Sie sind auf Seite 1von 355

Wipro - IAS Server Certification

Reference Materials

Disclaimer: This document contains proprietary information of Wipro Ltd IAS. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, whether electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of Wipro Ltd. IAS. The information contained herein is confidential to Wipro Ltd. IAS and its Service Partners, shall not be distributed to any persons other than those involved in the assessment & delivery of services. Wipro Ltd. IAS reserves the right to revise and update this document as and when required. Wipro Ltd. IAS reserves the right to withdraw the document excluding customer specific information at the time of termination of services. All product names referenced herein are trademarks of their respective companies.
2010 Wipro Ltd - Internal & Restricted

Topics - Overview
Hardware Backup devices Basics Dell Server HP Server IBM Server Networking Storage Basics Troubleshooting Wipro Servers Software Antivirus Linux Server Diag. Toolkit Process Care, Handling & Best Practices Process Basics Server Management

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Server Hardware Basics

2010 Wipro Ltd Ltd Internal & Restricted 2010 Wipro - Confidential

What is ESD ?
ESD : Electrostatic discharges Most severe form of electromagnet interference (EMI).

The following are the most common causes of ESD: Moving people Low humidity (hot and dry conditions) Improper grounding Unshielded cables Poor connections Moving machines

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Source of ESD voltage


Typical Electro Static Voltage in KV at a relative humidity of 20%

Walking across Vinyl floor Walking across synthetic carpet Opening a plastic bag Arising from a foam cushion Sliding plastic box on a carpet Removing plastic tape for a PC board Removing shrink film from PC board Triggering a vacuum solder remover Spraying aerosol freezer spray

12 KV 35 KV 20 KV 18 KV 18 KV 12 KV 12 KV 8 KV 15 KV

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Devices Susceptibility to ESD damage

Device type Bipolar transistors CMOS logic devices EPROM devices Film resistors TTL logic devices Microprocessor chips

ESD susceptibility 380 to 7000 Volt 250 to 3000 Volt 100 volt 300 to 3000 Volt 1000 to 2500 Volt as low as 10 Volt

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

ESD safe work areas and protective equipment

Workstations where static sensitive equipment is handled must be equipped with the following equipment:
Bench top grounding points ESD protective table top or mat Wrist strap and grounding points Protective clothing, including hair protection ESD safe floor area ESD safe chair Ionized air blower ESD safe containers

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

ESD safe work areas and protective equipment

When repairing equipment out in the field the minimum equipment to ensure a measure of ESD protection is: Anti-static conductive mat and grounding cable Wrist strap and grounding cables Supply of protective bags and other suitable containers

Field Service Technicians must also wear suitable clothing and avoid handling objects that can generate dangerous electrostatic potentials. These objects include non protective bags and containers, beverage and food containers, and furniture.

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

10 Point to Avoid ESD Damage


1. Make sure you have a reliable ground point available near the work site

2. Connect your body to the ground point with a wrist strap


3. Ground all equipment you are working on with ground straps 4. Handle PC components only on a grounded anti-static work surface 5. Do not wear clothing which generates static electric charges every time you move 6. Do not handle static generating objects while working on PC hardware

7. Store all chips and other components in appropriate anti-static containers


8. Keep all PC cards in anti-static envelopes until required 9. Be sure to turn off the power and remove the power plug from all equipment before working on it 10. Do not plug in or remove devices such as printers and modems while the power is on
9
2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Typical antistatic devices

10

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Discharging through the power-supply unit

11

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Care and Handling - Systems


Use the following guidelines to properly handle and care for your system
Protect the system from extremely low or high temperatures. Let the system warm (or cool) to room temperature before using it.

Keep the system away from magnetic forces.


Keep the system dry. Do not wash the system with a wet cloth or pour fluid into it. Protect the system from being bumped or dropped. Check the system for condensation. If condensation exists, allow it to evaporate before powering on the system. Keep the system away from dust, sand, and dirt.
12
2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Selecting a Sight
Near a Properly grounded, three-pronged power outlet for 200-240V

Clean and relatively free of excess dust


Well-ventilated and away from sources of heat, with the ventilating openings on the server kept free from obstructions Maximum ambient temperature shouldn't exceed 35 oC ( 95 oF)

Isolated from strong electromagnetic fields and noise caused by electrical devices such as elevators, copy machines, air conditioners, large electric motors, radio and TV transmitters, and high frequency security devices
Access space provided for handling the cables connected to the server Clearance provide for cooling and air flow
13
2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Server Fundamentals
A server is a multi user computer that runs networked, mission critical applications.

Redundant Power Supplies

Hot Plug Drive bays

SMP Motherboard
14
2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Backplane board for RAID

Typical Server Motherboard


PCI/ PCI-X 66/100/ 133MHz, 64bit Slots Gigabit Ethernet EMP

PCI, 32-bit / 33MHz Slots


Secondary

Dual Xeon DP Processor

Primary

ATI Rage Video with 4/8MB SGRAM

ATI Rage XL / Rage IIC

North Bridge

4/8 DDR DIMM Sockets


South

Adaptec U320 SCSI Chip BMC

Adaptec AIC-79xx*

Ultra 320 SCSI

Bridge

Ultra 320 SCSI

15

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Server Architecture Fundamentals


The Five Pillars of a Server architecture are;

Performance Reliability Availability Manageability Scalability

16

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Performance
The ability to run applications with a reasonable response time for each of the many users.

Implementing Performance
Processors (Speed, no of proc) High Bandwidth CPU-Memory Bus High Bandwidth I/O Bus & Controllers (SCSI,SATA and SAS) Memory (Capacity, Speed) Operating System Support Ethernet (10/100/1000/10000 Mbps)
17
2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Reliability
The ability to perform correctly and consistently

Implementing Reliability
Highly integrated Motherboard Onboard Disk controller , Ethernet and VGA Onboard Local and remote management High integration results in high Reliability High MTBF(Mean Time Between Failures) ECC (Error Checking and Correction) Memory

18

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Availability
The ability to tolerate different degrees of failure.

Implementing Availability
EMP (Emergency Management Port) Management Software (ISC LDCM LDSM) PHP (PCI Hot Plug) Support Redundant Power Supply RAID (Redundant Array of Independent Disks) Hot Swappable Hard disk

19

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Manageability
The feature that enables planning, monitoring and controlling under normal & abnormal conditions of work.

Implementing Manageability
ISM (Intel Server Management) Local Management Super Doctor III Local Management EMP (Emergency Management Port) Remote Management WAC ( Wipro Active Console)

20

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Scalability
The ability to perform at the same level when the load is increased.

Implementing Scalability
Max Max Max Max Memory supported PCI / PCI-X / PCI Express slots available processor speed supported no of drives mounting

21

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Essentials of Servers
Feature Performance Reliability Availability Manageability Scalability Technology CPU/Chipset,Memory High Integration, ECC Fault Detection & Correction Local & Remote Management Headroom for Growth

22

2010 Wipro Ltd Internal & Restricted

Platform,Technology & RAID

23

2010 Wipro Ltd - Internal & Restricted

Technology Overview
Processors

Memory
Chipset Networking RAID & HBA

24

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Processor Platform & Technology

25

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Classification

26

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

UP / DP / MP

27

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

EM64T

28

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

HT Hyper Threading

29

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Dual Core Technology

30

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Dual Core with Hyper Threading

31

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Quad Core Technology

32

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

FSB Front Side Bus

33

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

AMD Platform - Classification

34

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

AMD Integrated Memory Controller

35

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

AMD Features

36

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

AMD Direct Connect Architecture

37

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Intel VT Virtualization Technology

38

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Intel Processor Feature - XD

39

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Intel / AMD Common Features

40

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Intel Processor Number Series

41

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

AMD Processor Number Series

42

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Utilities

43

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Memory Platform & Technology

44

2010 Wipro Ltd Internal & Restricted

DDR - 1

45

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

DDR II & Differentiation

46

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Comparison

47

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

FBDIMM

48

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

FBDIMM Definition

49

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

FBDIMM AMB Technology

50

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

FBDIMM Benefits

51

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

DDR View

52

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

DDR 3 Specifications

53

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

DDR 3 A Comparison

54

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

DISK SUB SYSTEM

55

2010 Wipro Ltd Internal & Restricted

SCSI
What is SCSI ? Advantages of SCSI ? Major Components of SCSI Various SCSI Standards SCSI Connectors / Interface SAF-TE SMART
56
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Small Computer System Interface


SCSI : Small Computer System Interface Pronounced scuzzy Allows Multiple peripheral devices connection Accessed concurrently, simultaneously, or in sequence, as needed.

57

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

What do you gain with SCSI?


Expensive but good. More versatile Systems. Free access to use many and good units It is easy to add Accessories / Drives.

Gives a better performance.

58

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Major Components of SCSI


1. Host adapter card containing one controller and a terminator

2. SCSI Bus (also called a SCSI Cable)

3. SCSI compatible peripheral devices (disks, CD-ROM, tapes, etc.)

4. A terminator representing the end of the SCSI bus

59

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Major Components of SCSI

60

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

SCSI is intelligent
SCSI is remarkable in having an intelligent protocol, which assures maximum utilization of the data transfer. The basis of SCSI is a set of commands Each individual device holds its own controller, which interprets these commands .

61

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

SCSI Specifications
Wide Ultra SCSI utilizes a 16-bit bus and can support data transfer rates of up to 40 MB/second. It supports up to 16 agents.

Wide Ultra2 SCSI is a 16-bit bus and can support data transfer rates of up to 80 MB/second. It can support up to 16 agents LVD (Low Voltage Differential)

Ultra 160 SCSI is a 16-bit bus and can support data transfer rates of up to 160 MB/second. It can support up to 16 agents LVD (Low Voltage Differential)/ SE (Single Ended)

Ultra 320 SCSI is the latest Technology of SCSI Data transfer and it supports data transfer rates of upto 320 MB/Second

62

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Types of SCSI Connectors

50pin narrow connector ( 8bits wide data bus)

68pin wide connector (16bits wide data bus)

63

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Types of SCSI Connectors


68pin VHDCI connector (external 16bits wide data bus))

80pin connector (internal 16bits wide data bus).

80pin connectors are mainly for hot swappable feature


64
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

SATA

65

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

SAS

66

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

SAS
A typical Serial Attached SCSI system would consist of the following basic components: An Initiator is a device that originates device service and task management requests to be processed by a target device and receives responses for the same requests from other target devices. Initiators may be provided as an on-board component on the motherboard (as is the case with many serveroriented motherboards) or as an add-on host bus adapter. A Target is a device containing logical units and target ports that receives device service and task management requests for processing and sends responses for the same requests to initiator devices. A target device could be a hard disk or a disk array system. A Service Delivery Subsystem is the part of an I/O system that transmits information between an initiator and a target. Typically cables connecting an initiator and target with or without expanders constitute a service delivery subsystem. Expanders are devices that are part of a service delivery subsystem and facilitate communication between SAS devices. It facilitates connection of multiple SAS End devices to a single initiator port.

67

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

SAS
SAS and SATA Connector Compatibility

68

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Solid-state drive

69

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Solid-state drive

A solid-state drive (SSD) is a data storage device that uses solid-state memory to store persistent data. Unlike flashbased memory cards and USB flash drives, an SSD emulates a hard disk drive interface, thus easily replacing it in most applications. An SSD using SRAM or DRAM (instead of flash memory) is often called a RAM-drive.

70

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Solid-state drive features

An SSD is commonly composed of either DRAM volatile memory or NAND flash nonvolatile memory.
They are often packaged in standard disk drive form factors (1.8-inch, 2.5-inch, and 3.5-inch).

71

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Solid-state drive advantages


Faster start-up, as no spin-up is required (RAM & Flash). Typically, fast random access for reading, as there is no read/write head to move (RAM & Flash).

Extremely low read latency times, as SSD seek-times are orders of magnitude lower than the best current hard disk drives. (RAM) In applications where hard disk seeks are the limiting factor, this results in faster boot and application launch times (RAM &Flash).
Extremely fast write (RAM, nearly the same for best modern flash). No noise: a lack of moving parts makes SSDs completely silent, unless, as in the case of some high-end and high-capacity models, they have cooling fans attached (RAM & Flash).

72

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Difference between SSD & HDD

73

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

HBA Comparison

74

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

System I/O

75

2010 Wipro Ltd - Internal & Restricted

PCI Overview

76

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

PCI - X Overview

77

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

PCI -X View

78

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

PCI Keying

79

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

PCI Express (PCI-e)

80

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

PCI-e Interconnect

81

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

PCI Express - View

82

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Comparison Table

83

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Server Platform Chipset

84

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Definition & Example


A set of chips that provides the interfaces between all of the PC's subsystems. It provides the buses and electronics to allow the CPU, memory and input/output devices to interact. Most Intel chipsets, which are contained on two to four chips, also include built-in EIDE support. In the past, Intel used the name "Triton" for its chipsets. It also used the name PCI set for PCI-based chipsets. Desktop Chipset:810/845/845GV/865/910/945G/Q35 Server Chipset Family:3000/5000/7000

85

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Chipset Comparison Logical Diagram

3000 Family
86

5000 Family
2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

7000 Family

Redundant Array of Independent Disks

87

2010 Wipro Ltd Internal & Restricted

Raid Types
Host Raid / Firmware Raid SATA SAS SCSI

ROMB
ZCR PCI / PCI-X / PCI E Raid

How to
Best Practice

88

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

RAID 1

89

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

RAID 1

90

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

RAID 0

91

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

RAID 0

92

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

RAID 5

93

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

RAID 5

94

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

RAID 10

95

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

RAID 10

96

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

RAID 6

97

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

RAID 6

98

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

RAID LEVELS COMPARISON

99

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Wipro Netpower Servers

100

2010 Wipro Ltd Internal & Restricted

Wipro Nomenclature
Net Power Z 2 5 XX

Proc Type Z = Xeon O = Opteron I = Itanium

No. of Procs Form Factor 1 = Uni Proc 1 = 1U 2 = Dual Proc 2 = 2U 4 = Multi Proc 4 = 4U 5 = Tower 6 = Blades
2010 Wipro Ltd Internal & Restricted

101

Wipro Models
Uni-Processor Z1502 Z1505 O1101

Dual Processor Z2501R Z2503R Z2108 Z2204 Z2601 O2501 O2502

Quad Processor Z4402 O4401 O4402

102

2010 Wipro Ltd Internal & Restricted

NP Z1502(Entry Level)

103

2010 Wipro Ltd Internal & Restricted

NP Z1502

104

2010 Wipro Ltd Internal & Restricted

NP Z1502

105

2010 Wipro Ltd Internal & Restricted

NP Z1502

106

2010 Wipro Ltd Internal & Restricted

NP Z2102

107

2010 Wipro Ltd Internal & Restricted

NP Z2102

108

2010 Wipro Ltd Internal & Restricted

NP Z2102

109

2010 Wipro Ltd Internal & Restricted

NP Z2501

110

2010 Wipro Ltd Internal & Restricted

NP Z2501

111

2010 Wipro Ltd Internal & Restricted

NP Z2503

112

2010 Wipro Ltd Internal & Restricted

NP Z2503

113

2010 Wipro Ltd Internal & Restricted

NP Z2502

114

2010 Wipro Ltd Internal & Restricted

NP Z2502

115

2010 Wipro Ltd Internal & Restricted

NP Z2502

116

2010 Wipro Ltd Internal & Restricted

NP Z2502

117

2010 Wipro Ltd Internal & Restricted

Wipro 4 Way servers Z4402

118

2010 Wipro Ltd Internal & Restricted

Wipro Blade Server - WNB 1400


Blade Server Chassis Compute Blades Blade Management Module Fiber Channel Switch Module

Ethernet Switch Module


Fiber Expansion Cards Ethernet Expansion Card Deployment Manager

119

2010 Wipro Ltd Internal & Restricted

NetPower Z1505: Uni Processor Server


CPU

Intel Quad Core 2.4 GHz (X3220) with 8 MB & 1066 MHz
Motherboard

Intel 3200 Board


Memory: 2 x 2GB DDR2 667 MHz Unbuff ECC HDD

2 x 146GB 15K RPM 3.5 SAS HDD 4 Hot Swap HDD cage
RAID Card

4 Port SAS Controller with Host RAID 0 & 1


620 Watts (1+1) Redundant Power Supply
120
2010 Wipro Ltd Internal & Restricted

NetPower Z2501R: Dual Processor Server


CPU

Intel Quad Core 2.33 GHz (E5410) with 12 MB & 1333 MHz
Motherboard

Intel 5000V Board


Memory: 4 x 2GB DDR2 667 MHz Reg ECC HDD

4 x 146GB/300GB 15K RPM 3.5 SAS HDD 4 x Hot swap HDD Cage
RAID Cards

8 Port SAS RAID Controller with 512 MB cache


620 Watts (1+1) Redundant Power Supply
121
2010 Wipro Ltd Internal & Restricted

NetPower Z2215: Dual Processor Server


NetPower Z2215: Dual Processor Server CPU

Intel Quad Core 3.0 GHz (E5472) with 12 MB & 1600 MHz
Chipset

Intel 5400 Chipset


Memory: 4 x 4GB DDR2 667 MHz Reg ECC HDD

5 x300G 15K RPM 3.5 SAS HDD


RAID Cards

8 Port SAS RAID Controller with 512 MB cache


122
2010 Wipro Ltd Internal & Restricted

NetBlade 1600
Chassis

(2+2) 1000 Watts Redundant Power Supply 5 x 300 GB 2.5 10K RPM 1 x Storage Controller (Optional Redundant Controller) 1 x Ethernet Switch ( Optional Redundant Switch)
Compute Blade Z2601 CPU

Intel Quad Core 2.33 GHz (E5410) with 12 MB & 1333 MHz
Motherboard
123

Intel 5000P board

2010 Wipro Ltd Internal & Restricted

NetPower Z1530: Nehalem-Uni Processor Server


CPU
Intel Quad Core 2.66 GHz (X3450) with 8 MB

Motherboard
Intel 3420 Board

Memory: 2 x 2GB DDR3 1066 MHz Unreg ECC HDD


2 x 146GB 15K RPM 3.5 SAS HDD 4 Hot Swap HDD cage

RAID Card
4 Port SAS Controller with Host RAID 0 & 1 620 Watts (1+1) Redundant Power Supply

124

2010 Wipro Ltd Internal & Restricted

NetPower Z2531: Nehalem-Dual Processor Server


CPU
Intel Quad Core 2.0 GHz (E5504) with 4 MB cache & 4.8 GT/sec QPI Intel Quad Core 2.4GHz (E5530) with 8 MB cache & 5.86 GT/sec QPI

Motherboard
Intel 5500 Board

Memory: 4 x 2GB DDR3 1066 MHz UnReg ECC


HDD
2 x 146GB 15K RPM 3.5 SAS HDD 4 Hot Swap HDD cage

RAID Card
4 Port SAS Controller with Host RAID 0 & 1 700 Watts Single Power Supply

125

2010 Wipro Ltd Internal & Restricted

NetPower Z2243: Nehalem based Dual Processor Server


CPU
Intel Quad Core 2.0 GHz (E5504) with 4 MB cache & 4.8 GT/sec QPI

Intel Quad Core 2.4GHz (E5530) with 8 MB cache & 5.86 GT/sec QPI

Chipset
Intel 5520 Chipset

Memory: 4 x 4GB DDR3 1066 MHz Reg ECC


HDD
5 x300G 15K RPM 3.5 SAS HDD

RAID Cards
8 Port SAS RAID Controller with 512 MB cache

126

2010 Wipro Ltd Internal & Restricted

NetPower Models based on Intel 5500 Chipset

127

2010 Wipro Ltd Internal & Restricted

Wipro NetPower Z2531


Processor Support Intel Xeon Processor 5500 series-Dual CPU capable Chipset Intel5500 chipset Memory Capacity 8 Un-buffered/Registered DIMM slots-32 GB Memory Exp.
Native DDR-3 at 800/1066/1333MHz (4+4 Configuration) Channel-Independent Mode/ Channel-Mirroring Mode Demand Scrubbing Mode/ Patrol Scrubbing Mode

Disk Controller
6 SATA/SATA-II ports (3Gbps) with Intel Embedded Server RAID Technology (0,1,10) with optional RAID 5

Expansion Slots
2 half-length PCIe2 x8 slot/ 1 half-length PCIe2 x4 slot (x8 connector) 1 half-length PCIe1 x4 slot / 1 half-length PCI 32/33 5V slot

Ethernet Dual Intel Gigabit Ethernet

Power Supply Single 700 Watts/ Redundant 750 Watts (2+1)


Management iBMC with IPMI 2.0 support for remote management
Intel System Management Software 2.0 with Intel RMM3 upgrade option

128

2010 Wipro Ltd Internal & Restricted

Wipro NetPower Z2541


Processor Support Intel Xeon Processor 5500 series-Dual CPU capable Chipset Intel5500 chipset Memory Capacity 6 Un-buffered/Registered DIMM slots-24 GB Memory Exp.
Native DDR-3 at 800/1066/1333MHz (3+3 Configuration) Memory Mirroring Supported

Disk Controller
6 SATA/SATA-II ports (3Gbps) supporting RAID levels 0,1,10 with optional RAID 5

Expansion Slots
2 PCIe2 x8 slot/ 1 PCIe2 x4 slot 1 PCIe1 x4 slot / 2 PCI 33 MHz slot

Ethernet Dual Intel Gigabit Ethernet Power Supply Single 700 Watts/ Redundant 750 Watts (2+1) Management
Super Doctor III-Optional IPMI 2.0 with Dedicated LAN for Remote Management

129

2010 Wipro Ltd Internal & Restricted

Wipro NetPower Z2141


Processor Support Intel Xeon Processor 5500 series-Dual CPU capable

Chipset Intel5500 chipset


Memory Capacity 6Un-buffered/Registered DIMM slots-24 GB Memory Exp.
Native DDR-3 at 800/1066/1333MHz (3+3 Configuration) Memory Mirroring Supported

Disk Controller
6 SATA/SATA-II ports (3Gbps) supporting RAID levels 0,1,10 with optional RAID 5

Hard Disk Drive Bays 4 x 3.5 Hot swap SAS/ SATA Expansion Slots
2 Full height half-length I/O slot

Ethernet Dual Intel Gigabit Ethernet

1U Rack Mount

Power Supply Single 520 Watts High Efficiency Management


Super Doctor III-Optional IPMI 2.0 with Dedicated LAN for Remote Management

130

2010 Wipro Ltd Internal & Restricted

Wipro NetPower Z2542


Processor Support Intel Xeon Processor 5500 series-Dual CPU capable Chipset Intel5500 chipset Memory Capacity
6 Un-buffered/Registered DIMM slots-24 GB Memory Exp. Native DDR-3 at 800/1066/1333MHz (3+3 Configuration) Memory Mirroring Supported

Disk Controller LSI 1068E 8 Port SAS Controller supporting RAID levels 0,1,10 with optional RAID 5
Expansion Slots
2 PCIe2 x8 slot/ 1 PCIe2 x4 slot 1 PCIe1 x4 slot / 2 PCI 33 MHz slot

Ethernet Dual Intel Gigabit Ethernet Power Supply Single 700 Watts/ Redundant 750 Watts (2+1) Management
Super Doctor III Optional IPMI 2.0 with Dedicated LAN for Remote Management

131

2010 Wipro Ltd Internal & Restricted

NetPower Models based on Intel 5520 Chipset

132

2010 Wipro Ltd Internal & Restricted

Wipro NetPower Z2533

Processor Support Intel Xeon Processor 5500 series-Dual CPU capable Chipset Intel5520 chipset Memory Capacity 12 Un-buffered/Registered DIMM slots-96 GB Memory Exp.
Six Channel Native DDR-3 at 800/1066/1333MHz Channel-Independent Mode/ Channel-Mirroring Mode Demand Scrubbing Mode/ Patrol Scrubbing Mode

Disk Controller
6 SATA/SATA-II ports (3Gbps) with Intel Embedded Server RAID Technology (0,1,10) with optional RAID 5

Expansion Slots
1 PCIe2 x8 slot (x16 mechanical)/ 3 PCIe2 x8 slot (x8 mechanical) 1 PCIe x4 slot (x8 mechanical shared w/optional SAS module)/1 PCI 32/33 5V slot

Ethernet Dual Intel Gigabit Ethernet with Intel Virtualization Technology Power Supply Single 700 Watts/ Redundant 750 Watts (2+1) Management iBMC with IPMI 2.0 support for remote management
Intel System Management Software 2.0 with Intel RMM3 upgrade option

133

2010 Wipro Ltd Internal & Restricted

Wipro NetPower Z2543

Processor Support Intel Xeon Processor 5500 series-Dual CPU capable Chipset Intel5520 chipset Memory Capacity 12 Un-buffered/Registered DIMM slots-96 GB Memory Exp. Native DDR-3 at 800/1066/1333MHz-Memory Mirroring Supported Disk Controller
6 SATA/SATA-II ports (3Gbps) supporting RAID levels 0,1,10 with optional RAID 5

Expansion Slots
2 PCIe2 x16 slot/ 2 PCIe2 x8 slot 1 PCIe1 x4 slot / 2 PCI 33 MHz slot

Ethernet Dual Intel Gigabit Ethernet supporting Intel I/OAT3/ VMDq support for better Virtualization support Power Supply Single 700 Watts/ Redundant 750 Watts (2+1) Management
Super Doctor III-Optional IPMI 2.0 with Dedicated LAN for Remote Management

134

2010 Wipro Ltd Internal & Restricted

Wipro NetPower Z2544


Processor Support Intel Xeon Processor 5500 series-Dual CPU capable Chipset Intel5520 chipset Memory Capacity 12 Un-buffered/Registered DIMM slots-96 GB Memory Exp. Native DDR-3 at 800/1066/1333MHz-Memory Mirroring Supported Disk Controller LSI 1068E 8 Port SAS Controller supporting RAID levels 0,1,10 with optional RAID 5

Expansion Slots
3 PCIe2 x8 slot/ 1 PCIe1 x4 slot / 2 PCI 33 MHz slot

Ethernet Dual Intel Gigabit Ethernet supporting Intel I/OAT3/ VMDq support for better Virtualization support Power Supply Single 700 Watts/ Redundant 750 Watts (2+1) Management
Super Doctor III-Optional IPMI 2.0 with Dedicated LAN for Remote Management

135

2010 Wipro Ltd Internal & Restricted

Wipro NetPower Z2135

Processor Support Intel Xeon Processor 5500 series-Dual CPU capable Chipset Intel5520 chipset Memory Capacity 12 Un-buffered/Registered DIMM slots-96 GB Memory Exp.
Six Channel Native DDR-3 at 800/1066/1333MHz

Disk Controller
6 SATA/SATA-II ports (3Gbps) with Intel Embedded Server RAID Technology (0,1,10)-Optional SAS Disk Drives

Hard Disk Drive Bays


6 Nos. of 2.5 optional expandability to 8 Nos. of Disk drive Bays

Expansion Slots
1 Full Height PCIe2 x16 slot/ 1 I/O Exp Module PCIex8

Ethernet Dual Intel Gigabit Ethernet with Intel Virtualization Technology

1U Rack Mount
Power Supply Single 650 Watts/ Optional-Redundant 650 Watts (1+1) Management iBMC with IPMI 2.0 support for remote management
Intel System Management Software 2.0 with Intel RMM3 upgrade option

136

2010 Wipro Ltd Internal & Restricted

Wipro NetPower Z2143

Processor Support Intel Xeon Processor 5500 series-Dual CPU capable Chipset Intel5520 chipset Memory Capacity 12 Un-buffered/Registered DIMM slots-96 GB Memory Exp.
Six Channel Native DDR-3 at 800/1066/1333MHz

Disk Controller

1U-4 x 3.5SAS & Single 560 Watts

6 SATA/SATA-II ports (3Gbps) supporting RAID levels 0,1,10 with optional RAID 5 SAS Disks Optional

Hard Disk Drive Bays


Options of 4 x 3.5& 8 x 2.5 Hot swap SAS Disk drive Bays

Expansion Slots
1 Full Height & Full Length

Ethernet Dual Intel Gigabit Ethernet supporting Intel I/OAT3/ VMDq support for better Virtualization support Power Supply Options of Single 560 Watts or Redundant 650 Watts (1+1) Management Super Doctor III-Optional IPMI 2.0 with Dedicated LAN for Remote Management

1U-8 x 2.5SAS & RPS 650 Watts


137

2010 Wipro Ltd Internal & Restricted

Wipro NetPower Z2235

Processor Support Intel Xeon Processor 5500 series-Dual CPU capable Chipset Intel5520 chipset Memory Capacity 12 Un-buffered/Registered DIMM slots-96 GB Memory Exp.
Six Channel Native DDR-3 at 800/1066/1333MHz

Disk Controller
Active Midplane 2 Board with SAS Controller-Optional HW RAID

Hard Disk Drive Bays


8 Nos. of 2.5 options of fixed 2.5 HDDs or SATA Tape Drive

Expansion Slots
One full height+low profile PCI Express* 2.0 riser card (up to 5 PCIe 2.0 x8 slots)

Ethernet Dual Intel Gigabit Ethernet with Intel Virtualization Technology

2U Rack Mount

Power Supply Single 750 Watts/ Optional-Redundant 750 Watts (1+1) Management iBMC with IPMI 2.0 support for remote management
Intel System Management Software 2.0 with Intel RMM3 upgrade option

138

2010 Wipro Ltd Internal & Restricted

Wipro NetPower Z2243


Processor Support Intel Xeon Processor 5500 series-Dual CPU capable Chipset Intel5520 chipset Memory Capacity 12 Un-buffered/Registered DIMM slots-96 GB Memory Exp.
Six Channel Native DDR-3 at 800/1066/1333MHz

Disk Controller
6 SATA/SATA-II ports (3Gbps) supporting RAID levels 0,1,10 with optional RAID 5 SAS Disks Optional

2U-8 x 3.5SAS & Single 560 Watts


Hard Disk Drive Bays
8 x 3.5 Hot swap SAS Disk drive Bays

Expansion Slots
2 PCIe2 x16 slot/ 2 PCIe2 x8 slot/ 1 PCIe1 x4 slot / 2 PCI 33 MHz slot

Ethernet Dual Intel Gigabit Ethernet supporting Intel I/OAT3/ VMDq support for better Virtualization support Power Supply Options of Single 560 Watts or Redundant 720 Watts (1+1)

2U-8 x 3.5SAS & RPS 720 Watts


139

Management Super Doctor III-Optional IPMI 2.0 with Dedicated LAN for Remote Management

2010 Wipro Ltd Internal & Restricted

Summary
NetPower based on 5500 Chipset NetPower based on 5520 Chipset

Tower

Z2501R

Z2531

Tower

Z2511R

Z2533/ Z2543 Z2544

Tower

Z2502

Z2541

Tower

Z2503/ Z2504 Z2108

1U Rack

Z2118

Z2141

1U Rack

Z2135/ Z2143 Z2235/ Z2243

Tower

N.A

Z2542

2 U Rack

Z2204

140

2010 Wipro Ltd Internal & Restricted

Please refer below link for more Wipro Net power product details

http://www.wipro.in/Products

141

2010 Wipro Ltd Internal & Restricted

IBM Servers

142

2010 Wipro Ltd Internal & Restricted

Agenda
IBM Server Overview Main Components- ServeRaid Installing IBM Servers

Troubleshooting IBM Servers


Updating Drivers & Firmware Codes

Support Links
Before you Escalate Standard Testing Procedure

143

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

IBM Server Overview


IBM xSeries/SystemX continues to leverage decades of experience in designing, building, and supporting servers to provide the most innovative industry standard servers in the market today. Starting with our x-Architecture Blueprint we delivered innovations like LightPath Diagnostics, Extended PFA, Integrated Service Processor, Software Rejuvenation, etc

144

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

IBM Server Overview

145

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Major Components- ServeRaid


ServeRaid is IBM nomenclature for IBM Raid Controllers. There are different types of ServeRaid controllers available which includes, Host Raid, ZCR, SCSI, SATA/SAS. Below is table of commonly used ServeRaid models and its connection type for reference.
4L SCSI 4Lx SCSI 4M SCSI 4Mx SCSI 4H SCSI 5i SCSI 6M SCSI 6i/6i+ SCSI 7t SATA 7e SCSI SATA BR10i
SAS SATA

7k SCSI

8e SAS SATA

8i SAS SATA M1015


SAS SATA

8k-l SAS SATA

8k SAS SATA

MR10M
SAS SATA

MR10k
SAS

MR10i
SAS SATA

MR10il
SAS SATA

MR10is
SAS SATA

MR10ie
SAS

BR10il
SAS SATA

M5014
SAS SATA

For full range of ServeRaid controller & its compatibility with picture can be found on the link given below. It also consists full technical details as supported raid level, Voltage, Bus etc.
http://www.redbooks.ibm.com/redbooks.nsf/RedbookAbstracts/tips0054.html?Open
146
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Installing IBM Servers


IBM Server Guide IBM Server Guide is a tool that simplifies the process of installing and configuring IBM System x and Blade Center servers. Server Guide goes beyond mere hardware configuration by assisting with the automated installation of Windows server operating systems, device drivers and other system components, with minimal user intervention. The goal of Server Guide is to simplify and shorten installation. The built-in intelligence of Server Guide recognizes machine types and models as well as Serve RAID adapters and other hardware criteria. Based on the gathered hardware information, Server Guide offers installation and configuration choices tailored to your system. To Use it only we need to boot with server guide CD and follow the instruction. IBM Server Guide Can Be downloaded from IBM site. Support link has been given in last slides of this training module.
Note: Installation from Server Guide CD will erase all existing data on the server, should not be used if required to format only one partition on raid subsystem.
147
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Troubleshooting IBM servers


Standard Methods of Troubleshooting IBM Servers
POST error messages and error logs which can be viewed using DSA or on system startup.
System error LED and Light Path diagnostics F2 Diagnostics/Enhanced Diagnostic CD Diagnostic programs error messages DSA We can use BMC/ISMP/IPMI/RSA logs to analyze problem with the server hardware. All these logs can be collected through DSA on condition that Management controller (BMC/ISMP/IPMI/RSA etc.) is properly installed/updated on the system OS while trying to collect DSA logs on top of OS.

148

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Troubleshooting IBM servers Contd


System System error error LED LED && Light Light Path Path Diagnostics Diagnostics

System Error LED

Information LED

Light Path panel is visible from the front of the unit.

This revolutionary technology helps expedite repairs and minimize downtime by quickly and clearly identifying those components that need maintenance. You are alerted to problems via an indicator light on the front of the server.

149

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Troubleshooting IBM servers contd


To troubleshoot hardware problems IBM has inbuilt (as a bootable CD in old systems) system utility called F2 Diagnostics. We can check system health using this tool. It includes all hardware test included in base system. To run F2 Diagnosis follow below mentioned steps:
Boot from Enhanced Diagnosis CD or press F2 when the message F2 for Diagnostics is displayed. Select either Extended or Basic from the top of the screen. From the diagnostic screen, select the test you want to run from the list and then follow all instructions.

It will show the result as passed or with some error codes. On hardware related errors troubleshoot with the troubleshooting information from the below link :
http://www947.ibm.com/systems/support/supportsite.wss/selectproduct?taskind=1&brandind=500000 8&taskind=2
150
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Troubleshooting IBM servers contd


F2 Diagnostics Snap

151

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Troubleshooting IBM servers contd


Using IBM Dynamic System Analysis (DSA)
IBM Dynamic System Analysis (DSA) collects and analyzes system information to aid in diagnosing system problems.
Additionally, DSA creates a merged log that allows users to easily identify causeand-effect relationships from different log sources in the system. DSA also compares device driver and firmware on the system. DSA Portable: DSA Portable Edition runs from the command prompt on a supported
system without altering any system files or system settings. It expands to temporary space on the target system, runs, and deletes all intermediate files after execution completes.

DSA Installable: DSA Installable Edition provides a permanent installation of DSA onto a
system. This installation shares a similar command prompt interface with the portable edition.

DSA Bootable: DSA Bootable can be created by ISO downloaded from IBM Site to boot
from the same on unavailability of OS.
152
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Troubleshooting IBM servers contd


Using IBM Dynamic System Analysis (DSA)
To Run DSA Follow below steps: Installable edition: Go to StartProgramsIBMDSA Portable Edition: Click on the exe file downloaded as IBM Director Portable Edition. Bootable edition: Boot from the CD. It will auto start and will ask to View/Save the logs. Save in external media (e.g. FDD, USB Stick) After running DSA (Installable or Portable) logs will be saved in folder c:\IBM_Support\ with system serial number time e.g. 8648IBS_99BAXM1_20080930-183757.xml.gz or 8648IBS_99BAXM1_20080930-183757.zip. Logs will be saved in both .zip and .xml format. Zip folder can be extracted and opening file index.html will show logs in web format. Files with .xml extension needs to be extracted only on the systems where DSA is installed by using following command. This will also save the file in c:\IBM_Support folder with above specified file name format.
153
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Updating IBM servers Drivers & Codes


Using IBM Update Express CD/ Manually
IBM UpdateXpress can help reduce your cost of computing by providing an effective and simple way to update device drivers, server firmware and firmware of supported options contained within the server on most of your System x and BladeCenter products. If you have purchased an IBM server, UpdateXpress is available for download at no additional charge. IBM Update Xpress is ISO downloadable and very easy to update the server with minimal user intervention. We need to boot from the CD and choose components we want to update. This CD automatically recognize server type and updates the codes accordingly. It minimizes wrong updating of codes.

Important points to be considered before updating codes:


There may be some latest updates for particular server equipments. Need to cross verify on IBM site for latest updates and update it manually. Please read readme file before updating firmware codes to ensure all prerequisites.
Ensure to install latest device drivers first before updating firmware codes on a server. Drivers also can be updated with UpdateXpress CD. To check & download UpdateXpress compatibility and version list visit below mentioned site:
http://www-304.ibm.com/systems/support/supportsite.wss/docdisplay?lndocid=SERV-XPRESS&brandind=5000008
154
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

IBM Server Support Links


IBM System x Warranty Lookup: http://www-947.ibm.com/systems/support/supportsite.wss/warrantyform?brandind=5000008 Software & Device Drivers: http://www-304.ibm.com/systems/support/supportsite.wss/docdisplay?lndocid=JBAR3WTLGA&brandind=5000008 IBM DSA: http://www-304.ibm.com/systems/support/supportsite.wss/docdisplay?lndocid=SERVDSA&brandind=5000008 IBM ServeRaid Software http://www-947.ibm.com/systems/support/supportsite.wss/docdisplay?lndocid=SERVRAID&brandind=5000008 IBM Server Guide http://www-947.ibm.com/systems/support/supportsite.wss/docdisplay?lndocid=SERVGUIDE&brandind=5000008 Support for IBM Systems Management https://www304.ibm.com/systems/support/supportsite.wss/selectproduct?brandind=5000016&taskind=2 Problem Determination and Service Guide index Servers https://www-304.ibm.com/systems/support/supportsite.wss/docdisplay?lndocid=MIGR40462&brandind=5000008 Parts documents by server family (index) Servers https://www-304.ibm.com/systems/support/supportsite.wss/docdisplay?lndocid=MIGR48RPEJ&brandind=5000008
155
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Before You Escalate


You must have below mentioned information handy to get required help exploring IBM site: Machine Product family (e.g. IBM x345) Machine Type number (IBM 4 digit machine identifier e.g. 8840) Machine model number (32x) Machine Serial number (7 Digit Serial Number)

Verify your warranty status - This data will assist IBM in quickly providing a solution to your issue, and ensuring you receive the appropriate level service for which may have contracted. Warranty Status you can check with IBM Site Warranty lookup .

IBM Toll Free: 1800-425-6666


156
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Before You Escalate


Apart from system information you should have the following tools ready for diagnosing IBM Servers. If OS Live and running:
Latest IBM DSA Installed. Management Processor driver properly installed with Mapping layer if applicable . Latest Serve Raid Manager Installed . Enhanced Diagnostic CD (For systems not having F2 Diagnosis inbuilt)

If OS not running:
IBM DSA 3.0 Bootable CD. Enhanced Diagnostic CD (For systems not having F2 Diagnosis inbuilt).

157

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Standard Testing Procedure


No Power, No Display
Basic Diagnostic: a. Check the Front panel for errors. b. Check the LPD panel for Errors. c. Check the Beep codes. d. Check the Component LEDs for Errors. e. Check for Cable loose connections & Switches etc. Extended Diagnostic: a. Press NMI Switch and try b. Reset BIOS to defaults c. Reseat memory and add-ons. d. Start server with minimum configuration to identify the faulty component.

158

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Standard Testing Procedure


Resolution & Functionality Check
a. b. c. d. e. Replace the Spare identified, if any Take DSA Reports and analyze Pre-update DSA Run F2 Diagnostics. Check System event log and Diagnostic log for errors. Update drivers, BIOS and Firmware (Optional if there is no error reported in System Event log, DSA Log and Diagnostic Log.) f. Take DSA Report and analyze the results Post-update DSA g. Run Standard peripherals test. i. CD / DVD Read , Floppy Drive Read & Write ii. Tape Drives Read & Write. iii. Network Ping to Gateway iv. External Storage access Drive access v. Save and Clear the Existing Hardware event logs. Tools and Utilities Required: DSA Utility IBM Update Express CD Reference Documents: IBM Server Hardware Maintenance Manual
159
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Standard Testing Procedure


Error on POST or Not Booting
Basic Diagnostic: a. Identify the Error from Error message b. Check the Error / POST Codes c. Check the System Event Log through F2 Diagnostics. d. Check the Front panel for errors. e. Check the LPD panel for Errors. f. Check the Beep codes. g. Check the Component LEDs for Errors. Extended Diagnostic: a. Reset BIOS to defaults b. Update System BIOS & Firmware using update express c. Start server with Minimum Configuration and identify the faulty component.

160

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Standard Testing Procedure


Resolution & Functionality Check
a. Replace the Spare identified, if any b. Take DSA Reports and analyze Pre-update DSA c. Run F2 Diagnostics. d. Check System event log and Diagnostic log for errors. e. Update drivers, BIOS and Firmware (Optional if there is no error reported in System Event log, DSA Log and Diagnostic Log.) f. Take DSA Report and analyze the results Post-update DSA g. Run Standard peripherals test. i. CD / DVD Read , Floppy Drive Read & Write ii. Tape Drives Read & Write. iii. Network Ping to Gateway iv. External Storage access Drive access v. Save and Clear the Existing Hardware event logs. Tools and Utilities Required: DSA Utility IBM Update Express CD
161
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Standard Testing Procedure


Issues after OS Boot.
Basic Diagnostic: a. Diagnose through DSA Log b. Run IBM diagnostics c. Run OS Stress tests d. Check the Front panel for errors. e. Check the LPD panel for Errors. f. Check the Component LEDs for Errors. Extended Diagnostic: a. Update Drivers , BIOS and Firmware b. Check OS Patches and updates c. Observe system performance d. Eliminate present installed OS.

162

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Standard Testing Procedure


Resolution & Functionality Check
a. Replace the Spare identified, if any b. Take DSA Reports and analyze Pre-update DSA c. Run F2 Diagnostics / IBM Diagnostics d. Check System event log and Diagnostic log for errors. e. Update drivers, BIOS and Firmware (Optional if there is no error reported in System Event log, DSA Log and Diagnostic Log.) f. Take DSA Report and analyze the results Post-update DSA g. Run Standard peripherals test. i. CD / DVD Read , Floppy Drive Read & Write ii. Tape Drives Read & Write. iii. Network Ping to Gateway iv. External Storage access Drive access v. Save and Clear the Existing Hardware event logs.

Tools and Utilities Required: DSA Utility IBM Update Express CD


163
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Standard Testing Procedure


Raid & HDD related issues
Basic Diagnostic: a. Diagnose through Raid manager ( From Installed Raid Manager , ServRaid Manager CD or IPSCEND Utility ) b. Diagnose through Raid Log ( DSA or Dump Log ) Extended Diagnostic: a. Run Stress tools and try to simulate ( SQL IO Stress , HP Data creator , Multiple DD commands in Linux / Unix) b. Update Raid Driver & Firmware, Backplane Firmware & HDD Firmware, and then Observe. Resolution & Functionality Check: a. Replace the Spare identified, if any b. Update Raid Card Drivers and then Firmware, if the replaced spare is Raid Card. c. Update backplane Firmware d. Run a disk subsystem stress tool like SQL IO Stress / HP Data creator / Multiple DD Commands.

164

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Standard Testing Procedure


e. Take the Raid Logs after stress test and analyze. f. Ensure there is no predictive failure in any HDD, through raid manager / dumplogs. g. Run DSA and confirm there is no error. h. Run Standard peripherals test. i. CD / DVD Read , Floppy Drive Read & Write ii. Tape Drives Read & Write. iii. Network Ping to Gateway iv. External Storage access Drive access i. Save and Clear existing event logs

Tools and Utilities Required: DSA IBM Update Express CD IBM ServRaid Manager HP Data Creator and Reader

165

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Standard Testing Procedure


Server Health Check
Basic Health Check : a. Visual Inspection for bend , dent, breakage etc.. b. Open the Server and ensure the components and add-ons are fixed properly c. Power on and check for Display d. Check LEDs and LPD Panel for Errors e. Run F2 Diagnostics. f. Check System event log and Diagnostic log for errors. g. Update drivers, BIOS and Firmware (Optional if there is no error reported in System Event log and Diagnostic Log. & Must for the new systems @ Logistics ) h. Configure Raid If raid card is available and not configured already. i. Load Supported Windows / Linux OS - If OS is not loaded already.. j. Take DSA Report and analyze the results for errors and predictive failure. k. Run Standard peripherals test. i. CD / DVD Read , Floppy Drive Read & Write ii. Tape Drives Read & Write. iii. Network Ping to Gateway

166

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Standard Testing Procedure


Extended Health Check
l. Install IBM Director and run Real time diagnostics m. Run Stress test for CPU/Memory Subsystem Linpack can be used directly on Linux servers and for Windows Servers, boot from KNOPIXX Linux CD and run the Linpack from HDD or PEN drive. n. Run Microsoft memory Diagnostics - Windiag o. Run Stress test for Disk Subsystem HP Data Creator & Reader / SQL IO etc p. Save and Clear the existing Event logs
Tools and Utilities Required: DSA IBM Update Express & ServRaid Manager HP Data Creator and Reader Intel Linpack for Windows and Linux Windiag utility ( Img & ISO file available in Internal KB site )

167

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Dell Server Training

168

2010 Wipro Ltd - Internal & Restricted

Agenda
Dell Server Overview

Major Components- PERC Controller


Installing Dell Server Troubleshooting & Diagnostic Support & Manuals Standard Testing Procedure

169

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Dell Server Overview

PowerEdge Server Product Range

PE Rack Server

PE Tower Server

PE SC Server

170

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Dell Server Overview


1550 6350 2450

350 1650 1655MC 650 1750 6650 2650 750 1850 6450 2550

3250

7150

1855MC

7250
850 2850

1950

6850

1955
171

8450
2950
2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Dell Server Overview

2300 6300 800 4300

2400 6400 830 4400

2500 6600 4600

2600

6800 2900

6900

172

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Major Components- PERC Controller


PERC is Dell nomenclature for its RAID controller. Among the standard hardware components of a server, Dell is having proprietary PowerEdge-specific PERC (PowerEdge Expandable RAID Controller). The related software in the PERC Fault Management Suite offers facilities such as the Background Patrol read, which aims to fix bad sectors on online RAID disks running under some of the more recent PERC controllers. Below is the table for different PERC controller model and connection type and chipset used.
Controller Chipset AMI/LSI LOGIC ADAPTEC AMI/LSI LOGIC AMI/LSI LOGIC ADAPTEC Connection Type SCSI SCSI SCSI SCSI SCSI Array Support Refer Manual 0,1,5,10 Refer Manual Refer Manual 0,1,5,10

PERC -II
PERC -2 PERC 2/DC PERC 2/SC PERC 2/SI

PERC 3/SC PERC 3/QC


173

AMI/LSI LOGIC AMI/LSI LOGIC

SCSI SCSI
2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

0,1,5,10,50 0,1,5,10,50

Major Components- PERC Controller


Controller Chipset Connection Type Array Support

PERC 3/DC
PERC 3/DCL

AMI/LSI LOGIC
AMI/LSI LOGIC

SCSI
SCSI

0,1,5,10,50
0,1,5,10,50

PERC 3/DI
PERC 3/SI

ADAPTEC
ADAPTEC

SCSI
SCSI

0,1,5,10
0,1,5,10

PERC 4/SC
PERC 4/DC

AMI/LSI LOGIC
AMI/LSI LOGIC

SCSI
SCSI

0,1,5,10,50
0,1,5,10,50

PERC 4e/DC
PERC 4/SI PERC 4/DI PERC 4e/SI PERC 4e/DI PERC 5/I
174

AMI/LSI LOGIC
AMI/LSI LOGIC AMI/LSI LOGIC AMI/LSI LOGIC AMI/LSI LOGIC AMI/LSI LOGIC

SCSI
SCSI SCSI SCSI SCSI SCSI

0,1,5,10,50
0,1,5,10,50 0,1,5,10,50 0,1,5,10,50 0,1,5,10,50 Refer Manual

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Major Components- PERC Controller

Controller

Chipset

Connection Type

Array Support

PERC 5/E SAS 5/I SAS 5/E SAS 6/I SAS 6/E PERC 6/I (Intg) PERC 6/E SAS 5/IR SAS 6/IR

AMI/LSI LOGIC AMI/LSI LOGIC AMI/LSI LOGIC AMI/LSI LOGIC AMI/LSI LOGIC AMI/LSI LOGIC AMI/LSI LOGIC AMI/LSI LOGIC AMI/LSI LOGIC

SCSI SAS SAS SAS SAS SAS SAS SAS SAS

Refer Manual
Refer Manual Refer Manual Refer Manual

0,1,5,6,10,50,60 0,1,5,6,10,50,60 0,1,5,6,10,50,60 0,1 0,1

175

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Installing Dell Server


As other MNC servers, best way to deploy new Dell server is using Dell Server Assistant CD. This CD comes along with the server. Dell Server Assistant (DSA) delivers simple, automated deployment to help you minimize the time to value of your IT infrastructure. Shipped with every Dell PowerEdge server, this bootable, stand-alone CD-ROM guides you quickly through system setup, configuration and operating system installation. It provides Dell optimized and tested drivers, diagnostics and utilities.
The tool is easy to use with a series of simple-to-follow basic or advanced interview questions through an intuitive Graphical User Interface (GUI). Plus, reboots are minimized for faster deployment. DSA delivers quick deployment capabilities enabling you to quickly set up new servers or rebuild downed systems. It also includes replication abilities to help you automatically deploy multiple identical servers. DSA features increased platform, operating system and browser support over the previous version, including 9th generation PowerEdge server platforms, Vmware ESX Server 3.0 and Windows Storage Server.
176
2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Troubleshooting & Diagnostic


Dell PowerEdge Diagnostics is a suite of diagnostic programs, or test modules, that run locally on your system. When you start PowerEdge Diagnostics, the devices on your system are discovered. You select diagnostics tests to run from the Diagnostic Selection tree containing the hardware that PowerEdge Diagnostics discovers on your system. You can select tests for various parts of a system and run them by clicking the Run Tests button in the Tests Selected tab. You can select to run the diagnostic tests in normal or Quick Test mode.

177

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Troubleshooting & Diagnostic


In the Results tab you can view the results for each individually selected test. To view the entire result message for a particular test, double-click the device and test. A message box appears displaying the entire test result message.

You can view the saved results by extracting the .html file from the .zip file into a directory you create. When you open the .html file, you will get a screen similar to the one above:
178
2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Troubleshooting & Diagnostic


Dell Server E-Support Tool (DSET)
Dell Server E-Support Tool (DSET) provides the ability to collect hardware, storage and operating system information of a Dell PowerEdge server. This information is consolidated into a single System Configuration Report that can be useful for troubleshooting or inventory collection of a system. The browser user interface provides a convenient means to view specific data through hierarchical menu trees.

DSET is intended to be a small, non-intrusive tool that does not require a reboot of the system to provide basic functionality. Immediately after installation, DSET can collect information about Windows drivers, services, network settings, etc. It will also collect basic information about the system's storage such as active drives, RAID containers, etc. DSET will also collect extended hardware information such as processors, memory, PCI cards, ESM log, BIOS/firmware versions and system health (fan/voltage levels).

* This tool only available for Windows and Linux OS.


179

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Support Manuals
Baseboard Management Controller User Guide http://docs.us.dell.com/support/edocs/software/smbmcmu/ DELL Remote Access Controller User Guide http://docs.us.dell.com/support/edocs/software/smdrac3/

DELL OpenManage Software


http://support.dell.com/support/edocs/software/smsom/

For any downloads like firmware/manuals/drives etc visit http://support.dell.com. All you need is service tag of the server or exact type of the server.

180

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Standard Testing Procedure


No Power, No Display:

181

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Standard Testing Procedure


POST Error Not Booting

182

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Standard Testing Procedure


POST Error Not Booting

183

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Standard Testing Procedure

184

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Standard Testing Procedure

185

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Standard Testing Procedure

186

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

HP Servers

187

2010 Wipro Ltd Internal & Restricted

Agenda
ProLiant Server Classification

Main Components of Smart Array


Installing HP Servers Troubleshooting & Diagnosing HP Servers Firmware Maintenance Software Tools

Support Links
Standard Testing Procedure
188
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

ProLiant Server Classification

HP ProLiant ML: expandable tower servers for small to medium-sized businesses.


189

HP ProLiant DL: Density optimized solution for rack mount servers offering flexibility and manageability

HP ProLiant BL: Industry-standard Blade servers featuring all-in-one storage and server infrastructure

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

ProLiant Server Classification


To know about server generation is very important for support through hp site. Each HP server model is known through generation prefix to the model e.g. DL380 G5. You can find generation by looking in front of the server. Another important aspect of HP server is to know HP serial number and part number. You can find those details on the asset tag sticker of HP servers.

HP Generation
190
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Main Components of Smart Array


HP Smart Array Controllers
Smart Array Integrated Controller.
Smart Array 5i+ Smart Array 5i Smart Array 6i One of the above mentioned controllers are coming by default in DL 380 series server, Like DL380 , DL 380 G2, DL 380 G3 DL 380 G4.Optional Smart array Controller is mentioned Below.

Smart Array 532


Smart Array 642 Smart Array 6400

The HP Smart array Controller Comes in Dual & Single Port.


Note: For More information about different Smart Array Controllers, refer manuals.
191
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Installing HP Servers
HP Deployment tool - SmartStart
SmartStart is an essential single-server deployment tool that simplifies HP ProLiant server setup, providing a repeatable way to deploy reliable and consistent single-server configurations. SmartStart is delivered with every ProLiant ML and DL 300, 500, and 700 series server and supports ProLiant BL servers to provide step-by-step ProLiant deployment assistance and is included in the HP Insight Foundation Suite for ProLiant. From array configuration and OS installation to the update of optimized ProLiant server support software, SmartStart ensures a stable and reliable configuration. The SmartStart CDs contain server system utilities and operating system support software for ProLiant servers.

192

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Troubleshooting & Diagnosing HP Servers


HP Insight Diagnostics
HP Insight Diagnostics is a proactive server management tool, available in both offline and online versions, that provides diagnostics and troubleshooting capabilities to assist IT administrators who verify server installations, troubleshoot problems, and perform repair validation. HP Insight Diagnostics Offline Edition performs various in-depth system and component testing while the OS is not running. To run this utility, launch the SmartStart CD. HP Insight Diagnostics Online Edition is a web-based application that captures system configuration and other related data needed for effective server management. Available in Microsoft Windows and Linux versions, the utility helps to ensure proper system operation.

193

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Troubleshooting & Diagnosing HP Servers


Array Diagnosis Utility
The HP Insight Diagnostics Online Edition provides the capability to use nonintrusive system level checks to diagnose Smart Array SCSI hard drives. Diagnosis supports SCSI, SATA, and SAS hard drives that are attached to a Smart Array controller and configured as part of a logical volume. Diagnosis is not component testing, but is a combination of drive history and controller error status. This Diagnosis feature should be used to:
To troubleshoot why a hard drive is in a particular state.

When HP SIM reports a hard drive pre-failure or that a hard drive has failed.
When data corruption or storage problems occur, but no physical indications are evident. When conflicting errors exist. When repeated failures occur.
194
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Troubleshooting & Diagnosing HP Servers


HP Insight Diagnostics Survey HP Insight Diagnostics provides survey functionality that gathers critical hardware and software information on ProLiant servers.

If a significant change occurs between data-gathering intervals, the survey function marks the previous information and overwrites the survey data files to reflect the latest changes in the configuration.
Survey functionality is installed with every SmartStart-assisted HP Insight Diagnostics installation, or it can be installed through the HP PSP .

195

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Troubleshooting & Diagnosing HP Servers


Integrated Management Log
The IML records hundreds of events and stores them in an easy-to-view form. The IML timestamps each event with 1-minute granularity.

You can view recorded events in the IML in several ways, including the following:

From within HP SIM From within Survey Utility From within operating system: o For Windows: IML Viewer o For Linux: IML Viewer Application

From within the iLO and iLO 2 user interface


From within HP Insight Diagnostics .

196

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Firmware maintenance
The process of updating system or option firmware is referred to as a flash process or flashing the ROM. A firmware or ROM flash removes the existing version of firmware from the ROM and replaces it with a more recent version. Update the firmware to do the following: Support new hardware, such as a processor revision Support new features Correct problems in a previous firmware version Several tools are available for updating firmware. HP recommends the following methods: ROMPaq utility HP Smart Update Manager Online ROM flash components ROM Update Utility The ROM update utility is being replaced by the HP Smart Update Manager on the Firmware Maintenance CD version 7.50 and later.
197
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Firmware maintenance
Although there are different methods to update firmware on HP systems, but it is recommended to proceed with HP firmware maintenance CD. Here we will be discussing about firmware updates using Firmware maintenance CD only. HP Smart Update Manager deployment The HP Smart Update Manager utility is available from the ProLiant Firmware Maintenance CD. This CD and others can be downloaded free-of-charge from the HP website . To update please follow the steps: Boot the server from the Firmware Maintenance CD. At the prompt, select a language and keyboard and Click Continue. Read the End-User License Agreement, click Agree . Click the Firmware Update tab. Click Install Firmware. The HP Smart Update Manager is initiated. Select and install the desired components For more information, see the HP ProLiant Firmware Maintenance CD User Guide on the Firmware Maintenance CD.

198

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Software Tools
HP ProLiant Support Packs: PSPs represent operating system-specific bundles of ProLiant optimized drivers, utilities, and management agents. HP Systems Insight Manager : HP Systems Insight Manager is the clear choice for managing HP servers and storage by being the easiest, simplest and least expensive way for HP system administrators to maximize system uptime and health. Version Control: The VCRM (version Control Repository Manager) and VCA(Version Control Agent) are Webenabled Insight Management Agents. HP Systems Insight Manager uses these Insight Management Agents to facilitate software update tasks.

For more information about version control tools and HP SIM, refer to the HP Systems Insight Manager Help Guide and the Version Control User Guide on the HP Systems Insight Manager website.

199

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Support Links
HP Warranty Lookup: http://h20000.www2.hp.com/bizsupport/TechSupport/WarrantyLookup.jsp?country=& prodSeriesId=454811&prodTypeId=12454

HP Part Information: http://partsurfer.hp.com/search.aspx

HP ProLiant Support Site http://h20180.www2.hp.com/apps/Nav?h_pagetype=s001&h_lang=en&h_cc=us&h_product=241435&h_client=S-A-R1631&h_page=hpcom&lang=en&cc=us

200

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Standard Testing Procedure


No Power, No Display
Basic diagnostics a. Check the Front panel LED. b. Check the physical connectivity. c. Check the Power and reset switch (some times reset switch struck). d. Check the Beep codes. e. Check the Amber LEDs on the motherboard and SMPSs backside. Extended Diagnostics a. Reset BIOS to defaults (using system maintenance switch) b. Check the SMPS output power by multi-meter,(check the power good signal) c. Run F10 Diagnostics for G1 and f9 for next generation severs d. Remove the extra ram ( swap and check the first slot ram also) e. Start server with Minimum Configuration and identify the faulty component. f. Clear bios thru dip switch g. If still no display Do the bios recovery
201
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Standard Testing Procedure


Resolution and functionality check
a. Intend the spare with part number , server Generation and serial number(optional) otherwise you couldnt identify the correct spare b. Check the part number of the spare and server serial number. c. Replace the Spare what you identified d. Run the bios setup and Run inspect utility, we can find out which spare gone bad. e. Update drivers , BIOS and Firmware

Error on POST or Not Booting


Basic Diagnostics a. Identify the Error from POST error message b. Identify the error which it is related. c. Check the System bios Event Log through F2 Diagnostics. d. Check the array controller & array log e. Check the Front panel Lpd (light path diagnostics) for errors. f. Check the LCD panel for Errors.(optional) g. Check the Beep codes. h. Check the mother board Amber LEDs for Errors.
202
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Standard Testing Procedure


Error on POST or Not Booting
Extended Diagnostics a. Identify the problem due to hardware (or) Operating system b. Reset BIOS to defaults c. Do bios recovery d. Update System BIOS & Firmware through firmware update CD e. Check the generation of the server- use this Url-HP Firmware f. Start server with Minimum Configuration and identify the faulty component.

Resolution & Functionality Check


a. Check the Replaced spare part number and configuration b. Check the part number through part surfer c. After replaced the Spare check iml log file. d. Remove the replaced spare and check e. Update drivers, BIOS and Firmware f. Run setup inspect Diagnostics g. Check and Clear the existing System Event Log
203
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Standard Testing Procedure


Issues after System Boot
Basic diagnostics a. Diagnose through IML Log b. Run OS Stress tests c. Check the motherboard and check the component over heat , d. Install bios and firmware suitable version. e. Check all boards if represent any amber LED Extended diagnostics a. Update Drivers , latest BIOS and Firmware b. Update the controller firmware c. Check OS Patches and updates d. Observe system performance e. Eliminate present OS and check with new os

204

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Standard Testing Procedure


Resolution & Functionality Check:
j. Run setup inspect Diagnostics k. Check the IML log and ensure there is no error. l. Run the OS Stress test and ensure system is working fine. F. Run Standard peripherals test. i. CD / DVD Read , Floppy Drive Read & Write ii. Tape Drives Read & Write. iii. Network Ping to Gateway iv. External Storage access Drive access

Compaq Smart Array & HDD related issues


Basic diagnostics a. Diagnose through Raid Log ( use smart start cd , view log file) b. Diagnose through smart array diagnose(ADU) utility c. Run smart start cd and view the log file d. Update Raid Driver & Firmware, Backplane Firmware & HDD Firmware, and then Observe.(before update check the i2c cable with back plane) e. Use specific scsi cable mentioned by hp use for the back plane f. If you have an error code check proliant server error codes
205
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Standard Testing Procedure


Extended Diagnostic
a. Run Stress tools and try to simulate (HP Data creator, Multiple DD commands in Linux / Unix) b. Update Raid Driver & Firmware, Backplane Firmware & HDD Firmware, and then Observe.

Resolution & Functionality Check


a. Replace the Spare identified, if any b. Update the HDD firmware to the latest one, check the part number before replaced (confirm with old replaced spare). c. Update Raid Card Drivers and then Firmware, if the replaced spare is Raid Card. d. Update backplane Firmware e. Check the IML log and ensure there is no error. f. Run the OS Stress test and ensure system is working fine. g. Run Standard Peripherals test. i. CD / DVD Read , Floppy Drive Read & Write ii. Tape Drives Read & Write. iii. Network Ping to Gateway iv. External Storage access Drive access
206
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Standard Testing Procedure


Server Health Check up
Basic Health Check
a. Visual Inspection for bend , dent, breakage etc.. b. Open the Server and ensure the components and add-ons are fixed properly c. Power on and check for Display d. Check LEDs and Panel for Errors e. Run Inspect utility and check for errors. f. Check IML log for errors. g. Update drivers, BIOS and Firmware (Optional if there is no error reported in System Event log and Diagnostic Log. & Must for the new systems @ Logistics ) h. Configure Raid If raid card is available and not configured already. i. Load Supported Windows / Linux OS - If OS is not loaded already.. j. Take IML Report and analyze the results for errors and predictive failure. k. Run Standard peripherals test. i. CD / DVD Read , Floppy Drive Read & Write ii. Tape Drives Read & Write. iii. Network Ping to Gateway

207

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Standard Testing Procedure


Extended Health Check
l. Install Insight manager and run diagnostics and survey utility. m. Run Stress test for CPU/Memory Subsystem Linpack can be used directly on Linux servers and for Windows Servers, boot from KNOPIXX Linux CD and run the Linpack from HDD or PEN drive. n. Run Microsoft memory Diagnostics - Windiag o. Run Stress test for Disk Subsystem HP Data Creator & Reader/SQL IO etc. p. Save and Clear the existing IML logs

Tools Required
01, Smart Start CD configure array, deploy os, generate log file Visit For Generation identification: Generation 1 server Use Smart start 5.5 Generation 2 Server Use Smart start 7.7 Above all model server latest version 02, firmware maintenance cd- you can update bios, firmware.: For Generation 1 server Firmware CD 7.3 Generation 2&above server latest version
208
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Standard Testing Procedure

209

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Backup Device

210

2010 Wipro Ltd Internal & Restricted

Basic Backup
WHAT DOES IT MEAN TO BACK UP, RESTORE, AND ARCHIVE? Data backup is the process of transferring data from your company's primary computer system to a separate storage device, such as a tape drive. If the original data is lost or damaged, you can restore the information from the device and resume normal business operations. An archive is a long-term, permanent data backup, which is kept off-site.

211

2010 Wipro Ltd Internal & Restricted

Why Backup?
Protection from hardware failures oScratches on CD/DVD oHard-disk failure oNode failure Protection against natural calamities oFloods Protection from miscreants oComputer Virus oTerrorist attacks User errors oAccidents delete *.*; overwrite a file with another

212

2010 Wipro Ltd Internal & Restricted

How to Backup? - simple solution


Create copy

On the same device On some other device At some other location


Source Data Source Data

City A

City B

Source Data

Same Device
213

Different Device
2010 Wipro Ltd Internal & Restricted

Different Location

Backup Policies.
Full Backup Backup all the files Incremental Backup only the files changed since last backup Differential Backup only the files changes since last full backup Recovery is simpler

214

2010 Wipro Ltd Internal & Restricted

Backup Policies Conti

FULL BACKUPS A full backup copies all the files on the system . the system files, the software files, and the data files.You should perform a full backup on a weekly, bi-weekly, or monthly basis. With a full backup of your data set on tape, you can restore your entire system if a disaster destroys the original files. TIP: If your data set is small,

215

2010 Wipro Ltd Internal & Restricted

Backup Policies Conti


PARTIAL BACKUPS A partial backup copies all files that have been added or changed since the last backup job. There are two main types of partial backups: incremental and differential, summarized in the table below. TIP: For any crucial files that would be difficult to re-create, you can perform a selective backup at any time during the day. With this method, you don t need to wait until the next scheduled backup to copy the crucial files. INCREMENTAL BACKUPS If you need to save time and cost during regular backup jobs, choose a plan that includes full and incremental backups. In this strategy, you perform a regular backup of all files (weekly, bi-weekly, etc.), then a more frequent backup (daily) of only the files that have changed since the last backup session. This full/incremental backup method means that fewer files need to be copied and less time is required for the backup procedure. However, this method can also make a complete system restore slower if you have created many different incremental backup tapes (one for each day of the week, for example), or if you need to restore only a particular file and must hunt through several different incremental back tapes

216

2010 Wipro Ltd Internal & Restricted

Backup Policies Conti

DIFFERENTIAL BACKUPS If you need to save on restore time and hassle in the event of a disaster, choose a plan that includes full and differential backups. In this strategy, you perform a regular backup of all files (weekly, bi-weekly, etc.), then a more frequent backup (daily) of all files that have changed since the last full backup session. This full/differential backup method helps the restore process run more efficiently, because only one full backup tape and one differential backup tape are required for a complete restore of the system. However, this method is slower on the backup process because more files are copied daily.

217

2010 Wipro Ltd Internal & Restricted

Advantages and disadvantages of Policies.

218

2010 Wipro Ltd Internal & Restricted

DAT

Digital Audio Tape (DAT or R-DAT) was a signal recording and playback medium developed by Sony and introduced in 1987. In appearance it is similar to a compact audio cassette, using 4 mm magnetic tape enclosed in a protective shell, but is roughly half the size at 73 mm 54 mm 10.5 mm. As the name suggests, the recording is digital rather than analog. The technology of DAT is closely based on that of video recorders, using a rotating head and helical scan to record data. This prevents DATs from being physically edited in the cut-and-splice manner of analog tapes

219

2010 Wipro Ltd Internal & Restricted

DDS = Digital Data System A specific term for 4mm data tapes

Spec.

Introduction (year)

Data Transfer (Bytes/sec)

Tape Length (meters)

Native (GB)

DC/Comp ressed (GB)

DDS1 DDS2 DDS3 DDS4 DDS5

1989

183K

90

2.0

4.0

1993

360-750K

120

4.0

8.0

1995

720K-1.5M

125

12.0

24.0

1999 2001(est)

1-3M 1-6M

150 150+

20 36

40 72

Digital Data System specifications

220

2010 Wipro Ltd Internal & Restricted

Jumper setting for DAT Drive


Note: Figure shows the symbolic drive, there will be variation according to different models of drive.

221

2010 Wipro Ltd Internal & Restricted

SCSI Interface Connector on the Internal DAT Drive

222

2010 Wipro Ltd Internal & Restricted

Internal DAT Drive Switch Settings

223

2010 Wipro Ltd Internal & Restricted

Conti

224

2010 Wipro Ltd Internal & Restricted

Conti

225

2010 Wipro Ltd Internal & Restricted

Conti

226

2010 Wipro Ltd Internal & Restricted

DLT --- LTO --- SDLT ----

Digital Linear Tape


Linear Tape Open Super DLT

227

2010 Wipro Ltd Internal & Restricted

Technology overview.

Digital Linear Tape (DLT) (previously called CompacTape) is a magnetic tape data storage technology developed by Digital Equipment Corporation (DEC) from 1984 onwards. In 1994 the technology was purchased by Quantum Corporation, who currently manufactures drives and licenses the technology and trademark. A variant with higher capacity is called Super DLT (SDLT). DLT uses linear serpentine recording with multiple tracks on half-inch (12.7 mm) wide tape. The cartridges contain a single reel and the tape is pulled out of the cartridge by means of a leader tape attached to the takeup reel inside the drive. The drive leader tape is buckled to the cartridge leader during the load process. Tape speed and tension are controlled electronically via the reel motors, The tape is guided by 4 to 6 rollers that touch only the back side of the tape. Tape material is metal particle tape (MP/AMP.)

228

2010 Wipro Ltd Internal & Restricted

Cartridge.

229

2010 Wipro Ltd Internal & Restricted

Different Types of DLT

1) DLT 4000 2) DLT 7000 3) DLT 8000

20/40gb Dlt 35/70gb Dlt 40/80gb Dlt

230

2010 Wipro Ltd Internal & Restricted

Handling of Tapes

231

2010 Wipro Ltd Internal & Restricted

Handling of Tapes Conti

232

2010 Wipro Ltd Internal & Restricted

Handling of Tapes Conti

233

2010 Wipro Ltd Internal & Restricted

Handling of Tapes Conti

234

2010 Wipro Ltd Internal & Restricted

Linux Basic Installation


RHEL 5 Installation

235

2010 Wipro Ltd Internal & Restricted

Installation Guide for RHEL 5

The below URL is having all deployment guide/Admin guide for RHEL5 32bit and 64 Bit OS. Manual will guide you steps by steps on Installing RHEL 5 on Certified Hardware.

URL for downloading Manuals: http://www.redhat.com/docs/manuals/enterprise/RHEL-5manual/index.html

236

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Server Management

237

2010 Wipro Ltd Internal & Restricted

IPMI
WHAT IS IPMI ? IPMI stands for Intelligent Platform Management Interface

What is the use of IPMI ?

You can monitor system hardware and sensors, control system components and log important system events.

238

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

IPMI Key Features


Shares LAN controller with main board and uses out-of-band bandwidth. Supports hardware monitor for: CPU / system temperature; system fan & CPU fan status; and system voltage Supports Event Log information for hardware monitor events Supports remote management when system dead or in power standby Remote power control: a. Control through OS: Shutdown; Reboot; and Power cycle b. Control directly through buttons on chassis: Reset; Power down; Power up; and Power cycle

239

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

IPMI used by Different Hardware Vendors


INTEL Super Micro IBM DELL HP BMC/RMM2 IPMICARD RSA card DRAC ILO card

240

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

IPMI used by Different Hardware Vendors


INTEL Super Micro IBM DELL HP BMC/RMM2 IPMICARD RSA card DRAC ILO card

241

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

IPMI IP Configurations on SuperMicro IPMI cards


Boot from the DOS CD/Floppy Execute the command Ipmicfg m < IP address >

242

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

IPMIVIEW
IPMI View is management software based on IPMI specification version 1.5 - 2.0. IPMI View sends IPMI messages to and from the BMC (Base Management Card) on a remotely managed system. 1. Available for windows and linux OS Default Username is ADMIN Default Passwd is ADMIN

243

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Login Screen
Once Device got discovered from IPMPIVIEW software, we need to login through default username and password .

244

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Power Functions
Once login into IPMI device , you can reboot/shutdown machine remotely.You can also check the power status of machine in this menu.

245

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Event Logs
Any Hardware errors log can be captured in this menu. All fan/memory/CPU/voltages issues can be seen in this menu.

246

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Sensors Details
All current status of voltages/fan Speed/Tempratures/chassis phsyical status can be seen in this menu

247

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Intel Deployment CD
1. 2. 3. 4. It is different for EACH Motherboards By using this CD, you can configure IP address of BMC You have to define user and passwd for login Once you defined the BMC configuration, save it and reboot the system.

248

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

How to Configure RMM2 Card


Psetup utility Locally: Psetup can be started directly on the host containing the Intel RMM2. The tool uses SCSI/USB driver to get connected to the module. Remotely: Psetup can be started on any host connected to the same subnet (broadcast domain) as the Intel RMM2. Psetup uses UDP broadcasts to access the module.

It works on windows and Linux OS

249

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

When you execute Psetup utility

250

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

How to Configure IP Address


1. once MAC address comes you define the IP address and subnet mask 2. Give a Superuser login : admin 3. Passwd is : password ( for new cards) 4. If you want to change the password then give a new Superuser passwd

251

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Intel CLI Utility -DPCCLI


1. 2. 3. 4. DPCCLI utility use to check BMC logs and Health Monitoring. You can take a console through SOL In Remote machine(windows) , you have to Install DPCPROXY services by using Intel CLI utility in windows machine. It will open the PORT NO. 623

252

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Sel-viewer
The Baseboard Management Controller (BMC) records details about the system events in a log in flash memory. Each SEL entry is a single system event. The SEL Viewer utility provides the ability to view system event records stored on the server management storage device of a server. The utility also allows the user to save SEL entries to a file and load SEL entries from a file for viewing. The user can also reload SEL entries from a server and see properties of SEL entries. The SEL entries can be viewed in two modes: interpreted text mode and hex mode

253

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

How to Install SEL-Viewer


To install the SEL Viewer Utility in Windows* with the standalone installation, do the following: 1. Copy all files and subdirectories from the utility released location into a folder on the hard drive. (for example, c:\selviewer)

2. Open a command prompt and change to that directory (for example, cd c:\selviewer\imbdriver).
3. Execute "install.cmd <full-path>" specifying the full path of the folder in which files were copied (for example, "install c:\selviewer\imbdriver"). 4. This install script will install the imbdrv.sys driver. 5. To run the SEL Viewer Utility, open a command prompt, and change directory to the folder in which the selview.exe file resides (for example, cd c:\selviewer).

254

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

When you execute Selview Utility

255

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Intel Active Console


1. 2. 3. 4. 5. 6. Simple Lightweight Console Dashboard of Server Health Able to see System Event logs View all sensors BMC configurations Support Microsoft windows

256

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Snapshot of Intel Active System Console


Once you open the console, you can click on the submenu to see details of the sensors

257

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

BMC Configurations
BMC Menu details : will show IP address

258

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Features
1. 2. 3. 4. 5. 6. System Health Monitoring Alerts Through Email Can be Monitored Remotely Remote Control Performance Information Only for SUPERMICRO MB and need to be installed locally.

259

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Software Details
Super Doctor III only for Windows Super Doctor II for Linux/Windows System Requirements This software is designed to run under the following operating systems: Windows NT 4.0 with Service Pack 4.0 or later Windows 2000 Windows XP Windows Server 2003 Atleast 14 Mb space required for the Installation Please Defined the Port during Installation.

260

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Basic Concepts of Network

261

2010 Wipro Ltd Internal & Restricted

Agenda
Basics of Networking Networking Standards Network Devices & Definitions TCP/IP Network Addressing VLAN & ARP Basic Definitions for L2 & L3 Networks

262

2010 Wipro Ltd Internal & Restricted

Basics of Networking
What & Why is Network
Distribute pieces of computation among computers (nodes)
Coordination between processes running on different nodes Remote I/O Devices

Remote Data/File Access


Personal communications (email, chat, audio/video conference, messaging) World Wide Web
263
2010 Wipro Ltd Internal & Restricted

Basics of Networking

ISO-OSI is standard of network but we commonly use TCP/IP, which has no session/presentation layer
264

2010 Wipro Ltd Internal & Restricted

Basics of Networking
Physical Layer: o Standardized protocol dealing with electrical, mechanical and signaling interfaces. o Concerned with the transmission of bits Data Link Layer: o Logical Link Control (LLC) defines how data is transferred over the cable and provides data link service to the higher layers. o Medium Access Control (MAC) defines who can use the network when multiple computers are trying to access it simultaneously (i.e. Token passing, Ethernet [CSMA/CD], etc...). o Handles errors in the physical layer. o Groups bits into frames and ensures their correct delivery. Network: o Concerned with the transmission of packets. o Choose the best path to send a packet (routing). o It may be complex in a large network (e.g. Internet). o Shortest (distance) route vs. route with least delay. o Most popular protocol widely used is x.25 and TCP/IP
265
2010 Wipro Ltd Internal & Restricted

Basics of Networking
Transport Layer: o Network layer does not deal with lost messages.Transport layer ensure reliable service. It breaks the message (from sessions layer) into smaller packets, assigns sequence number and sends them. o TCP/IP is widely used for network/transport layer. UDP (Universal Datagram Protocol): Internet connectionless transport protocol. Session & Presentation Layer: o Just theory! Very few applications use it. Application Layer: o Collection of miscellaneous protocols for high level applications o Electronic mail, file transfer, connecting remote terminals, etc. o E.g. SMTP, POP, IMAP, FTP, Telnet, SSH, HTTP, HTTPS, SNMP, etc...

266

2010 Wipro Ltd Internal & Restricted

Networking Standards
IEEE 802 IEEE 802.1 IEEE 802.2 IEEE 802.3 IEEE 802.5 IEEE 802.11 IEEE 802.15 IEEE 802.16 IEEE 802.17 : Internetworking : Bridging & Management : Logical Link Control : CSMA/CD (Ethernet) Access Method : Token Ring Access Method : Wireless : Wireless Personal Area Networks : Broadband Wireless MAN : Resilent Packet Rings

267

2010 Wipro Ltd Internal & Restricted

Network Devices & Definitions


REPEATORS HUBS

SWITCHES
BRIDGES ROUTERS

FIREWALL

268

2010 Wipro Ltd Internal & Restricted

Network Devices & Definitions


Repeater: o A repeater connects two segments of your network cable. It retimes and regenerates the signals to proper amplitudes and sends them to the other segments. Hub: o A type of repeater used on several network architectures which usually connects several stations. Switch: o A network switch is a computer networking device that connects network segments. o The term commonly refers to a network bridge that processes and routes data at the data link layer (layer 2) of the OSI model. Switches that additionally process data at the network layer (layer 3 and above) are often referred to as Layer 3 switches or multilayer switches. o The term network switch does not generally encompass unintelligent or passive network devices such as hubs and repeaters.

269

2010 Wipro Ltd Internal & Restricted

Network Devices & Definitions


Bridge: o A bridge reads the outermost section of data on the data packet, to tell where the message is going. It reduces the traffic on other network segments, since it does not send all packets. Bridges can be programmed to reject packets from particular networks. Bridging occurs at the data link layer of the OSI model, which means the bridge cannot read IP addresses, but only the outermost hardware address of the packet. In our case the bridge can read the Ethernet data which gives the hardware address of the destination address, not the IP address. Bridges forward all broadcast messages. bridges use one of:

Transparent Bridging - They build a table of addresses (bridging table) as they receive packets. If the address is not in the bridging table, the packet is forwarded to all segments other than the one it came from. This type of bridge is used on Ethernet networks.
270
2010 Wipro Ltd Internal & Restricted

Network Devices & Definitions


Router: o A router is used to route data packets between two networks. It reads the information in each packet to tell where it is going. If it is destined for an immediate network it has access to, it will strip the outer packet, readdress the packet to the proper Ethernet address, and transmit it on that network. If it is destined for another network and must be sent to another router, it will re-package the outer packet to be received by the next router and send it to the next router. The section on routing explains the theory behind this and how routing tables are used to help determine packet destinations. Routing occurs at the network layer of the OSI model. They can connect networks with different architectures such as Token Ring and Ethernet. Although they can transform information at the data link level, routers cannot transform information from one data format such as TCP/IP to another such as IPX/SPX. Routers do not send broadcast packets or corrupted packets. If the routing table does not indicate the proper address of a packet, the packet is discarded.

271

2010 Wipro Ltd Internal & Restricted

Network Devices & Definitions


Firewall: o A router is used to route data packets between two networks. It reads the information in each packet to tell where it is going. If it is destined for an immediate network it has access to, it will strip the outer packet, readdress the packet to the proper Ethernet address, and transmit it on that network. If it is destined for another network and must be sent to another router, it will re-package the outer packet to be received by the next router and send it to the next router. The section on routing explains the theory behind this and how routing tables are used to help determine packet destinations. Routing occurs at the network layer of the OSI model. They can connect networks with different architectures such as Token Ring and Ethernet. Although they can transform information at the data link level, routers cannot transform information from one data format such as TCP/IP to another such as IPX/SPX. Routers do not send broadcast packets or corrupted packets. If the routing table does not indicate the proper address of a packet, the packet is discarded.

272

2010 Wipro Ltd Internal & Restricted

TCP/IP Network Addressing


Internet Protocol Because TCP/IP networks are interconnected across the world, each computer on the Internet must have a unique address (called an IP address) to make sure that transmitted data reaches the correct destination. (e.g. 192.168.1.1) Classes of IP
Class A addresses can have up to 16,777,214 hosts on a single network. Class A addresses are in this range: 1.x.x.x to 126.x.x.x.

Class B addresses can have up to 65,354 hosts on a single network. Class B addresses are in this range: 128.1.x.x to 191.254.x.x.

Class C addresses can have up to 65,354 hosts on a single network. Class B addresses are in this range: 192.0.1.x to 223.255.254.x.

273

2010 Wipro Ltd Internal & Restricted

TCP/IP Network Addressing


Netmask In each of the address classes previously described, the size of the two parts (network address and host address) is implied by the class. This partitioning scheme can also be expressed by a netmask associated with the IP address. A netmask is a 32-bit quantity that, when logically combined (using an AND operator) with an IP address, yields the network address. For instance, the netmasks for Class A, B, and C addresses are 255.0.0.0, 255.255.0.0, and 255.255.255.0, respectively. By looking at the addressing structures, you can see that even with a Class C address, there are a large number of hosts per network. Such a structure is an inefficient use of addresses if each end of a routed link requires a different network number. It is unlikely that the smaller office LANs would have that many devices. You can resolve this problem by using a technique known as subnet addressing.

274

2010 Wipro Ltd Internal & Restricted

TCP/IP Network Addressing


Netmask Contd The following table lists the additional subnet mask bits in dotted-decimal notation. To use the table, write down the original class netmask and replace the 0-value octets with the dotted-decimal value of the additional subnet bits. For example, to partition your Class C network with subnet mask 255.255.255.0 into 16 subnets (four bits), the new subnet mask becomes 255.255.255.240.

The following table displays several common netmask values in both the dotteddecimal and the mask-length formats.

275

2010 Wipro Ltd Internal & Restricted

VLAN & ARP


VLAN & Its Usage
A virtual LAN, commonly known as a VLAN, is a group of hosts with a common set of requirements that communicate as if they were attached to the same broadcast domain, regardless of their physical location. A VLAN has the same attributes as a physical LAN, but it allows for end stations to be grouped together even if they are not located on the same network switch. Network reconfiguration can be done through software instead of physically relocating devices. VLANs are created to provide the segmentation services traditionally provided by routers in LAN configurations. VLANs address issues such as scalability, security, and network management. Routers in VLAN topologies provide broadcast filtering, security, address summarization, and traffic flow management. By definition, switches may not bridge IP traffic between VLANs as it would violate the integrity of the VLAN broadcast domain. This is also useful if someone wants to create multiple Layer 3 networks on the same Layer 2 switch. For example, if a DHCP server (which will broadcast its presence) was plugged into a switch it will serve any host on that switch that was configured to get its IP from a DHCP server. By using VLANs you can easily split the network up so some hosts won't use that DHCP server and will obtain link-local addresses, or obtain an address from a different DHCP server
276
2010 Wipro Ltd Internal & Restricted

VLAN & ARP


ARP ARP (Address Resolution Protocol) is used to resolve the ethernet address of a NIC from an IP address in order to construct an ethernet packet around an IP data packet. This must happen in order to send any data across the network. An IP address alone cannot be used to deliver data from one LAN device to another. To send data between LAN devices, you must convert the IP address of the destination device to its MAC address. Each device on an Ethernet network has a unique MAC address, which is a 48-bit number assigned to each device by the manufacturer. The technique that associates the IP address with a MAC address is known as address resolution. Internet Protocol uses the Address Resolution Protocol (ARP) to resolve MAC addresses. If a device sends data to another station on the network and the destination MAC address is not yet recorded, ARP is used. An ARP request is broadcast onto the network. All stations (computers, for example) on the network receive and read the request. The destination IP address for the chosen station is included as part of the message so that only the station with this IP address responds to the ARP request. All other stations discard the request.

277

2010 Wipro Ltd Internal & Restricted

Basic Definitions for L2 & L3 Networks


Layer 2 Networks: Basically a layer 2 switch operates utilizing Mac addresses in it's caching table to quickly pass information from port to port. A layer 3 switch utilizes IP addresses to do the same. A layer 2 switch is essentially a multiport bridge. A layer 2 switch will learn about MAC addresses connected to each port and passes frames marked for those ports. It also knows that if a frame is sent out a port but is looking for the MAC address of the port it is connected to and drop that frame. Whereas a single CPU Bridge runs in serial, today's hardware based switches run in parallel, translating to extremely fast switching. It includes terms like, VLAN, Spanning Tree etc.

278

2010 Wipro Ltd Internal & Restricted

Basic Definitions for L2 & L3 Networks


Layer 3 Networks:

The network layer provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks, while maintaining the quality of service requested by the Transport layer. The Network layer performs network routing functions, and might also perform fragmentation and reassembly, and report delivery errors. Routers operate at this layer sending data throughout the extended network and making the Internet possible. This is a logical addressing scheme values are chosen by the network engineer.
The best-known example of a layer 3 protocol is the Internet Protocol (IP). It manages the connectionless transfer of data one hop at a time, from end system to ingress router, to router to router, and from egress router to destination end system.
279

2010 Wipro Ltd Internal & Restricted

Network Cabling
Ethernet Straight Cabling: The UTP cable contains eight conductors, arranged in four twisted pairs, and is terminated with an RJ45 type connector. A normal straight-through & Cross Over UTP Ethernet cable follows the EIA568B standard wiring as described below.

Straight Through

Cross Over

Note that here on the other end of cable we are using pin 3 & 6 in replacement of 1 & 2 and vice versa
280
2010 Wipro Ltd Internal & Restricted

Storage Basics

281

2010 Wipro Ltd Internal & Restricted

Objectives for this Unit


Understand Storage Basics Introduce Direct Attached Storage Differentiate between types of storage
DAS NAS ISCSI SAN

Introduce Network Attached Storage Introduce Fibre Channel SAN

282

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

A Few Storage Basics.


Where will data finally end up? How will it get there? What will it pass through?

283

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Direct Attached Storage (Internal)


Computer System

CPU Memory

Bus
I/O - RAID Controller

Disk Drives

284

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Direct Attached Storage (Internal)

12345 Data

Computer System CPU Memory Bus I/O - RAID Controller Disk Drives

285

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Direct Attached Storage (Internal)

12345

Computer System CPU Memory Bus I/O - RAID Controller Disk Drives

286

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

DAS w/ internal controller and external storage

Computer System
12345

CPU

Disk Enclosure
Memory

Bus
I/O - RAID Controller

Disk Drives

Disk Drives Disk Drives

287

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Comparing Internal and External Storage

Server

RAID controllers and disk drives are internal to the server SCSI, ATA, or SATA protocol between controller and disks RAID controller is internal SCSI or SATA protocol between controller and disks Disk drives are external Server RAID Controller

Storage Disk Drives RAID Controller

Internal Storage

Storage

Disk Drives

SCSI Bus w/ external storage

288

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

DAS w/ external controller and external storage


Storage System Computer System
12345

Disk Enclosure Disk Drives Disk Drives Disk Drives

CPU Memory Bus HBA

RAID Controller

289

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

DAS over Fibre Channel


Server

HBA
HBA is internal Fibre Channel protocol between HBAs and external RAID controller Disk drives and RAID controller are external

Storage Disk Drives RAID Controller

External SAN Array


290
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

I/O Transfer
RAID Controller
Contains the smarts Determines how the data will be written (striping, mirroring, RAID 10, RAID 5, etc.)

Host Bus Adapter (HBA)


Simply transfers the data to the RAID controller. Doesnt do any RAID or striping calculations. Dumb for speed. Required for external storage.

291

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Storage types
Single Disk Drive JBOD Volume Storage Array SCSI device DAS NAS SAN iSCSI

292

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

NAS: What is it?


Network Attached Storage Utilizes a TCP/IP network to share data Uses file sharing protocols like Unix NFS and Windows CIFS Storage Appliances utilize a stripped-down OS that optimizes file protocol performance

293

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Networked Attached Storage

Public or Private Ethernet network


NIC
Server NIC All data converted to file protocol for transmission (may slow down database transactions) Server has a Network Interface Card No RAID Controller or HBA in the server
294
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

NAS Server Storage Disk Drives RAID Controller

iSCSI: What is it?


An alternate form of networked storage Like NAS, also utilizes a TCP/IP network Encapsulates native SCSI commands in TCP/IP packets Supported in Windows 2003 Server and Linux TCP/IP Offload Engines (TOEs) on NICs speed up packet encapsulation

295

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

iSCSI Storage

Public or Private Ethernet network


NIC or iSCSI HBA
Server

NIC or iSCSI HBA


SCSI commands are encapsulated in TCP/IP packets Server has a Network Interface Card or iSCSI HBA iSCSI Storage Disk Drives RAID Controller

iSCSI HBAs use TCP/IP Offload Engine (TOE)

296

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Fibre Channel: What is it?


Fibre Channel is a network protocol implemented specifically for dedicated storage networks Fibre Channel utilizes specialized
Switches Host Bus Adapters RAID controllers Cables

297

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Fibre Channel Components


Server A HBA HBA Server B HBA HBA Server C HBA HBA

switch switch

Servers
Host Bus Adapters Fiber optic or copper Two switches for redundancy Two RAID Controllers for redundancy 4100+ disk drives per array

Cables

Fibre Channel Switches Fibre Channel Storage Array


Disk Drives
RAID Controller RAID Controller

FC Storage Array

A true storage network


Multiple servers Multiple switches Multiple Storage Arrays

298

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

SAN: What is it?


Storage Area Network A network whose primary purpose is the transfer of data between storage systems and computer systems Fibre Channel is the primary technology utilized for SANs Recently, SANs have been implemented with dedicated iSCSI networks

299

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Benefits of SAN/Consolidated Storage


Reduce cost of external storage Increase performance Centralized and improved tape backup LAN-less backup High-speed, no single-point-of-failure clustering solutions Consolidation with > 70TB of storage

300

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Fibre Channel Technology


Provides concurrent communications between servers, storage devices, and other peripherals A gigabit interconnect technology FC1: Over 1,000,000,000 bits per second FC2: Over 2,000,000,000 bits per second A highly reliable interconnect Up to 127 devices (SCSI: 15) Up to 10 km of cabling (3-15 ft. for SCSI) Physical interconnect can be copper or fiber optic

301

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Fibre Channel (continued)


Hot-pluggable - Devices can be removed or added at will with no ill effects to data communications Provides a data link layer above the physical interconnect, analogous to Ethernet Sophisticated error detection at the frame level Data is checked and resent if necessary

302

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Fibre Channel Frame Dissection

Up to 2048 byte payload 4 byte checksum for each frame

303

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Fibre Channel
Whats with the funny name?
Some background history required Originally developed to only support fiber optic cabling When copper cabling support was added, ISO decided not to rename the technology ISO changed to the French spelling to reduce association with fiber optics only medium

304

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Fibre Channel
How does it work?
Serial interface Data is transferred across a single piece of medium at the fastest speed supported No complex signaling required

305

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Fibre Channel Interface Layers

Device Driver

SCSI Protocol

Fibre Channel

Fiber Optic or Copper Cabling

306

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

SCSI vs. Fibre Channel Protocol


SCSI
SCSI protocol vs. SCSI device SCSI is an established, tried and true protocol Provides services analogous to TCP/IP Supported in every major OS on market

Fibre Channel
Fibre Channel runs on top of SCSI No re-inventing the wheel Immediate OS support

307

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

SCSI vs. FC Transmission

RAID Controller Fibre Channel

Disk Drive

RAID Controller

Disk Drive

SCSI
308
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

SCSI

vs.

Fibre Channel

Interface for internal storage to external disks Potential down time w/ SCSI Single bus RAID controller is SCSI hardware Standards: Ultra2 (80 MB/sec) Ultra 160 (160 MB/sec) Ultra 320 (320 MB/sec) Media specific (copper only) SCSI Limitations: Cables cant be any longer than 3 feet for single ended; 15 feet for LVD (low voltage differential) No more than 15 devices on a SCSI bus # of disk drives

Used with SAN Lots of built-in redundancy with connections Redundant network HBA is fibre channel hardware Standards: FC1: 100 MB/sec FC2: 200 MB/sec Provides a data link layer above the physical interconnect Analogous to Ethernet FC is a network of devices It can be media independent- copper or fibre optic Fibre Channel limitations: Cable length: Up to 10 kilometers (more a limitation of cable than FC itself) Up to 127 devices # of disk drives

309

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Fibre Channel vs. iSCSI


Fibre Channel
The current market leader for shared storage technologies Provides the highest performance levels Designed for mission-critical applications Cost of components is relatively high, particularly per server HBA costs Relatively difficult to implement and manage

iSCSI
Relatively new, but usage is increasing rapidly Performance can approach Fibre Channel speeds A better fit for databases than NAS A good fit for Small to Medium Size Businesses Relatively inexpensive, compared to Fibre Channel Relatively easy to implement and manage

310

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Microsoft Simple SAN Initiative


Make operating system aware of SAN and SAN capabilities Shift integration burden from IT staff or services back to VENDORS products:
Microsoft Storage hardware and software Application developers

Key storage technologies:


Volume Shadow Copy Service (VSS) Virtual Disk Service (VDS) Microsoft Multipath Input/Output (MPIO) Microsoft iSCSI driver
Software Initiator (client) Software Target (attached to disk subsystem)

311

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Review
What is the difference between a RAID Controller and an HBA? How many protocols may be used for DAS? Name two types of storage that rely on ethernet cables Name two benefits of SANs Describe the four interface layers of the Fibre Channel protocol Describe a scenario where an iSCSI SAN may be preferred over a Fibre Channel SAN

312

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Summary
How data is routed through a server to I/O Types of storage
DAS NAS iSCSI SAN

Benefits of SAN technology


Storage consolidation Reduced costs Centralized, LAN-free backup and restore

The Fibre Channel protocol


How it works Fibre Channel protocol vs. SCSI protocol

Comparing Fibre Channel SANs and iSCSI SANs


Fibre Channel SANs offer mission-critical performance, with relatively high costs and high complexity iSCSI SANs offer moderate to high performance at an attractive price/performance ration and are relatively easy to administer

313

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Antivirus

314

2010 Wipro Ltd Internal & Restricted

Different types of threats


Virus Trojan Horse Worm Blended attack Expanded threat False Positives

315

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

What is a virus?
A program written to alter the way a computer operates. It will self execute its own code and place itself in the path of execution of another program. It must replicate itself For example, it can replace other executables with a copy of the virus infected file. It can infect desktops and network servers alike.

316

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Types of viruses
File infectors :They infect any program files, they come in through .exe and .com files. Examples are Jerusalem and cascade. Boot sector viruses:It infects the system are of a disk, basically the boot record a floppy disk or a hard disk. Examples are Michelangelo and disk killer. Master boot record viruses:They are almost same as the boot sector viruses, the only difference between them is that where they load themselves. Such infectors saves a copy of the MBR in a different location. The Pcs infected with boot sector viruses and MBR viruses will not boot. Example:-Unashamed, NYB, Antiexe .

317

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Types of viruses
Multipartite Viruses:These are infections that infect both the program files and boot records. These are difficult to remove, the infections from both the locations should be removed or else they might re-infect any one of the locations back again. Example:-One_Half,Emperor. Macro viruses:These type of Viruses infect data files. They Have cost Corporations millions. The Evolution Of Visual Basic in 97,a macro Virus can be written that can infect data files. It infects MS Word, Excel, Power point. They are circulating good numbers across the world because of the ease with which they can be created. Ex:W97M.Mellisa,W97M.NiceDay.

318

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

What is a Trojan Horse?


Trojan horses are impostors- files that claim to be something desirable but, in fact, are malicious. A major distinction between a Trojan and a virus is that the former do not replicate themselves. Trojans contain malicious code that when triggered causes loss of data and even theft. To get infected by a Trojan you must invite such programs to your computer. Example :By downloading an E-mail attachment. Trojan.Vundoo is one of the Trojans that once infected becomes difficult to clean or delete.

319

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

What is a Worm?
Worms replicate from system to system without use of a host file. Worms Usually reside inside word or excel documents & the worm will release a document that has the worm macro inside it. The document will now move from computer to computer.

320

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Troubleshooting Virus Infection


Case I: - Unknown Infection
Suspicious activity observed and no files detected Activities such as pop ups, file creation, URL redirection, network congestion are observed.

Troubleshoot/Locate the files responsible

Check netstat output for connections made to any unknown IP addresses. View files based on their modified dates to check for recent changes made on the system ,typically in folders like /Windows/System32 , /Windows/System32/drivers Check the registry HKeyLocalMachine\SOFTWARE\Microsoft\Windows\CurrentVersion\Runfor any startup entries made by the virus Check the task manager for any unknown, random name processes running Enable view for hidden files and folders

321

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Troubleshooting Virus Infection


Case II: - Unable to clean Virus detected but unable to clean/delete/quarantine As seen in the virus logs files are detected but not cleaned/removed from the affected machines.

Troubleshooting If files are in the temporary internet folder then would be in use and may not get deleted. We recommend you to delete the contents of the temporary internet files folder. Boot machine in safe mode and run a manual scan Use tools from recognized AV vendors like Symantec, Mcafee and Trend Micro like:Mcafee Avert Stinger. Trend Micro House call 7.1 Norton Security Scanner from Symantec.
322

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Troubleshooting Virus Infection


Case III: - Re-infection Virus detected but reinfection occurring in the network. As seen in the virus logs files are detected and cleaned/removed from the affected machines but reinfection occurring through shared folders/mapped drives or infected USB drives.

Troubleshooting
Since malware are detected and taken care of in such a way that you may need to check the sources of reinfection and security holes in the network responsible for them. Check virus logs to look for the infection source of the malware. Infection level in the network will not reduce until infection sources are eliminated.

323

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Best Practices
Ensure the latest Virus Pattern and Scan Engine versions are loaded in the Antivirus used. Disable system restore Option on windows XP/Vista. Apply latest Microsoft Patches on all windows machines. Enable mapped drive scanning especially during outbreaks of malware that Spread using Shared/mapped Folders.

Use a firewall that will prevent incoming and outgoing malicious traffic.
Enable schedule scanning daily in case of huge network outbreaks.

Keep Temp, temporary internet files, prefetch and startup clean.


Use a password on shares if the shares are commonly used or else remove the shares because this will reduce the spread of infections.
2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

324

Best Practices on SEPM Installation

325

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Best Practices on SEPM Installation


2. Open the IIS Manager as below:

3. Expand Local computer as below:

326

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Best Practices on SEPM Installation


4. Expand to default website as below:

5. Right click on default website, click browse:

327

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Best Practices on SEPM Installation


6. On clicking browse, the following screen will appear. You shall proceed to install SEPM now

7. Click setup to start the SEPM installation:

328

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Best Practices on SEPM Installation


8. Select the install location and proceed:

9. Select the custom website option and ensure TCP port is set to 8014:

329

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Best Practices on SEPM Installation


10. Click Install to proceed with SEPM Installation & Complete it by clicking Finish:

330

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Best Practices on SEPM Installation


10. Management server config. window will pop-up next, select Advanced and click next:

11. Select number of users based on site requirement:

331

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Best Practices on SEPM Installation


12. Select Install my first site and click next:

13. Prefer keeping the default details & click next:

332

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Best Practices on SEPM Installation


14. Give the Site name and click next:

15. Give an Encryption password and store it somewhere as its used for Disaster recovery purpose:

333

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Best Practices on SEPM Installation


16. Select the Database, based on the clients size and proceed:

17. Enter the SEPM console Admin password & click next:

334

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Best Practices on SEPM Installation

18. Select No for Migration deployment wizard & Finish the SEPM Installation:

335

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Best Practices on SEP client Installation


1. Go to SEPM & click on Migration and Deployment wizard & click next :

2. Select Deploy the client & click next:

336

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Best Practices on SEP client Installation


3. Specify the group name for which the SEP client has to be installed:

4. Prefer leaving the default options and click next:

337

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Best Practices on SEP client Installation


5. Specify the Install package options & click next:

6. Click No to proceed with creating Install package:

338

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Best Practices on SEP client Installation


7.You can push out the software from the push deployment wizard., thru the following exe file: C:\Program Files\Symantec\Symantec Endpoint protection Manager\Tomcat\Bin\clientremote.exe

8. Click Next on the Push deployment wizard:

339

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Best Practices on SEP client Installation


9. Browse the created package, specify the concurrent deployments and click next:

10. Select the machine(s) for SEP client deploymentt and click Add:

340

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Best Practices on SEP client Installation


11. Enter the remote client authentication and click Finish:

12. SEP Software will start rolling out to the selected client(s):

341

2010 Wipro Ltd Ltd Internal & Restricted 2009 Wipro - Confidential

Best Practices

342

2010 Wipro Ltd - Internal & Restricted

SCSI Subsystem
The most important component Termination. Ensure it is properly set at Controller, each devices & SCSI Bus( Cable or Back Plane) Ensure there is Terminators are available in both the end of the SCSI bus Remove / Disable termination from devices if it is not the first or last device. Beware of External and Internal Connectors in the same channel, 50 and 68 Pin connectors in same channel Always connect Booting HDD to the channel where the boot order is 0 Always better to connect booting device to lowest SCSI ID Ensure the controller ID is set to 7. Do not change unless until it is really required. When connect 68 Pin HDDs to old SCSI controllers , use force SE jumper if any issues for detecting device. If SCSI HDDs are giving not ready error, use Auto Spin jumper in HDD to resolve the same
343
2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Raid Subsystem
As most of the Raid controllers uses SCSI as HBA, all points on SCSI will be applied for Raid also. Same Make & Model HDDs are suggested in a Single Raid array. Same RPMS are must if uses different model Average Seek time is the another point to be noted, use similar or nearest value HDDs only Higher capacity drives will work perfectly if the Make and Model series same. HDD goes offline issue normally caused by SCSI bus or HDD mismatch or One or more HDDs problem.This is not caused by the Raid Controller Never make any HDD online when the raid array or logical drive is degraded and data is accessible.

344

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Raid Subsystem Conti


When more than one HDD goes offline, identify the order in which the HDDs gone offline and make the HDDs online manually in the reverse order one by one, except the last one. Rebuild the last HDD and get the array optimal ZCR Cards works exactly like a normal raid controller, except the SCSI channel will be used from motherboard. All ZCR will not be compatible on all the motherboards. Choose the compatible cards only. ZCR Cards will not work in all the slots, only in one identified slot it will work When there is mismatch of raid configuration b/w NVRAM and HDD, always go with HDD configuration. It is advisable to take the backup before doing any operations in raid controller. Specifically before doing an array Migration or expansion. Expanded array only will give additional space in the raid volume. It is OS call that how it should be utilized Beware of Initialize option, it will destroy the data and no way to get it back
345
2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Host Raid
Host Raid supports only Raid 0, 1 & 10 Host Raid is indented to use for mirroring OS drive where the performance is not the highest priority and the redundancy has the priority. Rebuilding of Host Raid arrays will take significantly more time than a normal raid controller. Host Raid SCSI controllers will publish the Raid Volumes to OS as well as the individual drives which is not part of the Raid array, where as a normal raid controller will publish only raid volumes to OS. Host raid or a Normal Raid is not a replacement for Backup. Backup should be taken even if Host raid or any other Raid is implemented. This is indented to give redundancy in case of a HDD failure or / and to give better performance.

346

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Host Raid Conti


At present Host raid will not support online array expansion or migration. The raid configuration is written to HDD and when a M/B or SCSI controller gets replaced with a same model the raid configuration gets loaded from HDD to NVRAM. In LSI SCSI controllers the NVRAM write error is normally caused by the failure of one or more HDD. For Adaptec Host raid the driver when the host raid is enabled and the driver when the host raid is disabled is different. The non host raid driver will not detect HDDs even if the array not created, but host raid is enabled. For SATA host raid the raid should be enabled from M/B Bios and then only the raid BIOS will be present. Here also the driver with host raid enabled and host raid disabled is different. For Some host raid controller, the mirroring & striping is chosen by the IM or IS option selected in the M/B BIOS
347
2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Power Supply
Redundant power supplys has a non redundant part , ie the power back plane, where the power supplies gets inserted. The AC power to Redundant power supply preferably should be supplied from separate UPS, but both the UPS must have common and dedicated ground points. When an RPS is giving wrong voltages, the part to be replaced is the power back plane or SMPS with power back plane as the voltage regulators are normally located at power back plane. Always populate all 3 SMPS, when 2+1 redundant SMPS used in Servers with Dual processors for redundancy. DONOT SHORT any SMPS out puts to ground to start the SMPS manually, unless it is clearly documented and communicated.

348

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Power Supply Conti


Never plan a UPS which is equal to SMPS wattage or sum of SMPSs wattage as the in trust current while starting the SMPS will be more than what is planned. DO NOT OPEN SMPS. If a M/B reports voltage errors, it is not a must that the SMPS always giving the problem. It can be from the VRMs in the M/B also. Only the total power wattage does matter while choosing SMPS, some M/Bs or Processors requires a minimum current rating for some particular voltage lines. Proper working of SMPS fan also is a critical requirement for server to work reliably.

349

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Processor Issues
Fails very rarely, if proper heat sink and fan used. Ensure the cool air passes through the heat sink and no obstacles which blocks the air flow. Processor error may be reported when problem is there with M/B or VRM Take extra care to avoid damage while removing & fixing. Lot of processor related errors can be fixed by, Re-fixing the heat sink with newly & properly applied heat sink compound. Enabling the processor retest in BIOS Updating the BIOS to the latest stable one Re run the FRU-SDR utility, even if the loaded one is same.

350

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Processor Issues Conti..


Always refer processor spec no when check for replacement. Mixing of TWO processors with more than one stepping difference is not recommended even the all other spec matches. DP and MP Xeon processors are different. Can be used in only dual processor and Multi processor servers respectively EM64T feature cannot be enabled or disabled in BIOS. It detects the state automatically depends on the BIOS, OS and Drivers. HT can be disabled or enabled in BIOS. Disable the same if the OS doesn't support it. Processor utilization cannot be resolved always by adding or upgrading processors, this may be due to IO wait or application issue. Source of FRB errors may be M/B or Processor. But Source of Processor BIST error is from Processor only.

351

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Memory Issues
Dont mix Registered and Unbuffered Memory modules in the same system. Dont mix different capacity in the same bank Different speed memory may support but not suggested Don't MIX ECC and NON ECC memory. Also Ensure only ECC memory is installed in the Boards which supports ECC. Always populate higher capacity memory modules in the initial banks. OS blue screens always need not be memory issue. Use diagnostics tools or Hardware event log to check ECC errors reported. Beware of Dual ranking memories which may disable one unused memory slot. Increasing physical memory may not resolve the performance issues. Installed memory should properly assigned for Databases or Applications by OS. This may have to get fine tuned at OS or Database level. Nearest Slots may not be forming the Bank. Refer manual. Cooling to memory also important. Ensure the cool air passes through memory modules.
2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

352

Other issues
The best way to diagnose the other issues are

Check the system event log ( Hardware ) and analyze. Use Server Management Software to monitor the server. Use the Diagnostic tool supplied along with the Server to check the Server. If the latest event is not logged, save the existing log to a file and clear the logs from NVRAM . Then check the new event log , once the problem reoccur. Run FRU SDR utility to ensure all sensors are set properly. The following kind of errors in the SEL to be considered seriously. Voltage & Temperature errors SERR , PERR , NMI and ECC errors

353

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Other issues Conti


Refer the beep codes and Diagnostic LEDs status for any trouble shooting A lot of startup issues, including no display errors can be resolved by clearing the BIOS. Removing battery will not clear the BIOS. Shorting Battery leads may cause damage to battery / M/B. Refer M/B manual to identify the procedure to clear BIOS. This normally happens by shorting one jumper and switching on the system. No display / Not booting issues may get resolved by booting from alternate BMC / BIOS which may be available in the M/B BIOS recovery is another option to be tried out before replacing the M/B. Special disk need to be created for the same. Normal BIOS update disks will not be sufficient.

354

2010 Wipro Ltd Ltd - Internal & Restricted 2010 Wipro - Confidential

Thank You

2010 Wipro Ltd - Internal & Restricted

Das könnte Ihnen auch gefallen