3 Cict - It-Sa01 Module
3 Cict - It-Sa01 Module
AND MAINTENANCE
Learning Module
............................... 16
........................... 17
........................................... 18
............. 19
........................... 20
.......................................... 21
1
When utilizing one, some, and many, you will have the
possibility of a failed patch technology. ................. 21
3. Network Configuration .................................... 23
............................ 25
Assessing learning .......................................... 29
Activity 1 .................................................. 29
CHAPTER III................................................... 31
SERVER........................................................ 31
................. 34
Understanding the Cost Amount of Server Hardware .......... 35
Continuing Data Integrity ................................. 40
Place Servers in your Data Center ......................... 41
Client Server OS Arrangement .............................. 41
Offer Remote Console Access ............................... 42
Enhancing Reliability and Service Ability ................. 45
CHAPTER IV.................................................... 53
SERVICES...................................................... 53
Overview .................................................... 53
Learning Objectives: ........................................ 54
1. The Basics ............................................. 54
1.2 Operational Requirements .............................. 56
1.3 Open Architecture ..................................... 57
1.4 Simplicity ............................................ 59
1.5 Vendor Relations ...................................... 59
1.6 Machine Independence .................................. 60
1.7 Environment ........................................... 61
1.8 Restricted Access ..................................... 61
1.9 Reliability ........................................... 62
1.10 Single or Multiple Servers ........................... 63
1.11 Centralization and Standards ......................... 64
1.12 Performance .......................................... 65
1.13 Monitoring ........................................... 65
1.14 Service Rollout ...................................... 66
2. The Icing ............................................. 66
3. Conclusion ............................................ 71
2
The system administrator, IT system administrator, system
administrator, or sys admin is a person employed to manage and
maintain a computer system and/or a network. System administrators
could be members of the Information Technology (IT) Department or
the Department of Management Information Systems (MIS).
3
The responsibilities of the system administrator are broad in
nature and vary significantly from one organization to another.
System administrators are usually responsible for setting up,
supporting and maintaining servers or other computer systems, and
for preparing and responding to service interruptions and other
issues. Certain roles may include scripting or basic programming,
project management for systems-related projects, supervision or
training of computer operators, and advising on computer problems
beyond the expertise of technical support personnel. To order to
do his or her job well, the system administrator must show a
combination of technical knowledge and responsibility.
Some of the duties and responsibilities of a System Administrator:
4
Have you ever realized how difficult it is to do something
when people keep disrupting you? Too much distractions make it
difficult to complete any long-term projects. To address this,
organize the System Administration team in such a way that one
member is the shield to handle regular interruptions, and thus let
everyone else focus on their assignments uninterrupted.
Time
Tips for Improving System Administration
• How do people get help?
• What is the scope of responsibility of the System
Administration team?
• What’s our definition of emergency?
5
• an unforeseen combination of circumstances or the resulting state that
calls for immediate action
• an urgent need for assistance or relief
The time saving reflects the fact that the manual process has
been replaced by automation. One could start the process and
perform other tasks while the automated installation finish.
6
provide you with excellent coverage as you fight other battles.
Please ensure that management support staff will also see positive
changes. Often, these people are the ones who run the company.
Please ensure that every computer room has enough cooling and
electricity. Each device should receive its power from an
uninterruptible power supply (UPS). Nonetheless, when you're
trying to climb out of a hole, it's smart enough to make sure the
most critical servers and network equipment are on the UPS.
Specific UPS — one at the base of each rack — may be a good short-
term solution. UPSs should have enough battery capacity for servers
to sustain a 1-hour downtime and smoothly shut down before the
batteries run out. Power failures longer than one hour seem to be
7
very rare. Many of the outages are calculated in seconds. Small
UPSs are a good option before a larger UPS that can accommodate
the whole data center is placed. If you purchase a small UPS, be
sure to ask the supplier exactly what sort socket is needed for a
specific model. You would be amazed how many people need something
special. Cooling is more important than heat. Each watt of power
the machine consumes produces a certain amount of heat. Thanks to
the laws of thermodynamics, more than 1 watt of energy is expended
to provide cooling for the heat produced by 1 watt of computing
power. That is, it's really common to spend more than 50 percent
of your energy on cooling.
8
This unit aims to give you an understanding of the operating
system, and how OS functions in a computer system with other
hardware. Unlike servers, typically large quantities of desktops
are deployed, each with in almost the same configuration. All
computers have a life cycle that starts when the OS is activated
and finishes when the device is turned off the last time. As a
consequence of the entropy during this time, the program on the
machine is corrupted, modified, and reloaded from scratch when the
operation is restarted. Ideally, all host platforms begin with the
same configuration and should be updated in parallel.
9
Name : ____________________________________________ Date: ________________
Course/Year/Section: ________________________________________
1. What is DHCP?
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
10
At first, loading system software and applications, upgrading
system software and applications, and setting network parameters,
whether you don't get these three things right, whether they don't
work in the same manner in both processes, or if you left them all
out, it's going to be more complicated to do something else. When
you do not consistently load the operating system onto hosts, you
will find yourself with a nightmare of support. If you can't update
and repair programs easily, you won't be able to enforce them.
When the network implementations are not handled by a centralized
device like a DHCP server, it would be difficult to make the
slightest adjustment to the network. Automating certain tasks is
making a world of distinction.
New
Rebuild
Build Updat
e
Entro
py
Clea Initial Configur Unknown
n ed
Debug
Retire
Of
f
11
• UNKNOWN is a computer which has been misconfigured or is
obsolete.
• OFF refers to a retired and powered-off machine.
12
Architectural decisions taken by the SA can reinforce or
weaken the integrity of the OS. Is there a well-defined place
beyond the network areas for third party apps to be installed?
Source, or Manager, has the customer been given access and
therefore enhanced entropy? Has the SA developed a way for users
to carry out certain administrative tasks without the absolute
root power? SAs will find a compromise between giving optimal
exposure to and restricting consumers. This equilibrium has an
effect on the pace at which the operating system can decline.
13
• To initially load the software and the computer applications
• Upgrade of machine functionality and programs
• Network configuration parameters
15
Setup is partly automated part of automation it is better
than Automation totally no. To perfect an installer program, one
has to build stop-gap steps. The last 1% can take more time to
automate than the first 99 percent. Lack of automation might be
justified whether there are just a few on a given network where
the expense of complete automation is greater than the time saved,
or where the vendor has done a disservice to the environment by
finding it impossible (or unsupported) to automate the method.
16
every master picture. Ultimately, getting a replacement computer
with any sort with equipment that requires a fresh picture brings
significant time and cost.
There, you will find a balance by using both emulation and cloning.
To set up a simple OS update, certain places replicate disks and
instead utilize an automatic package distribution method to top-
level all apps and updates. Nearly all locations follow a common
OS install file, which then "post" programs or modify code to a
device.
17
give you an established state on either device. Pre-installed App
victimization refers to a break from the regular settings.
Inevitably, these gaps can contribute to issues.
18
system who thinks "all OS loads are consistent because I do them
myself" may find benefits in using a written check list. If
anything, your checklists can serve as the basis for training a
new system administrator or free up your time to obey your
checklists by training a trustworthy clerk.
19
the package. One could even build a bundle that only contains a
post-install script as a way to deploy a complicated update.
20
installing products after the customer has entered their
username and password to sign up, just before they have
connected to the program. Two days ago, the Auto Patch
software used by Bell Laboratories sends emails to the
consumer which helps the customer to postpone the upgrade for
a couple days by making a file with a specific name in / tmp.
When utilizing one, some, and many, you will have the
possibility of a failed patch technology.
• Once you are ready to execute the Any System, define and use
output metrics, such as when no errors exist, then the
successor category is around 50 percent better than the
previous community. If a single malfunction happens, the
population of the group falls to a single host and begins to
increase again.
22
The third component you need for a broad workstation area is
an automatic way to adjust network settings, small bits of
knowledge often correlated with booting a device and bringing it
onto the network. The knowledge in them is strongly customized to
the subnet or also to a particular host. It functionality is in
comparison to the server delivery system in which all hosts with
the same environment are distributed with the same code. As a
consequence, the software upgrade automated network parameter is
typically distinct from other programs.
23
DHCP programs can provide a design structure. Many DHCP
systems store the different parameters which are provided to each
host. Many DHCP systems store templates that define which
parameters are provided to specific host groups. The drawback with
the models is that if you want to make the same changes on specific
hosts, you only have to change the configuration, which is far
easier than walking through a long list with hosts, trying to
figure out which ones you need to alter.
Some outdated program that looks at this file can use the #
DHCP= token as a reference. Nevertheless, the DHCP server
configuration program uses other codes to decide whether to create
for that device. Adagio, talpc, and sec4 hosts are supported with
the appropriate setup for the Sun workstation, the Windows NT
server, and the HP LaserJet 4 printer respectively. Server ostenato
is an X-Terminal NCD that boots a barney named the Trivial File
Transfer Protocol (TFTP) node. The NCD system uses a key, allowing
it generic enough to interpret the configuration file from the
TFTP server for all hosts who use it.
The last four lines suggest that Tom's laptop will have a
separate IP address depending on the four subnets it can be linked
to: his office, house, or fourth or fifth floor laboratories. Note
that while we use static assignments, a host can still jump
networks. We reduced the potential for typos by embedding this
information in a /etc/others file.
24
single file! The Host DB5 open source initiative expands on this
idea, modifying a single file to construct and distribute DHCP and
DNS configuration data to appropriate servers.
25
scientific discipline on an endless basis. Many computer packages
consider you poor brick with a diverse bunch in their science
discipline. This example, though, is extraordinary. Rare, static
tasks are avoiding such problems.
27
incorrectly matching their host's scientific discipline address to
the router’s address. Customers were bi-manual over a listing of
scientific discipline addresses to use to line up their Unit. "Was
it the primary to 'automatic gateway' or was it the second? I even
have a 50/50 likelihood to urge it right. "When the consumer set
that this was incorrect, contact with the router was effectively
halted.
28
It needs more attention in such areas as user data isolation and
host specific device data management.
29
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
3. System Administrator is
the person responsible for managing multi-user operating
device, including a Local Network (LAN). What are
his/her the Typical Duties?
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
30
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
5. Examine your own site or site you have recently viewed, and
mention at least three places where specific improvements
have not been made. State that they did not make the
expenditure for each of them.
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
________________________________________________________________
Hardware sold for cloud use differs from the equipment sold
for use as a sole workstation qualitatively. Server hardware has
different characteristics, and is designed for a different
business model. Installing and maintaining servers are rendered
using special procedures. These typically have repair
arrangements, database recovery services, Software, improved
network control, and servers operate in the managed atmosphere of
a data center, where access to computer resources can be
restricted. Comprehending those changes will help you make smarter
buying decisions.
The systems that are advertised as servers vary from those that
are sold as clients or portable workstations. It is also enticing
to "save cash" by purchasing laptop hardware and filling it with
server software. This can work in the short run but is not the
best solution for the long term or you will be creating a house of
cards in a major project. Server hardware is typically more costly
but has extra features justifying the cost. These apps include:
32
resources between CPUs automatically. CPUs may be available
at different speeds, each priced linearly with regard to
speed. A CPU's earliest revision appears to be excessively
costly: extra fee on cutting edge. Such an extra expense can
be more readily explained on a platform that supports many
clients. Since a server is supposed to last longer, having a
faster CPU that won't get out of date as easily is always
fair. Remember that on a server CPU speed does not always
dictate performance, as many applications are I/ O dependent,
not CPU dependent.
33
• No side-access needs. It's easier to fix or conduct repairs
on a rack-mounted host if activities can be performed when
it's still in the rack. These operations must be carried out
without getting access to the machine's sides. Both cables
will be on the wall, and the front of both drive bays should
be closed. We saw CD-ROM bays opening sideways, showing that
the host wasn't built with racks in mind. Many devices, mostly
network equipment, only allow one-way access. This means the
tool can be put "butt-in" in a crowded space, and can still
be used. Some hosts allow removal of the external plastic
case (or parts of it) in order to install the unit
successfully into a standard rack. Verify that the software
or the ventilation will not mess with this. Power switches
should be available but they should not be easy to knock
unintentionally.
34
little to no experience with servers save for the sharing of dead
hosts arrival. Speaking with other SAs may be useful in figuring
out which suppliers they are using and which ones they are
avoiding. The Program Administrators' Guild SAGE and the LOPSA are
excellent resources for the SA community. Many specific vendors
and/or product lines can be homogeneous or heterogeneous
environments — exactly the similar provider or product line.
Homogeneous systems are simpler to manage, since the planning is
reduced, servicing and fixes become smoother — one set of
replacement parts — and there is fewer finger pointing when
problems occur.
35
machine's possible uptime, making it a more desirable price /
performance ratio.
For other factors, servers are costing more too. A more user
friendly chassis can be more costly to produce. Limiting the drive
slots and other entry panels on both sides means they are not
simply positioned on minimize construction costs. However, the
marginal rise in initial sales price saves money in the mean
maintenance period (MTTR) and operating convenience in the long
run.
36
No contract can be needed if the default repair options are
appropriate.
37
do at one location who had this system would unbox and rack-mount
new SAs gear.
There are three simple ways to ensure the hosts are left out
of the deal. The first is to have a solid network of inventories
and use it to cross-referenced service contracts. Nonetheless,
strong distribution systems are hard to find and some hosts may
even skip the best.
38
Third, you would have to repair a warranty problem. Most
machines offer free coverage for the first 12 months due to their
warranties and do not need to be specified on the service schedule
for those months. Nevertheless, it is impossible to recall to add
the host to the deal too many months after and the level of
operation during the warranty period is different. The SA can see
if the seller automatically places the machine on the deal then
offers a zero dollar charge for the first 12 monthly statements to
correct those issues. Some of the vendors would do this as it keeps
the host in profits. Lately, most suppliers included purchasing a
service contract while the equipment was ordered.
39
Be wary of sellers offering to sell servers that do not have
cross-shipment under any conditions. These vendors don't even take
the word server seriously. You will be shocked to find out which
big vendors have that policy.
40
In an area, servers should be supplied with sufficient power,
fire protection, networking, refrigeration and physical security.
This is a smart idea to devote physical space to a computer while
it is being bought. Marking the room by tapping a paper sign into
the correct rack will protect against double booked room. Marking
the space needed for power and cooling involves monitoring through
a list or table.
41
for general use and a set of UNIX CPU servers. As mentioned in
Chapter 3, the clients will have identical cookie-cutter loads on
OS. The CPU processors would have the same boot load so it can be
configured differently with a larger variety of processes, pseudo
terminals, buffers and other parameters.
42
the console server and then connect to a different serial port. No
more going to the console in the living room to do it.
43
the device. To the remote engineer, the eyes and hands may be an
on-site technician, or a friendly volunteer. Some devices allow
one to switch on / off individual power ports remotely, and hard
reboots can be performed remotely. Installing devices will however
be reserved to trained practitioners.
Inside the computing room, SAs will never waste a usual day
working. These are poor for using SAs to fill a computer space.
Operating directly in the work room rarely satisfies ergonomic
keyboard and mouse placement standards, or environmental
specifications such as noise level. Operating in a cold computing
room does not safeguard citizens. SAs can work in an environment
that maximizes their productivity and is better achieved at their
workplaces. Significant SA products such as research books,
ergonomic keyboards, telephones, refrigerators, and audio devices
can be easily located in an office as opposed to a work room.
44
extra measures to accelerate recovery. Any server's boot Disk
should be mirrored. This is, there are two disks built, and every
modification to one is made to the other as well. When one disk
crashes the computer immediately switches to the operating disk.
That is what most computer operating systems do for you, and other
hard disk controllers do in hardware for you.
45
A server is an intentionally designed instrument for a
particular purpose. Toasters do their toasting. Blenders combine.
One may use general-purpose devices to do such tasks, but there
are benefits of using a computer designed to perform one function
very well.
46
Getting a redundant power supply does not only mean two such
machines are within the case. It means the machine will be stable
if one power supply does not work: n + 1 redundancy. Often, two
power supplies are needed for a fully charged device to receive
enough power. Redundant in this case means providing 3 power
supplies. This is an important matter that suppliers ought to
remember when purchasing servers and network equipment. Especially
network equipment is prone to this problem. Even when a large
network system is completely equipped with power-hungry fiber
interfaces, there is a minimum of dual power supplies, not
redundancy. Sellers do not really say that up front.
Each electrical supply should have its own power cable. The
most popular power problem, in realistic words, is where a power
cord is accidentally pulled out of its socket. Formal power
reliability studies frequently ignore these problems, since they
study utility capacity. For anything a single power cord does not
help you in this case! Any vendor supplying multiple power supplies
with one power cord shows ignorance of this fundamental operational
issue.
Each power supply can draw power from another source for very-
high-availability systems, such as separate UPSs. When one UPS
fails, otherwise the system must start. Most data centers spread
their money out with that in mind. — The power source is wired
into another power distribution unit (PDU) more often. When anyone
mistakenly overloads a PDU with two separate devices, the computer
has to remain up.
47
the first fails to take over. This failover will occur manually —
somebody realizes the first system failed and triggers the second
system — or automatically — the second system watches and triggers
the first system.
When one program crashes, the other system will take over the
failed counterpart's workload. The networks may be designed to
manage the functionality of each other or another process may track
the flow and distribution of requests for service.
The longer you wait, the heightened the risk. A SA would have
to wait before a reset can be performed without hot-swap bits to
get back into computer protection n+1. An SA can substitute hot-
swap bits for the component, without scheduling downtime. RAID
systems include the concept of a hot backup disk that is inside
the computer, unused, ready to replace a failed disk. Considering
that the system will isolate the broken disk and keep the whole
48
machine from operating, the system can automatically activate the
hot spare disk making it part of the RAID package it needs. That
is what makes machine n + 2.
The sooner the system is put back into the state of complete
redundancy, the better. RAID systems also operate slower before a
failed part is replaced, and the RAID collection is restored. More
importantly, while the system is not fully redundant, you run the
risk of failing a second disk; You lose all of your tests at that
stage. Many RAID systems can be programmed to shut down if they
run in non-redundant mode for longer than a reasonable amount of
hours.
49
usage of the network. Simpler hardware may be used to create this
new network, thus being more reliable or, more importantly,
unaffected by main network outages. This also offers SAs a way to
get into the network during an outage such as this. This type of
redundancy solves an extremely specific problem.
50
do these stuff on a wide scale the expense would go down
considerably.
51
Operating on a growing, wide cloud, numerous virtual servers. Data
offers the best of both worlds
52
This unit aims to make a server understand the hardware and
the service feature that the server provides. Service can be based
on multiple servers which function in order with each other. This
chapter explores how to create a service that meets consumer
expectations, which is reliable and that can be sustained. It also
deals with the ways on how to offer a service by removing the
hardware and software, will also makes the service reliable by
scaling the progress of the service, by monitoring, maintaining
and supporting it. Service is insincerely a service before it meets
these basic demands. One of a SA's essential tasks is to provide
the services it needs to clients. The needs of consumers must
change as their work and innovations develop. An SA, therefore,
devotes a considerable amount of time to designing and developing
new services. Whether well these programs are developed by the SA
defines how much time and money will be expended to help them in
the future and how contented the consumers will be.
53
At the conclusion of the chapter, the student can:
1. describe different services a computer server functions
and operations;
2. differentiate the type of servers needed and requirement
to satisfy the operation of a business; and,
3. design a network for a business that will make use of a
server for its operation.
55
day of the week if the server doesn't accept a 24/7 contact. The
SLA describes a mechanism that boosts the problem if it is not
addressed within a specified date, and relies for administrators
to fix complex issues. In an arrangement in which the user pays
for a specific service, the SLA periodically outlines provisions
if the service provider refuses to meet the level of service
rendered. The SLA is continuously discussed in depth, and all
parties to the agreement decide.
56
The customer sends a question and awaits the response. What
if the same device is in India and the client works on a laptop in
New York? Suppose it takes half a second before the final bit of
the application arrives in India. Now the job should take 5 seconds
(one-half second for each request and answer) plus the period of
time the server completes the processing of the queries. Suppose
the links to India are a T1. Will a connection to a T3 update fix
the problem? When the latency of the T3 is the same as the T1,
then the upgrade does not alter the condition. Alternatively, the
solution is to send out all five questions concurrently and wait
before the answers return when each of them starts. Additionally,
send the server a longer SQL question that collects the responses,
summarizes them and only returns the response. Maximum processing
time is the amount of the time it takes each request to complete.
57
Specifications and file formats are established in a public
domain, such that producers may develop specifications and deliver
products. In comparison, an organization uses proprietary
protocols and file formats to interact with fewer objects, as
protocols and file formats are susceptible to unwarned alteration
and allow device owner authorization. Often vendors use
proprietary protocols make specific license arrangements with
other vendors. There is, however, typically a difference between
the launch of a new version by one vendor and the implementation
of a compatible new version by the second vendor. Relations between
the two vendors can also fall down, and the interface between the
two can cease. This situation is a nightmare for users using all
the things and relying on their Graphical User Interface (GUI).
58
program that does not use straightforward protocols but adapts to
their customer needs. The other advantage of making transparent
networks is that they do not require gateways to the rest of the
world. Gateways are the "glue," binding different structures.
Reducing operation counts is a wonderful idea.
60
Service is somewhat reliant on clients, either precisely or
essentially by other devices and systems that rely on it. Customers
believe the service should be accessed anytime they require it to
be available. The delivery of a basically high degree of
availability is an integral piece of building infrastructure,
which involves filing all the equipment connected to that
infrastructure into a secure data center environment. The
datacenter offers shielded fuel, plenty of ventilation, well-
ordered humidity necessary for management in dry or humid
environments, and a safe environment where the system is excluded
from accidental damage or detachment.
62
Nevertheless, because they are linked to the same network,
the process would remain inoperative even though the connection
fails. On the other side, if they are distributed around three
networks, with several different switches and routers
participating in inter-component communications, still more
modules can malfunction and disconnect the service. Keeping it as
efficient as possible is the single most successful way to keep it
as straightforward as possible.
63
In addition, one of the elements may be used mainly for this
one application only but may be used for other applications later.
For eg, a calendar service that uses a Lightweight Directory
Directory Access Protocol (LDAP) server, which is the primary
service enabled by LDAP. Are the calendar service and the archive
service to live on the same or separate machine? For example, other
programs may occur in LDAP software, it is found on a given
computer, not on a common one to upgrade and fix the calendar
component independently from LDAP software. Two programs or
daemons will also be absolutely bound together, and can never be
used independently. In this case, all other items being equal,
having them both on the same computer makes sense, because the
operation depends on only one computer rather than two.
64
Beware about the efficiency characteristics when planning a
system, even though many more challenging technical challenges
need to be tackled. Solving all the tough things when the operation
is inefficient would not be deemed a positive by the citizens who
use it. Check the computer to survive the depreciation as a load
to it. For order to create a business that is doing well, one needs
to consider how it operates and even look for ways to better
isolate it across many devices.
66
redundant irrespective of the scale of the business. Consider the
others fully obsolete as the company evolves.
67
the load to hit the point where deployment would be inappropriate
if one of the servers crashed. Until hitting that stage, add more
servers in parallel with current ones.
68
69
Knowing the individual components of a standard business
contract will scale up the process with much greater precision and
performance. Data involves the memory used for the storage process
of the system, the number and sum of packets in a process, the sum
of available sockets for a request to be served. Person service
process with dataflow, required transaction allows it to take
place, Internet name via DNS, in order to get a proper image of
the process. Also issues that are outside of reach technologically,
such as root-level name server output in DNS, will influence the
model.
Checking through the logs will get a think into the system's
utilization patterns: how many users are immediately on during
certain portions of the day relative to the overall number of web
users. For explore tools, consider that an archive file of any
kind, or even the whole mailbox, is loaded into memory by the IMAP
Server. If that is the case, consider the total size of the data
to be loaded, which can be measured as a strict total of all the
index files of the customers; as a mean or average, depending on
where more index files appear in the volume curve, or also by
inserting only the index files used at peak time of use and
rendering such measurements.
70
The SA is doing its part of the job to determine whether to
help and manage each operation, continuity in how well it does its
work. This sees customer needs and eventually consumers should be
satisfied with the SA team's work. Creating programs that offer
improved customer support, either directly by providing a service
they need, or indirectly by making the SA team more successful.
71
Assessing learning
Activity 1
Name : _____________________________________________________ Date: ________________
Course/Year/Section: ____________________________________
1. List all the services in the computer environment. What hardware and software make
up each one? List their dependencies.
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
2. Select a service that can predict requiring design. What is needed to do to sustain the
suggestions in this chapter? How to roll out the service to the clients?
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
3. What services rely on machines that do not have to be in the machine room? How to
eradicate those dependencies?
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
6. How to perform volume planning? Is it satisfactory, or what other ways to expand it?
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
7. What services have maximum redundancy? How is that redundancy delivered? Are
there other services that should be enhanced to redundancy?
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
8. Review the discussion of bandwidth versus latency. What would the mathematical
formula look like for the two suggested solutions: batched requests and windowed
requests?
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
____________________________________________________________________________________________________
73