0% found this document useful (0 votes)
328 views

System and Network Administration Lab Manual

The document provides instructions for installing and configuring Windows Server 2012 R2. It details the steps to install the operating system, configure roles like Active Directory, DHCP and DNS. It also provides post-deployment configuration steps for Active Directory Domain Services and DHCP.

Uploaded by

haile
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
328 views

System and Network Administration Lab Manual

The document provides instructions for installing and configuring Windows Server 2012 R2. It details the steps to install the operating system, configure roles like Active Directory, DHCP and DNS. It also provides post-deployment configuration steps for Active Directory Domain Services and DHCP.

Uploaded by

haile
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 97

Arba Minch University

Institute Of Technology
Faculty of Computing and Software Engineering

Subject Name: System and Network Administration Lab Manual

Prepared by Yoseph Samuel Arba Minch, Ethiopia

May15/2022G.C
Chapter One

Windows Server 2012 R2

1.1 Introduction

Within today’s fast changing IT world, Windows Server 2012 R2 is designed to provide
customers an “all-in-one” server and datacenter platform to optimize and manage daily business
easier and more cost-effective.

In comparison to its predecessor Windows Server 2012 the new Server operating system
delivers many enhancements:
 A proven, enterprise-class datacenter and cloud platform that can scale up to run the
largest workloads while enabling robust recovery options to protect against service
outages.

 Automated protection and recovery of assets and cost-effective business continuity


on-premises and in the cloud

 Resilient, multi-tenant-aware storage and networking capabilities for a wide range


of workloads. It delivers these capabilities at a fraction of the cost of other
solutions, through the use of cost-effective FUJITSU Server PRIMERGY hardware.

 Enables mission-critical applications and provides enhanced support for open


standards, open source applications and various development languages.

 Provides an operating system platform that empowers the user by granting them
access to corporate resources on the devices they choose while protecting critical
information

Windows Server 2012 R2 is the successor to Windows Server 2012, Microsoft s


enterprise server operating system. Developed under the Windows Server Blue codename,
Windows Server 2012 R2 made its official debut in late 2013.

Among its many improvements, Windows Server 2012 R2 includes an enhanced Hyper-
V hypervisor (Hyper-V 2012 R2) that provides the ability to compress virtual machines (VMs)
during live migrations, automatic reallocation of memory between VMs running Linux as a guest
on Hyper-V hosts, remote direct memory access (RDMA) support during live migrations, VM
live cloning, and support for shared VHDX files.

Windows Server 2012 R2 also features enhanced integration and interoperability with Microsoft
s Windows Azure cloud platform and the company s cloud-based version of Microsoft
Office, Office 365.

Windows Server 2012 R2 was announced on June 3rd, 2013, and a preview release became
available for download later that month, on June 24th. Upon its official release, Windows Server
2012 R2 was made available in Standard, Datacenter and Essentials editions.

1.2 Installing Windows Server 2012 R2

Minimum Requirements.

Processor – 1.4 GHz 64-bit processor

RAM – 512 MB

Disk Space – 32 GB

You can download an evaluation version of Windows Server 2012 in ISO format.

To create a USB installation media.

Step 1- Insert a DVD of Windows Server 2012 into CD/DVD drive or bootable USB and start it
set boot option from computer bios to DVD drive or USB.

Step 2- Press any key else from CD or DVD……


Step 3- Select the language to install, time and currency format, keyboard or input method and
click next.
Step 4- Server 2012 setup. Click Install Now.

Step 5 − Once you have clicked on Install Now, the setup will start and it will load all the files
and the screen will look as shown in the following screenshot.
Step 6- Select the operating system you want to install and then click Next.

Step 7- Select I accept the license terms and then click Next.
Step 8- Select Custom: Install Windows only (advanced).

Step 9- Select New to partition the hard disk and Select drive size in MB and then click Apply.
Step 10- Windows might create an additional partition, so click ok

Step 11- Select the drive where you want to install windows server 2012 and then click Next.
Step 12- Copying windows files started > sit back and relax while Installation takes a moment.

Step 13- After rebooting, type an administrative password (P@$$w0rd) and then click finish.
Step 14- Login together with your current password to login Windows Server 2012.

Step 15- Now you can change your time, time zone, date, server name and firewall settings.
Chapter Two

Configuration and Installation of windows Server Roles

2.1 Requirement:

Minimum: 1.4 Ghz 64-bit processor

Minimum: 512 MB RAM

Minimum: 32 GB or greater Storage device

This documentation will explain how to install AD, DHCP and DNS on server 2012 R2.

The first step is to get server 2012 install on a server. it is very similar to server 2008
installations.
2.2 Changes the Default User Name by your own User names

Step 1 - Click Local Server and select Computer Name


Step 2 - Click Change

Step 3 - Write User Name and Click Ok


Step 4 - Click Ok

Step 5 - Click Restart Later

2.3 IP Address Configurations

Step 6 - Right click Network and Sharing Center → Change adapter Settings
Step 7 - Right click Ethernet →select Properties

Step 8 – Select TCP/IPv4 → Click Properties


Step 8 – Select Use the following IP address → Click OK
2.4 Windows Server 2012 R2 Role Installations

 In this article, I will be covering the steps to install “Active Directory” on Windows
Server 2012 R2 using Server Manager. First, it is required to install “Active Directory
Domain Services” on the Windows Server. Then the server should be promoted as a
“Domain Controller”.

 As you know Dynamic Host Configuration Protocol (DHCP) is commonly


implemented network services in today’s network environments. DHCP is primarily
used to automatically distribute IP configuration settings to network clients, eliminating
manually configuring hosts on TCP/IP-based networks.

 DNS Role is one of the most important services in a network with Domain Controllers
Environment. It helps us to resolve domain names internally and externally to IP and to
have access to the requested service for the respective domain.

Let us now see how to install the Active Directory Domain Services, DHCP and DNS Role. For
this we need to follow the steps given below.

2.5 Install the Active Directory Domain Services

Step 1 − Go to “Server Manager” → Manage → Add Roles and Features.


Step 2 − Click Next.

Step 3 − Select the Role-based or feature-based installation option → click Next.


Step 4 − Select a server from the Server Pool → then click Next.

Step 5 − From the Roles lists, check the Active Directory Server role → click Add Features on
the popup windows as shown in the following screenshots.
2.6 Install the DHCP Services Role

Step 6 − From the Roles lists, check the DHCP Server role → click Add Features on the
popup windows as shown in the following screenshots.

Step 7 − From the Roles lists, check the DNS Server role → click Add Features on the popup
windows as shown in the following screenshots
Step 8 − Click Next.

Step 9 − Click Next.


Step 10 − Click Next.

2.7 Install the DNS Services Role

Step 11 − Click Next.


Step 12 − Click Install.
Step 13 − Click Close.

2.8 Post-deployment Configuration of Active Directory Domain Services

In this section, we will see how to do the post-deployment configuration of the DHCP. Please
follow the steps given below.

Step 1 − Click on the warning icon and then click on “Complete DHCP Configuration”.
Step 2 − When the Active Directory Domain Services Configuration Wizard opens.

Step 3 − Select Add a new forest and enter Root domain name. Then click Next.
Step 4 – Set Password→ click Next.

Step 5 − Click Next.


Step 6 − Click Next.

Step 7 − Click Next.


Step 8 − Click Next.

Step 9 − Click Install →Click Close.


2.9 Post-deployment Configuration of DHCP

In this section, we will see how to do the post-deployment configuration of the DHCP. Please
follow the steps given below.

Step 1 − Click on the warning icon and then click on “Complete DHCP Configuration”.

Step 2 − Click Next.


Step 3 − Select a domain user account that has permissions to create objects in the Net Services
container in Active directory or a domain admin account → click Commit.

Step 4 − Click Close.


Step 5 – Click CMD → Write schmmgmt → Enter → Ok.

Step 6 − Click Start Button → Search MMC → Enter.


Step 7 – Click File → Select Add/Remove Snap-in

Step 8 – Select Active Directory Users and Computers and Active Directory Schema → click
Add →Ok
Step 9 – Select Local Computer→ click Finish

Step 10 – Select Computer Management → click Add →Ok


Step 11 – Click File →Save As
Step 11 – Select Location to save your file and write file name and Click Save

Step 11 – Click File → Select Add/Remove Snap-in


Step 14 – Select Event Viewer → click Add →Ok

Step 15 – Select Local Computer → click Ok


Step 16 –click Ok

Step 16 –click File → Save


Step 18 – Click File → Select Add/Remove Snap-in

Step 19 – Select Event Viewer from the list of selected snap-ins → click move up → Ok
Step 20 – Select Active Directory Schema from the list of selected snap-ins → click Remove →
Ok
Step 21 – Select Computer management from the list of selected snap-ins → click Edit
Extension.
Step 22 – Select Enable and Deselect Event Viewer → click Ok

Step 23 – Open the Admin.msc and Choose Options from the File Menu
Step 24 – In the Console Mode drop-down list, choose User Mode-Full Access → click Ok

Step 25 – Choose save from the File Menu and close the console
Step 26 – Click the File menu there is not an Add/Remove Snap-ins option and Close the
console.

Step 27 – Right-Click the console and choose Author


Step 28 – Click the File Menu there is an Add/Remove Snap-ins option and Close the console.
2.10 Creating and Locating Objects in Active Directory Windows Server
2012R2

Step 1- Click Tools → Select Active Directory Users and Computers.

Step 2 - If you expand your domain then you will see that it contains many things in it, like
Users, Computers, Bulletins, etc. that will show you previously created Users, Groups, etc. and
Now right-click on your domain (ABC.com) → New → Organizational Unit
Step 3 – Write Name → Click Ok

Step 4 – Right-click group → new → new group.


Step 5 – Write Name → Click Ok

Step 6 – Right-click group → new → new group.


Step 7 – Write Name → Click Ok

Step 8 – Right-click group → new → new group.


Step 9 – Write Name → Click Ok

Step 10 – Right-click your domain (ABC.com) → new → new Organizational Unit


Step 11 – Write Name → Click Ok

Step 11 – Right-click OSL → new → Organizational Unit


Step 13 – Write Name → Click Ok
Step 14 – Right-click OSL → new → Organizational Unit

Step 15 – Write Name → Click Ok


Step 16 – click OSL → right-click group → group.

Step 17 – Write Name → Click Ok


Step 18 – click OSL → right-click group → group.

Step 19 – Write Name → Click Ok


Step 20 – click OSL → right-click group → group.

Step 21 – Write Name → Click Ok


Step 22 – click OSL → right-click User → User.

Step 23 – Write Name → Click Next


Step 24 – Set Password → Click Next.

Step 25 – Click Finish.


Step 26 –Select group → right-click HR → Properties.
Step 27 –Select members → Add.

Step 28 –Write Name → Check Name → OK


Step 29 – Apply → OK
2.11 Scope Implementation of DHCP

Now we have to configure the service to make it useful for the computers. To do this, we need
to follow the steps given below.

Step 1 − Server Manager Screen → Tools → DHCP.

Step 2 − Right-click on IPv4 → Select “New Scope”.


Step 3 − Click “Next”.

Step 4 − Enter Scope Name and description as shown in the following screenshot and then →
Next.
Step 5 − Enter the Start and End IP address, the Subnet mask → click Next.

Step 6 − Enter your IP range in the exclusion list. If you have devices on the network that
require static IP address and also ensure that the excluded range falls with the Start and End
range earlier specified, then → click Add→ click Next.
Step 7 − Enter the desired lease duration for the assigned IP’s or leave as default → then click
Next.

Step 8 − Select → Yes, I want to configure these options now to configure the DHCP options
for the new scope → then click on Next.
Step 9 − Enter the default gateway which is the IP of your Router → then →click Add → click
Next.

Step 10 − Add DNS IP → click Next (we can put ABC.com DNS or if it is a Domain
environment you can put the DC IP there) then click → Next.
Step 11 − Specify your WINS Server if any and then click → Next.

Step 12 − Select Yes, I want to activate this scope now option to activate the scope
immediately and then click → Next.
Step 13 − Click Finish.

2.12 To manage DNS, we have to create a primary Zone because by default,


there are no zones in order to manage the records.

Step 1 − To manage DNS, go to Server Manager → Tools → DNS


Step 2 −→ Right click on “DNS” → Click Configure a DNS Server.

Step 3 − click Next.


Step 4 − Select “Create a forward lookup zone” and then click Next.

Step 5 − Select “This server maintains the Zone” and then click Next.
Step 6 − Enter the name of the New Zone for which you want to manage the records and then
click Next.

Step 7 − If you want to update the record of this zone manually, you have to select “Do not
allow dynamic Updates”, as shown in the following screenshot and then click Next.
Step 8 − Select “yes,” → click here to an IP Address or DNS name and then click Next.

Step 9 − Click the Finish button.


Chapter Three
Redundant Array of Independent Disks

3.1 What is RAID?

RAID (redundant array of independent disks) is a setup consisting of multiple disks for data
storage. They are linked together to prevent data loss and/or speed up performance. Having
multiple disks allows the employment of various techniques like disk striping, disk mirroring,
and parity.

RAID Levels and Types

RAID levels are grouped into the following categories:

 Standard RAID levels


 Non-standard RAID levels
 Nested/hybrid RAID levels

Additionally, you can choose how to implement RAID on your system. Therefore you can
choose between hardware RAID, software RAID, and firmware RAID.

The following list explains the standard RAID levels (0, 1, 2, 3, 4, 5, 6) and popular non-
standard and hybrid options (RAID 10).

3.2 RAID 0: Striping

RAID 0, also known as a striped set or a striped volume, requires a minimum of two disks. The
disks are merged into a single large volume where data is stored evenly across the number of
disks in the array.

This process is called disk striping and involves splitting data into blocks and writing it
simultaneously/sequentially on multiple disks. Configuring the striped disks as a single partition
increases performance since multiple disks do reading and writing operations simultaneously.
Therefore, RAID 0 is generally implemented to improve speed and efficiency.
It is important to note that if an array consists of disks of different sizes, each will be limited to
the smallest disk size in the setup. This means that an array composed of two disks, where one is
320 GB, and the other is 120 GB, actually has the capacity of 2 x 120 GB (or 240 GB in total).

Certain implementations allow you to utilize the remaining 200 GB for different use.
Additionally, developers can implement multiple controllers (or even one per disk) to improve
performance.

RAID 0 is the most affordable type of redundant disk configuration and is relatively easy to set
up. Still, it does not include any redundancy, fault tolerance, or party in its composition. Hence,
problems on any of the disks in the array can result in complete data loss. This is why it should
only be used for non-critical storage, such as temporary files backed up somewhere else.

Advantages of RAID 0

 Cost-efficient and straightforward to implement.


 Increased read and write performance.
 No overhead (total capacity use).

Disadvantages of RAID 0

 Doesn't provide fault tolerance or redundancy.


When Raid 0 Should Be Used

RAID 0 is used when performance is a priority and reliability is not. If you want to utilize your
drives to the fullest and don't mind losing data, opt for RAID 0.

On the other hand, such a configuration does not necessarily have to be unreliable. You can set
up disk striping on your system along with another RAID array that ensures data protection and
redundancy.

3.3 RAID 1: Mirroring

RAID 1 is an array consisting of at least two disks where the same data is stored on each to
ensure redundancy. The most common use of RAID 1 is setting up a mirrored pair consisting of
two disks in which the contents of the first disk is mirrored in the second. This is why such a
configuration is also called mirroring.

Unlike with RAID 0, where the focus is solely on speed and performance, the primary goal of
RAID 1 is to provide redundancy. It eliminates the possibility of data loss and downtime by
replacing a failed drive with its replica.

In such a setup, the array volume is as big as the smallest disk and operates as long as one drive
is operational. Apart from reliability, mirroring enhances read performance as a request can be
handled by any of the drives in the array. On the other hand, the write performance remains the
same as with one disk and is equal to the slowest disk in the configuration.
Advantages of RAID 1

 Increased read performance.


 Provides redundancy and fault tolerance.
 Simple to configure and easy to use.

Disadvantages of RAID 1

 Uses only half of the storage capacity.


 More expensive (needs twice as many drivers).
 Requires powering down your computer to replace failed drive.

When Raid 1 Should Be Used

RAID 1 is used for mission-critical storage that requires a minimal risk of data loss. Accounting
systems often opt for RAID 1 as they deal with critical data and require high reliability.

It is also suitable for smaller servers with only two disks, as well as if you are searching for a
simple configuration, you can easily set up (even at home).

3.4 Raid 2: Bit-Level Striping with Dedicated Hamming-Code Parity

RAID 2 is rarely used in practice today. It combines bit-level striping with error checking and
information correction. This RAID implementation requires two groups of disks – one for
writing the data and another for writing error correction codes. RAID 2 also requires a special
controller for the synchronized spinning of all disks.

Instead of data blocks, RAID 2 stripes data at the bit level across multiple disks. Additionally, it
uses the Humming error ode correction (ECC) and stores this information on the redundancy
disk.
The array calculates the error code correction on the fly. While writing the data, it strips it to the
data disk and writes the code to the redundancy disk. On the other hand, while reading data from
the disk, it also reads from the redundancy disk to verify the data and make corrections if needed.

Advantages of RAID 2

 Reliability.
 The ability to correct stored information.

Disadvantages of RAID 2

 Expensive.
 Difficult to implement.
 Require entire disks for ECC.

When Raid 2 Should Be Used

RAID 2 is not a common practice today as most of its features are now available on modern hard
disks. Due to its cost and implementation requirements, this RAID level never became popular
among developers.
3.5 Raid 3: Bit-Level Striping with Dedicated Parity

Like RAID 2, RAID 3 is rarely used in practice. This RAID implementation utilizes bit-level
striping and a dedicated parity disk. Because of this, it requires at least three drives, where two
are used for storing data strips, and one is used for parity.

To allow synchronized spinning, RAID 3 also needs a special controller. Due to its configuration
and synchronized disk spinning, it achieves better performance rates with sequential operations
than random read/write operations.

Advantages of RAID 3

 Good throughput when transferring large amounts of data.


 High efficiency with sequential operations.
 Disk failure resiliency.

Disadvantages of RAID 3

 Not suitable for transferring small files.


 Complex to implement.
 Difficult to set up as software RAID.
When Raid 3 Should Be Used

RAID 3 is not commonly used today. Its features are beneficial to a limited number of use cases
requiring high transfer rates for long sequential reads and writes (such as video editing and
production).

3.6 Raid 4: Block-Level Striping with Dedicated Parity

RAID 4 is another unpopular standard RAID level. It consists of block-level data striping across
two or more independent diss and a dedicated parity disk.

The implementation requires at least three disks – two for storing data strips and one dedicated
for storing parity and providing redundancy. As each disk is independent and there is no
synchronized spinning, there is no need for a controller.

RAID 4 configuration is prone to bottlenecks when storing parity bits for each data block on a
single drive. Such system bottlenecks have a large impact on system performance.

Advantages of RAID 4

 Fast read operations.


 Low storage overhead.
 Simultaneous I/O requests.
Disadvantages of RAID 4

 Bottlenecks that have big effect on overall performance.


 Slow write operations.
 Redundancy is lost if the parity disk fails.

When Raid 4 Should Be Used

Considering its configuration, RAID 4 works best with use cases requiring sequential reading
and writing data processes of huge files. Still, just like with RAID 3, in most solutions, RAID 4
has been replaced with RAID 5.

3.7 Raid 5: Striping with Parity

RAID 5 is considered the most secure and most common RAID implementation. It combines
striping and parity to provide a fast and reliable setup. Such a configuration gives the user
storage usability as with RAID 1 and the performance efficiency of RAID 0.

This RAID level consists of at least three hard drives (and at most, 16). Data is divided into data
strips and distributed across different disks in the array. This allows for high performance rates
due to fast read data transactions which can be done simultaneously by different drives in the
array.
Parity bits are distributed evenly on all disks after each sequence of data has been saved. This
feature ensures that you still have access to the data from parity bits in case of a failed drive.
Therefore, RAID 5 provides redundancy through parity bits instead of mirroring.

Advantages of RAID 5

 High performance and capacity.


 Fast and reliable read speed.
 Tolerates single drive failure.

Disadvantages of RAID 5

 Longer rebuild time.


 Uses half of the storage capacity (due to parity).
 If more than one disk fails, data is lost.
 More complex to implement.

When Raid 5 Should Be Used

RAID 5 is often used for file and application servers because of its high efficiency and optimized
storage. Additionally, it is the best, cost-effective solution if continuous data access is a priority
and/or you require installing an operating system on the array.

3.8 Raid 6: Striping with Double Parity

RAID 6 is an array similar to RAID 5 with an addition of its double parity feature. For this
reason, it is also referred to as the double-parity RAID.

This setup requires a minimum of four drives. The setup resembles RAID 5 but includes two
additional parity blocks distributed across the disk. Therefore, it uses block-level striping to
distribute the data across the array and stores two parity blocks for each data block.
Block-level striping with two parity blocks allows two disk failures before any data is lost. This
means that in an event where two disks fail, RAID can still reconstruct the required data.

Its performance depends on how the array is implemented, as well as the total number of drives.
Write operations are slower compared to other configurations due to its double parity feature.

Advantages of RAID 6

 High fault and drive-failure tolerance.


 Storage efficiency (when more than four drives are used).
 Fast read operations.

Disadvantages of RAID 6

 Rebuild time can take up to 24 hours.


 Slow write performance.
 Complex to implement.
 More expensive.

When Raid 6 Should Be Used

RAID 6 is a good solution for mission-critical applications where data loss cannot be tolerated.
Therefore, it is often used for data management in defense sectors, healthcare, and banking.
3.9 Raid 10: Mirroring with Striping

RAID 10 is part of a group called nested or hybrid RAID, which means it is a combination of
two different RAID levels. In the case of RAID 10, the array combines level 1 mirroring and
level 0 striping. This RAID array is also known as RAID 1+0.

RAID 10 uses logical mirroring to write the same data on two or more drives to provide
redundancy. If one disk fails, there is a mirrored image of the data stored on another disk.
Additionally, the array uses block-level striping to distribute chunks of data across different
drives. This improves performance and read and write speed as the data is simultaneously
accessed from multiple disks.

To implement such a configuration, the array requires at least four drives, as well as a disk
controller.

Advantages of RAID 10

 High performance.
 High fault-tolerance.
 Fast read and write operations.
 Fast rebuild time.
Disadvantages of RAID 10

 Limited scalability.
 Costly (compared to other RAID levels).
 Uses half of the disk space capacity.
 More complicated to set up.

When Raid 10 Should Be Used

RAID 10 is often used in use cases that require storing high volumes of data, fast read and write
times, and high fault tolerance. Accordingly, this RAID level is often implemented for email
servers, web hosting servers, and databases.

3.10 Non-Standard RAID

The RAID levels mentioned above are considered standard or commonly used RAID
implementations. However, there is a myriad of ways you can set up redundant arrays of
independent disks.

Accordingly, many open-source projects and companies have created their own configurations to
adhere to their needs. As a result, there are many non-standard RAID implementations, such as:

 RAID-DP
 Linux MD RAID 10
 RAID-Z
 Drive Extender
 De-clustered RAID

3.11 Nested (Hybrid) RAID

You can combine two or more standard RAID levels to ensure better performance and
redundancy. Such combinations are called nested (or hybrid) RAID levels.
Hybrid RAID implementations are named after the RAID levels they incorporate. In most cases,
they include two numbers where their order represents the layering scheme.

Popular hybrid RAID levels include:

 RAID 01 (striping and mirroring; also known as “mirror of stripes”)


 RAID 03 (byte-level striping and dedicated parity)
 RAID 10 (disk mirroring and straight block-level striping)
 RAID 50 (distributed parity and straight block-level striping)
 RAID 60 (dual parity and straight block-level striping)
 RAID 100 (a stripe of RAID 10s)

3.12 RAID Implementation Types

There are three ways of utilizing RAID, differing by where the processing takes place.

Hardware-based RAID

When installing the hardware setup, you insert a RAID controller card in a fast PCI-Express slot
on the motherboard and connect it to the drives. External RAID drive enclosures with a built-in
controller card are also available.

Software-based RAID

For the software setup, you connect the drives directly to the computer, without using a RAID
controller. In that case, you manage the disks through utility software on the operating system.

Firmware/Driver-based RAID

Firmware-based RAID (also known as a driver-based RAID) are RAID systems often stored
directly on the motherboard. All its operations are performed by the computer's CPU, not by a
dedicated processor.
Note: If you are setting up hardware RAID, you should consider installing MegaCLI for
managing and communicating with RAID controllers.

Conclusion

RAID is a useful and practical way to speed up server performance and ensure that no data is
lost. Deciding what kind of setup is best for your business greatly depends on your priorities.
Explore all the options and get all the advantages of this powerful tool and technique.
Chapter Four

RAID 1 (Mirror Volume)

4.1 RAID 1 (Mirror Volume) Configuration in Windows Server 2012 R2 from


Disk Management

1. Click server manager on bottom task bar.

2. Point to tools, and then click computer management.


3. Click disk management.

 Expand the storage node. On the view menu, point to top, on the view menu, point to
top, a color-coded graphical view of the disks on the system is displayed point to
button.
4. Right click on disk 1 and select online.
5. Right click on disk 2 and select online.
 A minimum of two disks are needed to support striping. Any disks involved in
striping must be dynamic.
6. Right-click the gray disk description pane that is located to the left and then click convert to
dynamic disk.

7. Select disks and click ok.

 You can install striping on any dynamic disk even if there are mixed drive
architectures on the system. For example, IDE, Enhanced IDE (EIDE), and SCSI
drives can all be used in one striped volume.
8. In the lower-right pane of the disk management tool, right-click the free, unallocated
volume space on either disk.
9. Click new striped volume.

10. After the click striped volume, welcome to the new striped volume wizard starts, click next.
11. In the left pane under all available dynamic disks, click the disk, and then click add.

12. All disks that are displayed in the right pane are labeled selected. Click next.
13. Assign drive letter for your striped volume, click Next.

14. In the volume label box, you can keep the default New Volume label or you can type you
own label (RAID 0). Click to select the Quick Format. Click Next.
15. Check your selection in the Summary window, and then click Finish.

 The striped volumes are displayed on the two disks on your system. They have the
same color code, the same drive letter (if you mapped the drive during the
procedure), and they are both the same size.
 The system used in this example contains three disks number 0, 1 and 2 respectively.
Disk 0 is the system disk and disks 1 and 2 will be used to create a mirrored set.
16. Right-click on disk1 and disk 2 and convert to Dynamic Disk

17. Check disk 1 and 2. Then click Ok.

18. In the lower-right pane of the Disk management tool, right-click the free, unallocated
volume space on either disk.
19. Select New Mirrored Volume.
20. The New Mirrored Volume wizard. Click next on the welcome screen to proceed to the disk
selection screen.

21. A mirrored set must be comprised of two disk drives. Initially, the wizard only lists the
currently selected disk in the selected column. To add a disk to the mirrored set, select a
suitable disk from the available disks in the left hand column and click on Add to it to the
selected disks list with the necessary disks selected click Next to proceed.
22. Assign a drive letter or mount point for the volume. The Next button will then proceed.
23. In the Volume Label box, you can keep the default New Volume label or you can type you
own label (RAID 1). To the Format Volume perform a quick format be selected, and press
the Next button.

24. Assuming the summary is acceptable the Finish button will format the volumes and create
the mirrored volume ready for use.
 RAID is ready and two disks mirroring in one partition.
25. Click the Disk management. Initialize disks cheek all and select MBR and Ok.

You might also like