode the insert text goes before current cursor location
II. Append mode
It is similar to insert mode
We can add the content of the file in this mode
Press ‘a’ to go to the append mode
The main difference from insert mode is in this mode the text inserted after the
current location of cursor
III. Escape mode
This is default mode of vi editor
In this mode we can run only command
Press esc to go to the escape mode
Copy,paste,delete commands used in this mode
i. yy means yank
To copy a line ; to copy 4 line type 4yy
ii. p
To paste anything which has copied
iii. dd
to delete a line
iv. dw
to delete the word
v. yw
to copy the word
vi. u
for undo purpose
If we want to copy more than one word, keep cursor on the 1st word count the words along with
spaces
eg :- want to copy :-
to linux
12 3
vii.
x used to delete the character
viii.
y used to copy a single character
ix.
:w
to save and stay on that editor
x. :wq
write and come out from editor
xi. :q!
To force come out from editor
xii. :set nu
to set the number the line in escape mode
xiii. shift +g
to go to the last line
:6 to go to the line no 6
xiv. man vi
to enter into help file of vi editor
xv. /file information to search the file content and press ‘n’ to go next
How to create user
useradd <user name>
passwd username
password
conform password
_rw_ r_ _ r_ _
Owner group other
r- read (4) , w –write(2) , x - execute (1)
setting the permission by the command chmod
shell is a scripting language of linux which used to automate your manual setting
#chmod 750 san (7 means full permission to owner , 5 means read & execute permission to group , 0
means no permission to other)
Eg :- ./ san
#useradd –g
Directory structure
root
| | | | | | | | | | | | | | |
root boot etc dev home opt lib bin sbin temp mnt media proc var lost&found
This intermediate is called mount and pen drive is called mount device
To mount a device
#cd /mnt
The super user gives the root id to the normal user to access the entire thing without giving the root
Password
Go to #vi /etc/passwd -- if the root id is 0:0 set this id to 0:0 to the user to access
User can access the system but we can’t change the system
Steps of installation:--
Network installation:--
Connect the network cable make sure that the network port as 1st boot device
Go to the bios from boot option set the network port as 1st boot device
Reboot the system then boot option will come select the os which you want to install
Now vmlinuz and initrd will load to the system or memory
Vmlinuz will load the driver to interact with device
Select the keyboard language
Mention the ip address of server from where the os is going to install
Select the mount point of os and click next mount point means link point
Then welcome page come
Cd installation:-
Insert the cd reboot the system ,make sure that cd is 1st boot device
Then 5 option will come then select from cd or dvd ,then welcome page come
Installation start :-
Select the agreement and click next ,then probing start means it take some time to interact
with the hardware
Select installation mode as new installation and click next
Set the time zone from map
Select server based scenario
i. Physical machine
ii. Virtual machine
Select physical machine
Then we got the page installation setting with option
i. Partitioning
ii. Software
Select partitioning
Select extended
We select extended, as primary partition does not allow more than 4 partition , but
extended allow more than 4 partition
Then select software , like c,c++ compiler select the application and click install
Default File
XFS EXT4
System
Kernel
3.10.x-x kernel 2.6.x-x Kernel
Version
Kernel Code
Maipo Santiago
Name
Driver
Driver is a high level program which helps os to interact with hardware through kernel
Kernel
Kernel is a foot print of os which passes information directly to hardware through firmware
Inbox driver
The driver which are present in the os during bonding or integration of os is called inbox
driver
This driver released or available in the market before os released or at the time of os
released
Outbox driver
The driver which supply to the os externally or inject separately to os is called outbox driver
This driver released or available in market after release of os
File server is a place where all software stores
Modules
Mptsas------------mezzine
10G ixgbe
Broadcom 1G bnx2
10G bnx2x
8G Qla4xxx
Emulex 4G Lpfc
Fc Qla2xxx
FC lpfc
FC FNIC
After installation of any application or software we have to update the module in kernel,
because the os need to interact with the software properly to use it. For this propose we
need to update the module in kernel .it can be done by rebooting
If we are doing any important work with our system at that time we install an application we
need to reboot the system. By rebooting the system at that time we may lose data.
So to avoid this problem & to update the module in kernel at running condition we use 2
methods
Insmod
Modeprobe
INSMOD
MODEPROBE
vi /etc/fstab
mounting
when we insert the usb device where the modules are present in compressed
format
mount the device ; see the device name by the command #dmesg or #mount
then mount it
#mount /dev/sdc /mnt
then copy the compressed file to opt directory
go to the opt directory and view the driver in compressed format
#cd /opt
#ls will view files
in this step there are multiple modules present in different compressed format like
<file name> . tar
<file name> .gz
<file name> .tgz
<file name> .rpm
<file name> .src.rpm
if there is extra file present in that unzip file we have to install that extra file
instead of using make file and make install
install the extra file using the command
./extras/build.sh
then update the kernel by inserting the install module
we can insert the module in two ways
i. insmod
ii. modeprobe
#modeprobe igb
if select .rpm
here there is no need to find make file and make install
this file can be install directly
#rpm –ivh <file name.rpm>
if select .src.rpm
#rpm –ivh <file_name.src.rpm>
#cd /usr/src/redhat
#rpmbuild –bb SPECS/filename.spec
COMMANDS
i. View user
# who am i -- view who is the current user
#who -- view total member of user
ii. Remove file or directory
#rm <file name> remove empty file
#rm -rf <file name> remove with all the content
#rmdir <directory name> remove directory
iii. To show error message
#vi /var/log/messages
iv. View file content
#cat <file name>
/content --- to search content in file
Eg: - /error
v. Copy file
#cp file name destination address (if you are copy from present directory)
vi. Check
#fsck - it checks corrupted file
#lsmod - list of module present
#cat /etc/redhat-release - To see OS version
#uname –r - display kernel version
#arch - display architecture
#file <file name> - display file information
#modeinfo <module name> - Display module information
vii. Module operation
#rmmod <module name> - to remove module
#ps –ef - To view running process
#ps –ef | more - To view running process page wise
#vi install –txt - to view driver information or read me file
viii. To kill process
#kill PID
To kill forcible
#kill -9 PID
ix. To show last 10 error messages
tail –f var/log/messages
x. To show first 10 error messages
#head /var/log/messages
xi. To see memory
#free - memory used
#df - show the free space of disk in KB format
#df –h - show the free space of disk in GB format
#top - To see the system performance
Ctrl + c - Stop processing
#fdisk –l - Display hard disk partition
xii. Configure IP Graphically
#neat
It will show windows with two interface i. eth0
ii. eth 1
By click edit we get Ip setting manual or automatically
Then set IP and click on activate and start network service by
#service network status - it display the network status
#service network start/stop/restart - it will used to start or
stop or restart the network service
To set IP to rhel 5 and above series graphically we use
#neat
#system-config-network
In sles there is
#yast2 - show driver information of sles
Q:- how to supply driver during installation(out box driver)
Ans:-
# rpm -ivh
I - install
H - human readable
# tar -xvf
X - extract
V - verbose ,F - forcible
# vi /etc/sysconfig/networking/devices/ifcfg –eth0
Device = eth0
onboot = yes
type = Ethernet
netmask = 255.255.255.0
IP Address = 192.168.1.11
User ctl = no
Ip v6 init = no
PEERDNS = yes
Then run the command
Temporary set IP
DHCP
It is the maximum time duration the dhcp will assigned the IP for the system
It means the system logged on and using the IP and lease time present or
continue
It means the system not logged on and IP not using or lease time expire .In
this case dhcp can assigned the Ip to other new logged system
But in binding state active dhcp can’t assigned the same IP to other system
#vi /etc/dhcpd.conf
DHCP will store the IP which is assigned to system or to view all the IP used
#vi var/lib/dhcp/dhcpd.lease :-- it shows the lease information and assigned ip
address
Fixed address
MAC - addr
Ip-addr
Like above open the dhcp by the above command and add the MAC address and IP which you want
to set
When several system connected in a LAN all the system will get private IP
When we connect with internet or a web site need a public IP
The public IP is provided by the ISP as the private ip can’t routed over ISP
DHCP patching :-
It is like backup operational of DHCP ,if one dhcp scope to assigned IP is over Then
another DHCP will take the work of previous one
#mount -0 loop :- we use loop to use multiple user parallel or to create multiple thread
#find . or find / :- this . means we are searching in current directory where we present
rp :- recursive persistently
cp :- is used to copy the file but scp –rp is used to copy while directory.
commands
Sudo user
It is an user which has privileged to root password can do a little more thing as
compare to normal user but it can’t do everything
ping 192.168.1.12
ethtool eth0
To see the port status interface information and to see the link established or not
RUN LEVEL
#vi /etc/inittab or stores in RC file
It is a software configuration of the system which allowed a selected group of
process to exists
In which level your system will be come up or boot up
Using init the system get initialized
Ans :- Run level problem ,may be it is in single user or multiuser mode with no graphics
#init 1
#passwd
Ans :-
configure telnet
#vi /etc/xinetd.d/telnet
#twme comment the line using # and write start kde (kde & gname two different desktop)
Hard link :-
Soft link :-
Ans :- #sosreport -- It create log above hardware information , memory , hard disk ,processor
To see interface information , port status and to see the link establish or not - #ethtool eth0
Command
If the service is enable * will be present ,by pressing space we can make disable it
#chkconfig - - list | more :- it will show which run level will on or off
It is a tool through which we can update or install any application through the
redhat server
Which OS is installed from that server we can download or install it
#repository :- it is the place where all application store to provide user automatically according to
need.
#vi /etc/hosts :- it will show the ip address of your system or host name of the system
Proxy Server
It is a server which decide whom to allow or whom not to allowed for the user connected to
the server
It’s like a watchman or firewall
It maintains all IP provided by ISP or public IP
#vi install.log
#vi anaconda-ks.cfg
It will keep record of installation file or procedure , what are selected during os installation
It helps us to perform automatic installation
Ks stands for kick start file
It is used to perform automatic installation
Anaconda uses this file to perform auto installation
SAMBA
#vi /etc/samba/smb.conf
In above diagram if system A want to talk to system B , we have to install samba in system A
to communicate , as system B has inbuilt samba
To start samba service
o Service samba start
o Service samba status
WINSCP
DNS check the IP ,when an user enter any address it check the ip of that address.
DNS converts the corresponding IP address to name and vice versa
It has two methods
1. Forwards DNS
2. Reverse DNS
Proxy server act like firewall
DNS stands for Domain Name System , it’s like our phone book in mobile
#vi /etc/resolve.conf ---- It keep record of the DNS entry
ACTIVE DIRECTORY
it centralize our network and store information about network resources across the entire
domain
Active directory uses Domain Controller to keep this centralized storage available to network
user
PXE
Install RHEL 5.5 on your server. During installation process create bigger size of root
directory where we need to copy more OS image
Select following package
o tftp
o http/ftp/nfs
o selinux
o DHCP
TFTP (69)
#vi /etc/httpd/httpd.conf
It stands for hyper text transfer protocol
It transfer all the data to client system except vmlinuz and initrd
It has only one way transfer of data
FTP port no :: 20
#vi /etc/vsftpd/vsftpd.conf
It stands for file transfer protocol
It is also used to transfer data . it has two way transfer of data
It transfer data from one host to another host
SELINUX
DHCP
Because when dhcp take the request , it assigns an ip to the client along with this file to load
from the server
Pxelinux.o is a binary file which is present in OS image file or download it and install it.
It can be found out by installing a package called “syslinux”
Define boot message or index for os to install
#cd /tftpboot/linux-install/msgs
#vi boot.msgs
Then create index for OS
1. RHEL 7.0
2. Sles
::
When we select 1 ,it will go to serch configuration , if wont find it , then we have
to define config file under default directory .
Copy the HTTP protocol
o Copy the OS image file to root directory by create a directory ISO under root and
copy the OS image to this
o To copy write
#scp –rp root @10.103.33.160: /rhel/ISO
Here root is the root of file server where os image is present , here ip is the
ip of file server
o We copy the OS image from root of the file server to the ISO directory of pxe server ,
where ISO directory is created under root of pxe server
Scp-server connection protocol
Rp-recursive persistently
Now configure http in server , if http already installed then the below directory created
automatically
#cd /var/www/html
Then create a directory named rhel 5.5 under html
#mkdir rhel5.5
Mount the OS image file into http directory by the command
#mount -o loop /ISO/rhel-server-5.5-i386-dvd.iso /var/www/html/rhel5.5
To retrieve iso files to http
TFTP configuration
To configure tftp write
#vi /etc/xinetd.d/tftp
Then make disable parameter yes to no
Then a directory created tftpboot/linux-install
And copy pxelinux.o to this directory
Tftpboot/linux-install this is called as os identifier , it helps us to indentify
the os as it is redhat
Create pxelinux.cfg directory under linux-install to add configure
#tftpboot/linux-install/pxelinux.cfg
Add config file to this directory pxelinux.cfg named as default
Under this default directory define Vmlinux and initrd img and index of os
present in boot msg
Label 1
Method = http://10.104.33.150
Create a directory rhel 5.5 under tftpboot/linux-install and copy vmlinux and initrd files to
this tftpboot/linux-install/rhel5.5
Give executive permission to both the file by
#chmod 777 * rhel5.5
To copy Vmlinux and initrd file first find it and then copy like
#find /-name vmlinux –print
After Vmlinux and initrd loaded to the system then we have to disable the firewall/selinux
Then start the services
#service dhcpd start
#service httpd start
#service xinetd start
#service iptables stop
Then make the network port of client system to 1st boot device
Q:- How to install automatically ?
Ans :- copy anaconda file to http directory
#cd /var/www/html
#ls
Then go to default directory add anaconda
Method
http:// 192.168.10.11
rhel5.5 – ks.cfg ip=dhcp
To see boot message or define index for os to install
o #cd /tftpboot/linux-install/msgs
o #vi boot.msg
This will show boot index page where all the os present like
1- RHEL
2- SLES
3- Cent os
Storage
Storage is nothing but the information where it resides or its a datacentre gowdan
In a desktop the harddisk are directly connected to the mother board using IDE,SAS,SATA
cable
In this senario , if harddisk crashed we lost the data if we have not taken the backup.
In server industry the hard disk are connected using RAID controller card
Here the RAID controller card provides protection to data
It also provide faster data read write operation and protection to disk failware
Here 9260-8i raid card used , i means ingress , in case of ingress adapter card we can
connect 8 hard disk to a single port of the adapter card .
Eg:- if 9261-8i has 2 ports we can connect 8*2 =16 hard disk
Ingress means inside the server , means hard disk will connect inside the server
In case of 9260-8e , e means e-gress , Here similarly we can connect 8 hard disk to a single
port in adapter card
INGRESS EGRESS
Data transfer rate faster than data transfer rate comparatively
egress slow.
Use inside the server that Used outside the server that means
means in ingress card hdds hard disks are used outside the
are used inside the server. server.
It is denoded as(i) Denoted as symbol (e).
Desktop SERVER
it is having less component like It is having more component
cpu,memory,harddisk. Multiuser purpose at a time
Single user purpose at a time Management port available
Management port not available More pci present
less no. Of pci We can recovery data when hdd lost
Can ‘t recovery data at hdd lose
RAID
DRAWBACK
TYPES OF RAID
Hardware raid
Software raid
HARDWARE RAID
It depends upon h/w(raid control card)
Hardware raid is faster than software raid
It is independent of OS
It is more expensive
In case of hardware raid there is a dedicated hardware to perform i/o operation. So the
system resources uses for its own task (Running application), So we get better performance
It supports all raid levels
SOFTWARE RAID
It does not required H/W resources
It is slower than H/W raid
It depends upon OS
It less Expensive
Server is used to running the application , in same time server utilize its
resources(cpu , memory ) to perform the i/o operation . So there will be slower
response .
It may not support all raid levels
RAID LEVELS
RAID 4
RAID 5
RAID 6
PCI
Mezzine
RAID 0
Advantage:-
Disadvantage :-
If any one of hard disk got damaged we can’t retrieve the data
Uses :-
RAID 1
ADVANTAGES : -
DISADVANTAGES: -
USES :-
RAID 2
RAID 3
Advantage :-
Disadvantage :-
RAID 4
USES 3 & 4
RAID 5
Uses
RAID 6
Advantage :-
Disadvantage:-
More costly and more hard disk is used
State of RAID
Online:-
Offline :-
Degraded:-
Something missing on raid but it can use and retrieve the data. If the disk failure is equal to
fault tolerance.
Eg:-in raid 1 the FT =1 ,If 1 disk failure it will go to degraded state
Rebuild/Reconstruction :-
When faulty drive replaced by the new drive , the missing data will be replaced or rebuild
with to the new drive and when we add a drive to raid then the data will reconstruct to the
disk
Failed :-
More than minimum disk failure, the raid move to failed state . more than fault tolerance =
no of disk failure
Foreign volume:-
If the raid controller card got damaged we have to use another raid to continue the system
At this time the hard disk will treat the new raid as foreign volume as the new raid controller
does not belong to their configuration
Similarly if a hard disk got damaged and new disk is replaced , the new disk is foreigner to RC
card
R01:-
Through put:-
It is an I/O accelerator for SSD that boost the throughput of the device connected to raid
controller card
Disk Roaming:-
It is nothing but moving physical disks from one cable connector or backplane slot to
another on the same controller
Disk migration:-
It is nothing but the migration of virtual disk from one controller to another with out taking
the target controller offline
RAID 50
DAS
JBOD
SBOD
FIBER CHANNEL:-
PWWN :-
NWWN :-
WWN :-
Goals of FC:-
Allows many well known existing channel an networking protocols to run over same
physical interface
It has high band width
Flexible topology
Connectivity over several K.M
Supports for multiple data rate, media types and connector.
Uses of FC:-
CHANNEL:- NETWORK:- FC :-
It is a connection Connection less Circuit and packet
service Logical circuit switch
Channel is a physical Unreliable transfer Reliable transfer
circuit High connectivity High data integrity
Reliable transfer Longer distance High data rate
High speed Software intense Low latency
Low latency High connectivity
Short distance Long distance
Hardware intense
FC PORT AND FC SYSTEM :-
The port switch is present in HBA and placed in server is called HBA port or N-port or Node
port
The port which is present in switch is called fabric port or F-port
Again the port present in controller is called N-port
LOOP PORT:-
When we interconnect between two node this is called NL port or node port
When we interconnect between two fabric port is called as FL port
EXPANSION PORT:-
The target port which is present in controller for connection of enclosure is called expansion
port or when we connect two switch that is called expansion port
Enclosure has two port as input port and output port , connecting between 2 enclosor is
called L-port
I. HBA
II. Fc cable
III. Switch
IV. Enclosure
FC TOPOLOGY :-
i. POINT TO POINT :-
In this topology we can connect server with controller directly (DAS setup)
Only 2 device can connected
TOPOLOGY COMPARISION :-
Effect of port Failure Link Fails Loop fails (port by pass Link between switch to
function required) host fails
Classes of service ALL Class 1 2 3 ALL
supported
Cost per port Port cost Port cost + loop Port cost + fabric cost
function
FC LAYERS
FC 0
FC1
FC2
FC3
FC4
FC 0 LAYER
FC 1 LAYER
Ans :-
Ans :-
There are 12 special character defined by 8 bit / 10 bit encoding scheme , out of them only
k28.5 character is used by the fiber channel
The 1st character of transmission word is known as order set. It is transmission word that
includes some combination of special character and data character in set of frame , this set
of d&k is defined by order set or arrangement of d&k in a frame is called order set
FC2 Layer :-
It provides 4 tire architecture approach to control and manage delivery of the package
Four tire structure consist of
Login
Exchange
Sequence
Frame
Login :-
A login session that exist between two ports and allow highest level operation to
take place between those port.
A session can be establish by an explicitly login process
Exchange :-
It consists of one or more related information units such as command , data and
status between two ports need to exchange
Sequence :-
Each information units delivered by using a sequence of one or more frames
Because of frame size is limited by the standard, and the total information unit may
not fit in one frame.
For this condition only we need to segment the information unit and use a
sequence of frame to deliver the information unit.
Frame:-
Frame carry information from one port to another port
Frame would be thought as envelope used to transport the information across fc
interface
FC LOGIN PROCESS:-
When a host connected to the Fc switch and target also connected to switch , how
they communicated with each other is defined under FC login process
When host logged into switch the 1st process start or initiated by the n-port is called
FLogi request , N-port send the request to receive a valid FC-address from the switch
N-port will send a flogi request frame that contains node name ,n port name and
service parameter from the source address of 0*000000 to the well known address
of 0*FFFFFE
o 0*FFFFFE is the broadcast address
o 0*000000 this means there is no 24 bit address in N port or source
Same process happens with controller
Once switch received the F-logi request from the n port, it will give a 24 bit address
as FCID that belongs to fabric as Flogi accept frame
o The 24 bit address is divided into 3 parts
8 bit for domain id
8 bit for area id
8 bit for alpa id
o Domain :- no. Of switch connected
o Area :- this means the device connected to switch , it’s called area no. Of n
port connected
o Alpa :- no. Of port present
Total no of node port or device = 239 switch * 256 areas * 256 ports = 15,663,104
(approx)
Once FLogi completed its work and recive a valid 24 bit address , the next process
starts is known as Plogi request
Plogi is port login
During Plogi request n port will register its 24 bit FC id along with it sends 64 bit
PWWN ,NWWN ,port type , classes of services to the switch name server as the well
known address 0*FFFFFC
The switch will accept the Plogi request and register all information into the name
server as Plogi accept frame
Once the Plogi is completed PRLI process start , it’s nothing but node to node
communication
Here node will not get any information from fabric but from other node
It is related to Exchange ID (OXID ,RXID ) and session information (sequence ID ,
Sequence count)
o OX-originator ID
o RX- receiver ID
o Seq id – sequence id
o Seq – count – sequence count
After this information has exchanged 2 node will communicate with each other
directly
PRLI established with SCSI operating environment between source and target N port
FC FRAME :-
FLOW CONTROL :-
It is a process of maintain the rate of data transfer between two ports to prevent a faster
sender from a slower receiver to avoid frame loss at receiver side due to lack of available
buffer.
It is a mechanise to prevent or at least minimize the potential for frame loss due lack of
available buffer after receiving port
o Buffer :- temporary memory (register )
Fiber channel implements two type of flow control
o Buffer to buffer flow control (BB credit)
o End to End flow control (EE credit )
Buffer to Buffer
This type of flow control address between N-port and F-port or
between two F-port
While transmitting the data this BB-credit is used by each port to
send the frame
1. Class 1 :-
a. State full connection between two N-port
b. Frame are delivered in order
c. Frame delivery guaranteed as ack is given
d. End to End flow control used
2. Class 2 :-
a. Connection less
b. Unordered delivery frame
c. Multiple flow control used
d. Fabric will check the data delivery
3. Class 3:-
a. Connection less
b. Unorder delivery frame
c. Delivery not guaranteed
d. BB-flow control used
e. No notification to originator of dropped frame.
4. Class 4:-
a. Stateful virtual circuit
b. Frame are delivery in order
c. Frame delivery guarranted
5. Class 6:-
a. Similar to class 1 with multicast
b. This performed by fabric
FC 3 LAYER :-
It is called as common service layer
I. Management server : FFFFFA
II. Time server : FFFFFB
III. Name server : FFFFFC
IV. Fabric controller : FFFFFD
V. Multicast server : FFFFF5
VI. Alias server : FFFFF8
VII. Quality of service server : FFFFF9
FC 4 LAYER :-
It is called ULP mapping layer
ULP – User level protocol
It is equivalent to presentation layer of OSI
This layer maps SCSI commands to FC Frames
Protocol Used
o SCSI
o IP
o IPI-3(Intelligence peripheral interface ) used in tap disk communication
o ATM-AAL5 (ATM – Asynchronous transfer mode)
o IEEE 802.2 llc
-:ZONING :-
Zoning is a fabric based service in storage area network which groups host and target ports
in switch that need to communicate
It creates a group in which a node can communicate with each other only if they are the
member of the same zone
Zoning is of two types
Hard zoning
Soft zoning
Hard zoning
It is the segregation of port or binding the port on the switch
It is created based upon the slot number and port number of the switch
In a slot there are many ports(8,16,24 ..) are present
Brocade switch OS -> FOS (Fabric os)
When a port is replaced or damaged rezoning required
In hard zoning the configuration stored in ASIC chip
It is more secure
ASCI stands for :- Application specific Integrated Circuit
Soft Zoning :-
It is created based upon the PWWN of host and target
We use HBA port of host and controller to bind , it does not depend on the switch
port
The configuration of soft zoning stored in NS-table in the switch
Here rezoning required if adopter card or controller port is damaged or changed
NS-table stands for name server table
It is less secure than hard zoning but easy to configure
Switch
Config
Zone
Members
Create configuration
o #cfgcreate “ config name ” , “Zone name”
Display configuration
o Cfg show
To add member to configuration
o #cfgadd “cfg name which is created ”, “ name of member”
To create zone (Hard zoning)
o Zone create “name of the zone”, “0,1;1,2”
Adding member to existing zone
o Zoneadd “zone name which created ”, “new member”
Create zone(soft zone)
o #zonecreate “zone name ”, “pwwn of host ; pwwn of target ”
save configuration
o #cfgsave
to show zone
o #zoneshow “zone name”
to remove zone
o zone remove “zone name”
to create alias or duplicate name for port
o alicreate “name of alias” , “pwwn of port”
to show alias
o #alishow
#nsshow
o It will display all the device connected to the switch
To show port
o Port show “0,1”
In this Practical we are using network switch to FC at the management port only to access
the FC switch through telnet. We connect the network switch to management port as there
is no network port in FC
SAN SETUP
Controller :-
CLUSTER :-
CONTROLLER FEATURE:-
Based on the controller model no. We use enclosure to connect with controller.
EMC – Flare
IBM – Vx Works
Netapp – ON tap
QLogic – Sansurfer
Emulex – HBA any where
LSI – Mega cli /MSN
We use management software to manage the system without rebooting the system
Juniper OS name is Junose
We can connect controller to controller through cupper cable
PERSISTENCE RESERVATION :-
In this technique if a no of server connect to a single controller and assigned to a
single LUN , when one server write data to the LUN , other will remain silent or
write will lock for other server
Go to the adapter card bios , enter into the selectable boot device , set that
LUN as 1st boot device then save and exit
Then go to the system bios , set the LUN as 1st boot device
Now the server boot from SAN LUN , this process is called as SAN boot process
NVRAM :-
→ It is stands for non volatile static ram
→ It is used to push data to the hard disk
VSAN 1 VSAN 2
CISCO ZONING :-
BROCADE ZONING :-
Config
Zone
Add member
#config terminal
#vsan database
It will display device connected to the switch and give valid address (PWWN ,
NWWN)
To save configuration
→ #config terminal
→ #vsan database
→ Vsan <vsan number> interface Fc slot/port
→ Eg:-#vsan vsan3 interface FC 0/1
Trunking:-
The port which is connected from host to switch or the port where the port is
connected to the switch , that port is called access port
The port where a switch is connected to another switch , that port is called trunk
port
To connect to switch:-
Advantage :-
a) Scalability
b) Traffic isolation
c) Easy to configuration
d) Reduces the no. Of FCID in the switch
To show zoneset - #show zoneset
IP PWWN MAC
PWWN
FCOE
Testing is of 2 types
Definition:-
Verification :-
Validation :-
Testing chart
High priority :-
o This means how soon the error should fix
High severity :-
o This define how critical the error is
Requirement analysis
Gathering information
Design
Coding
Testing
Implementation
Maintenance
UNIT TESTING :-
TEST PLAN:-
The engineer who have base understanding of planning and analysis the code , syntax and
correct it , is known as white box tester
UNIT TESTING :-
The engineer who does the unit testing . he should have some basic programming
Knowledge , like basic coding knowledge and syntax error and should correct it
Unit testing has access the code while executing or running the code , it can be
change based upon the issue found
Most of the cases the unit tester will sit close to the development team
Gray box :- in this case there is access to code but tester can’t change the code or fix the
problem
Black box :-
The test is performed by the engineer in which we can test the feature and
functionality of the product , no access to code , no re construction happen
It consists of
1. Sanity
2. Functional
3. Regration
4. Integration
5. System
6. Compatibility
7. Performance
a. Load
b. Stress
8. Smoke
9. Adhoc
1. Sanity :-
Basic function will test under this testing
Basic functionality of testing is called sanity testing
2. Functional testing :-
To test the functionality of product to make sure that the function working
properly or not
i. Eg:- Raid 5 (9266 i)
ii. If one port is support upto 8 hard disk
iii. Test 0,1,5,6
iv. Test state
Here the functional thing should be available
i. h/w requirement should present
ii. Build should present
iii. Test cases should present
Build is a software program which needs to verify against the product
3. If test cases fails then bug life cycle start
Bugzila
Mantis
NEW Status
Q:- How to rise a bug and what are the component to file a bug
Synopsis :-
Severity :-
It is nothing but how critical the issue is or how much impact it will create on
product
It has dropdown with high , medium and low
Priority :-
Description :-
Interested :-
Components :-
Attachment :-
It may be the screenshot and log file and attach it , logfile used for
debugging purpose then click on submit
After this it will create an id this number is called bug id
New: When a new defect is logged and posted for the first time. It is assigned a status
NEW.
Assigned: Once the bug is posted by the tester, the lead of the tester approves the bug
and assigns the bug to developer team
Open: The developer starts analyzing and works on the defect fix
Fixed: When developer makes necessary code change and verifies the change, he or she
can make bug status as "Fixed."
Pending retest: Once the defect is fixed the developer gives particular code for retesting
the code to the tester. Since the testing remains pending from the testers end, the status
assigned is "pending request."
Retest: Tester does the retesting of the code at this stage to check whether the defect is
fixed by the developer or not and change the status to "Re-test."
Verified: The tester re-tests the bug after it got fixed by the developer. If there is no bug
detected in the software, then the bug is fixed and the status assigned is "verified."
Reopen: If the bug persists even after the developer has fixed the bug, the tester
changes the status to "reopened". Once again the bug goes through the life cycle.
Closed: If the bug is no longer exits then tester assign the status "Closed."
Duplicate: If the defect is repeated twice or the defect corresponds the same concept of
the bug, the status is changed to "duplicate."
Rejected: If the developer feels the defect is not a genuine defect than it changes the
defect to "rejected."
Deferred: If the present bug is not of a prime priority and if it is expected to get fixed in
the next release, then status "Deferred" is assigned to such bugs
Not a bug: If it does not affect the functionality of the application then the status
assigned to a bug is "Not a bug".
Regression testing :-
Integration testing:-
Compatibility testing :-
Matrix :-
Performance :-
ii. Aixia
to measure the peak point where your system component don’t response, we need to do
performance test
load :-
load means to put a load that at which point the system can’t able to take the load or stop
working
bench mark :-
stress :-
Retest :-
It is nothing but to check a particular component when the issue got fixed
Adhoc testing :-
This testing is happened at lesure period . it is done randomly without any proper document
and helps us to give better product
Alfa:-
Beta :-
It is done in client level . in client office if any issue occurred after product release
Smoke testing :-
When a build is developed and comes to the tester , then the initial testing of that build by
the tester is called smoke testing . Here we see that the build is properly working or not.
User acceptance :-
Certification :-
It is one of testing where all application vendor provide kit against the hardware and then
test for a few days , then they certified that this vendor supports this hardware
Python
Identifier :-
Class names start with an uppercase letter. All other identifiers start with a
lowercase letter.
Keywords:-
You cannot use keyword as constant or variable or any other identifier names. All the Python
keywords contain lowercase letters only.
Numbers
String
List
Tuple
Dictionary
1. NUMBER:-
Number data types store numeric values. Number objects are created when you
assign a value to them
Eg:- var1= 10
Var2= 20
long (long integers, they can also be represented in octal and hexadecimal)
For example :-
3. LIST :-
A list contains items separated by commas and enclosed within square brackets ([])
All the items belonging to a list can be of different data type.
List is mutable object ,means can be modified after created.
List can be access using the slice operator ([:])
Index starting is 0 as beginning and -1 is the last index
(+) sign is the string concatenation operator
(*) is the repetition operator.
Eg:-
print list # Prints complete list - ['san', 786, 2.23, 'john', 70.2]
print list[0] # Prints first element of the list – san
print list[1:3] # Prints elements starting from 2nd till 3rd - [786, 2.23]
print list[2:] # Prints elements starting from 3rd element- [2.23, 'john', 70.2]
print list1 * 2 # Prints list two times - [123, 'san', 123, 'san']
print list + list1 # Prints concatenated lists-- ['san', 786, 2.23, 'john', 70.2, 123, 'san']
4. TUPLES:-
A tuple is a sequence data type that is similar to the list.
A tuple consists of a number of values separated by commas.
Tuples are enclosed within parentheses.()
Tuples is immutable objet , the value can’t be updated .
Eg:-
>>> tuple = ( 'san', 786 , 2.23, 'john', 70.2 )
>>>tuple1 = (123, 'john')
>>>print tuple # Prints complete list - ('san', 786, 2.23, 'john', 70.2)
>>>print tuple[0] # Prints first element of the list- abcd
>>>print tuple[1:3] # Prints elements starting from 2nd till 3rd -(786, 2.23)
>>>print tuple[2:] # Prints elements starting from 3rd element- (2.23, 'john', 70.2)
>>>print tuple1 * 2 # Prints list two times-(123, 'john', 123, 'john')
>>>print tuple + tuple1 # Prints concatenated lists-('san', 786, 2.23, 'john', 70.2, 123, 'john')
5. DICTIONARY :-
It consist of key-value pairs.
A dictionary key can be almost any Python type, but are usually numbers or strings.
Values, on the other hand, can be any Python object.
Dictionaries are enclosed by curly braces ({ }) and values can be assigned and
accessed using square braces ([])
Eg:-
dict = {}
dict['one'] = "This is one"
dict[2] = "This is two"
long(x [,base] ) Converts x to a long integer. base specifies the base if x is a string.