Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 63 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
63
Dung lượng
467,45 KB
Nội dung
161 STUDY GUIDE The Study Guide section provides you with the opportunity to test your knowledge about service tools and monitoring systems. The Assessment Questions provide practice for the test, and the Scenarios provide practice with real situations. If you get any questions wrong, use the answers to determine the part of the chapter you should review before continuing. Assessment Questions 1. Which protocol is used to perform network management? A. SNAP B. SMTP C. MIB D. SNMP 2. In SNMP, what does the agent software do? A. Collects data and sends it via e-mail to a predetermined address. B. Collects information and forwards it to an NMS. C. Collects data and forwards the information to a server operating system. D. It simply collects the data, and you must manually seek the information using a NMS. 3. What do you configure on SNMP devices to enable them to send messages to the NMS? A. Traps B. Alerts C. MIBs D. PASS 4. What are some typical SNMP thresholds? A. Port malfunctions B. Network congestion C. Packet collisions 161 Chapter 6 ✦ Study Guide 4809-3 ch06.F 5/15/01 9:47 AM Page 161 D. Device failures E. All of the above 5. What are the two current versions of SNMP called? A. SNMPvA and SNMPvB B. SNMPv1 and SNMPv2 C. SNMPv4 and SMPv5 D. SNMPvC and SNMPvD 6. There are three key components in an SNMP managed network. Based on the list below, which ones are correct? I. Managed devices II. Thresholds III. Agents IV. NMS A. I and IV only B. I, III, and IV only C. I, II, and III only D. II and III only 7. Which of the following protocol operations is used to retrieve information from an SNMP agent? A. Set B. GetNext C. Get D. Trap 8. You decide that you are going to upgrade your third-party monitoring system to the latest version. What conditions should be met before upgrading? A. You have confirmed that you are upgrading to the correct version. B. You have printed the documentation and read it thoroughly. C. You have confirmed that the system requirements are met for the agent. D. You have removed all the SNMP traps prior to upgrading. 162 Chapter 6 ✦ Study Guide 4809-3 ch06.F 5/15/01 9:47 AM Page 162 163 9. How do you access the Performance Monitor in Windows NT? A. Start Menu ➪ Control Panel ➪ Performance Monitor B. At the command prompt, type WINPERF C. Start Menu ➪ Programs ➪ Administrative Tools D. It is located on the desktop 10. How do you load the MONITOR utility in Novell? A. Start ➪ Sys: B. At the console prompt, type MONITOR. C. At the console prompt, type START MONITOR. D. Choose MONITOR from the Novell Console menu. 11. What is the event log utility used in Windows NT/2000 called? A. Event Viewer B. Log Viewer C. EventReporter D. System Log Viewer 12. What is the logging program in Unix that stores system and applications events in log files called? A. eventlog B. sysevt C. syslog D. alrtlog 13. What is the advantage of using the backup software included in the server operating system? A. Compatibility with the operating system environment. B. It is cheap. C. It has robust features. D. The ability to back up multiple operating system environments. 14. When is the best time to take server baseline statistics? A. When the server is behaving erratically B. When the server is functioning normally C. During peak loads D. In the morning when everyone logs on to the system 163 Chapter 6 ✦ Study Guide 4809-3 ch06.F 5/15/01 9:47 AM Page 163 15. What is an import aspect to cover in the server configuration? A. Network documentation B. Disaster recovery documentation C. Documenting the server configuration D. RAID levels Scenarios 1. You are using Windows NT server in you computer environment. Your users are complaining of latency issues on the network. What software tool that comes with NT could you use, and how would you use it effectively? Answers to Chapter Questions Chapter pre-test 1. SNMP stands for Simple Network Management Protocol. 2. The four SNMP protocol operations are: Get, GetNext, Set, and Trap. 3. Port malfunctions, network congestion, temperature out of range, packet colli- sions, and device failures, are all possible SNMP thresholds. 4. Performance Monitor is the monitoring utility in Windows NT. 5. MONITOR is the NetWare monitoring utility. 6. Event Viewer is the Windows NT utility used to view event logs. 7. The syslog utility is used to view system logs in Unix. 8. Windows NT Backup is the backup utility that comes with Windows NT. 9. A server baseline defines the typical activity of your network servers. Assessment questions 1. D. SNMP, the Simple Network Management Protocol, is used to control net- work communications devices using TCP/IP. The SNMP protocol collects statistics from devices on the TCP/IP networks. Answer A is incorrect because SNAP doesn’t stand for anything. Answer B is incorrect because SMTP is the Simple Mail Transfer Protocol. Answer C is incorrect because the MIB is the Management Information Base, which is a component of SNMP. For more infor- mation, see the “Monitoring the network with SNMP” section. 164 Chapter 6 ✦ Study Guide 4809-3 ch06.F 5/15/01 9:47 AM Page 164 165 2. B. The agent software that is loaded by the devices collects information and forwards the information to a Network Management System (NMS). Answer A is incorrect because the NMS software has e-mail capabilities, not the agent. Answer C is incorrect because the information has to go to an NMS, not the server operating system. Answer D is incorrect because manually seeking the information defeats the purpose of having agents on the devices. For more information, see the “Monitoring the network with SNMP” section. 3. A. Traps are configured on SNMP devices to allow them to send alerts to the NMS. Answers B, C, and D are all incorrect because they are not items that can be configured to send alerts. For more information, see the “Monitoring the network with SNMP” section. 4. E. All of these items are typical SNMP thresholds that traps can be set for. For more information, see the “Monitoring the network with SNMP” section. 5. B. SNMPv1 and SNMPv2 are the current versions of SNMP. SNMPv3 was in the works at the time of writing. For more information, see the “Monitoring the network with SNMP” section. 6. B. Managed devices, agents, and the NMS are the three key components in an SNMP managed network. Thresholds are part of the network, but are config- ured on the managed devices. For more information, see the “Monitoring the network with SNMP” section. 7. C. The Get operation is used by the NMS to retrieve values of the object instances from an agent. Answer A is incorrect because the Set operation is used to set the value of an instance. Answer B is incorrect because the GetNext operation retrieves the value of the next instance. Answer D is incor- rect because the Trap operation sends an event to the NMS. For more infor- mation, see the “Monitoring the network with SNMP” section. 8. C. You should make sure that the current version of your operating system is compatible with the latest version of the third-party monitoring system. You may find out that it is intended for the most recent release of your server oper- ating system, or you may be required to have a certain service pack or hot fix installed. Answer A is incorrect because you should ensure that you are not going to upgrade to the wrong version. Answer B is incorrect because this is not a condition that needs to be met before installing the upgrade. This is something that you should do prior to actually installing the original software. Answer D is incorrect because removing all the SNMP traps will only cause you more work as you will have to recreate them. There is no need to remove the traps. For more information, see the “Using monitoring tools” section. 9. C. You can access to the Performance monitor by selecting Start ➪ Programs ➪ Administrative Tools, and choosing Performance Monitor from the list. Answer A is incorrect because Performance Monitor is not located in the control panel. Answer B is incorrect because this is a fake command. The correct command to start Performance Monitor from the command prompt is perfmon. Answer D is incorrect because there is no shortcut to Performance Monitor on the desktop, unless you have created a shortcut to it. For more information, see the “Windows Performance Monitor” section. 165 Chapter 6 ✦ Study Guide 4809-3 ch06.F 5/15/01 9:47 AM Page 165 10. B. You just need to type the word MONITOR from the console prompt to start the Novell MONITOR utility. For more information, see the “NetWare MONI- TOR” section. 11. A. The event log utility used for viewing the logs is called Event Viewer in Windows NT/2000. It can be accessed by selecting Start ➪ Programs ➪ Administrative Tools. Answers B and D are incorrect because there are no such Windows utilities. Answer C is incorrect because EventReporter is a third-party utility. For more information, see the “Using event logs” section. 12. C. Syslog is the logging program in most versions of Unix that stores system and applications events in log files. Answers A, B, and D aren’t real utilities. Refer to the Event Logs section in this chapter for more information. For more information, see the “Using event logs” section. 13. A. The only real advantage is compatibility with the operating system environ- ment. Answer B is incorrect because some operating system vendors charge an additional fee for including the backup software. Answer C is incorrect because most backup programs that come with the operating system are not as robust as third party programs. Answer D is incorrect because this is false for most operating system backup programs. However, NetWare’s backup util- ity has the ability to backup NT computers. For more information, see the “Backing up the server” section. 14. B. You should always want to perform a baseline operation when the server is performing under normal conditions. All the other answers are incorrect because this would give you false data for your baseline. For more informa- tion, see the “Performing a Server Baseline” section. 15. C. Ensuring you have good documentation on your server configurations will make them easier to troubleshoot when problems occur, and easier to recover in the event of a disaster. For more information, see the “Documenting the Configuration” section. Scenarios 1. Under Windows NT you would use Performance Monitor to analyze your server environment. You could make use of the Chart mode by selecting the proper objects and adding the appropriate counters for real time monitoring. Some of these counters are found under the Network Segment and Network Interface objects. They could include: % Broadcast Frames, % Multicast Frames, % Network Utilization, Packets/sec, and Packets Sent/sec. You would use the Log mode to do some extensive logging over the course of the day, week, and so on. At the end of each day you could export the log files and exam them. You would also configure the Alert mode to notify you automati- cally if any of the thresholds that you set on the object counters were met. You may want to set thresholds on the %Network Utilization, because this counter should not be consistently higher than 50%. 166 Chapter 6 ✦ Study Guide 4809-3 ch06.F 5/15/01 9:47 AM Page 166 Upgrading U pgrading is a constant task when maintaining a network server. You may need to add new processors to handle the increase of new workloads, or new hard drives to increase storage space. Upgrading memory and service tools will be another important part of your job. The most important step before performing any upgrade procedure is to make a full backup of the current system and verify the backup is valid. Some administrators have made the mistake of not verifying the system backup, only to find out the hard way that the backups are bad and cannot be used to restore the system. This Part focuses on the proper procedures to follow when upgrading a server, and how not to lose any data in the pro- cess. More than just servers are covered in these chapters; even uninterruptible power supplies must be upgraded even- tually. The chapters in this Part provide you with an overall understanding of upgrading servers and server peripherals. Twelve percent of the exam is dedicated to upgrading, and this Part covers each objective so you will be fully prepared. ✦✦✦✦ In This Part Chapter 7 Upgrading Motherboard Components Chapter 8 Upgrading Storage Devices Chapter 9 Upgrading Cards and Peripherals ✦✦✦✦ PART III III 4809-3 pt03.F 5/15/01 9:47 AM Page 167 4809-3 pt03.F 5/15/01 9:47 AM Page 168 Upgrading Motherboard Components EXAM OBJECTIVES 3.1 Perform full backup • Verify backup 3.2 Add Processors • On single processor upgrade, verify compatibility • Verify N 1 stepping • Verify speed and cache matching • Perform BIOS upgrade • Perform OS upgrade to support multiprocessors • Perform upgrade checklist, including: locate/obtain latest test drivers, OS updates, software, etc.; review FAQs, instruction, facts and issues; test and pilot; schedule downtime; imple- ment ESD best practices; confirm that upgrade has been rec- ognized; review and baseline; document upgrade. 3.4 Increase memory • Verify hardware and OS support for capacity increase • Verify memory is on hardware/vendor compatibility list • Verify memory compatibility (e.g., speed, brand, capacity, EDI, ECC/non-ECC, SDRAM/RDRAM) • Verify that server and OS recognize the added memory • Perform server optimization to make use of additional RAM 3.5 Upgrade BIOS/Firmware 7 7 CHAPTER ✦✦✦✦ 4809-3 ch07.F 5/15/01 9:47 AM Page 169 170 Part III ✦ Upgrading CHAPTER PRE-TEST 1. How does memory caching affect server performance? 2. What does CPU stepping refer to? 3. What is multiprocessing? 4. What is the difference between SRAM and DRAM? 5. How does synchronous RAM differ from asynchronous RAM? 6. How does ECC memory prevent server crashes? 7. How does bus width affect I/O performance? 8. What is an AGP slot? 9. Explain the concept of bus mastering. 10. Describe hot-plug PCI. ✦ Answers to these questions can be found at the end of the chapter. ✦ 4809-3 ch07.F 5/15/01 9:47 AM Page 170 [...]... The new Pentium 4 CPU runs on a 40 0 MHz system bus Table 7-1 summarizes the relationship between the different processors and the buses Table 7-1 Bus and Processor Speeds CPU Bus Width Bus Speed (MHz) 8088 8-bit 4. 77 8086 16-bit 8 80286 16-bit 12 80386 16-bit 16 8 048 6SX-25 32-bit 25 8 048 6DX-33 32-bit 33 8 048 6DX2-50 32-bit 25 8 048 6DX-50 32-bit 50 8 048 6DX2-66 32-bit 33 8 048 6DX4-100 32-bit 40 5X86-133 32-bit... 8 048 6DX-50 32-bit 50 8 048 6DX2-66 32-bit 33 8 048 6DX4-100 32-bit 40 5X86-133 32-bit 33 Intel Pentium 60 64- bit 60 Intel Pentium 100 64- bit 66 Cyrix 6X86 P133+ 64- bit 55 Intel Pentium 166 64- bit 66 Intel Pentium II 64- bit 66 Intel Pentium III 64- bit 100, 133 Pentium 4 64- bit 100 4 4809-3 ch07.F 5/15/01 9 :47 AM Page 185 Chapter 7 ✦ Upgrading Motherboard Components I/O buses As the system bus connects the... the server stores running applications and data Server memory is crucial to server performance, as no amount of CPU power will help a server without enough memory to store its operations Upgrading the memory of a server is a very common procedure for server technicians Typically, when new applications are added, they demand more memory from the server Upgrading memory is just as integral a part of server. . .48 09-3 ch07.F 5/15/01 9 :47 AM Page 171 Chapter 7 ✦ Upgrading Motherboard Components U pgrading hardware and software on your server is a standard job for a server technician As user demand begins to outgrow your server resources, you must upgrade the components of your server as required to preserve system performance Updating the motherboard components of a server can be one of... can flow through it Older bus widths were 8 and 16-bit, while modern buses use a 64- bit width ✦ Bus bandwidth: Bandwidth refers to the total amount of data that can be transferred on a bus over a certain amount of time This is typically measured in Megabits per second (Mbps) 183 48 09-3 ch07.F 1 84 5/15/01 9 :47 AM Page 1 84 Part III ✦ Upgrading The system bus is designed to match a particular CPU In older... instructions for 3D video performance (which means little to server performance), and can run on a 100MHz or 133MHz system bus ✦ Pentium 4: The Pentium 4 is the latest member of the Intel Pentium family Boasting three times the bandwidth of the Pentium III, the Pentium 4 is a 32-bit processor using a 100MHz system bus It currently comes in speeds of 1 .4 and 1.5 GHz It also offers the most advanced performance... bandwidth Its original clock speed was 4. 77MHz, but a later version was released running at 8MHz ✦ 80286: The next processor leap was to the 80286 processor, which doubled the speed of the earlier 8086 and 8088 processors It could run up to clock speeds of 20 MHz and address up to 16MB of memory It also introduced the 173 48 09-3 ch07.F 1 74 5/15/01 9 :47 AM Page 1 74 Part III ✦ Upgrading concept of protected... VESA was a direct extension of the 48 6 processor/memory bus It did not, however, support bus mastering or plug-andplay It also did not have much relevance with the server market, which did not need advanced video capabilities Although popular during the 48 6 era, it was quickly rendered obsolete by the Pentium computer and its PCI local bus 185 48 09-3 ch07.F 186 5/15/01 9 :47 AM Page 186 Part III ✦ Upgrading... module 193 48 09-3 ch07.F 1 94 5/15/01 9 :47 AM Page 1 94 Chapter 7 ✦ Study Guide 10 A buffered memory module has what characteristic? A It contains a register that delays incoming data B It holds data until it can be written to the disk drive C It helps to minimize the load of information transfer D It holds data in a secondary cache to speed up processes 11 A technician has just upgraded a server s RAM... vendor or the manufacturer of your system the type of RAM that the server uses Consult the manual for your motherboard to see what type of memory it can handle You will need to check for memory size, speed, type, and capacity 181 48 09-3 ch07.F 182 5/15/01 9 :47 AM Page 182 Part III ✦ Upgrading 3 Check the memory banks and slots Older servers might be using SIMM technology The SIMM memory slots are organized . multiple operating system environments. 14. When is the best time to take server baseline statistics? A. When the server is behaving erratically B. When the server is functioning normally C. During. Guide 48 09-3 ch06.F 5/15/01 9 :47 AM Page 163 15. What is an import aspect to cover in the server configuration? A. Network documentation B. Disaster recovery documentation C. Documenting the server. infor- mation, see the “Monitoring the network with SNMP” section. 1 64 Chapter 6 ✦ Study Guide 48 09-3 ch06.F 5/15/01 9 :47 AM Page 1 64 165 2. B. The agent software that is loaded by the devices collects