the imperial college of australia |
Install & Manage A Server |
ICTNWK401 |
|
Muhammad Usman |
Contents
AssignmentTutorOnlineOverview of Deployment Environment 3
Host-based file-level migration 6
Server Installation Deployment Plan: 8
Different OS Server’s Installation 11
Server 2008 R2 Installation: 12
Server Configuration & Connection 13
EXECUTIVE SUMMARY
This project is undertaken in real IT professional environment. All the proper tools are used to make sure performance and ability standards to meet client requirements.
Appointment:
As a professional consultancy service’s requirement, appointment was fixed with clients to confirm installation procedure and requirements planning before deploying. All the necessary information and aspects of process were discussed under criteria and circumstances.
Members:
- Usman
- Client
Timing:
Meeting between
client and server installation planner was held on 15th of
Feb, 2019.
Time: 11:00
Plan
Overview of Deployment Environment
Company has multiple UNIX business applications running on multiple application servers. All servers are located in single office. Users Can Be Local, remote or mobile.
Server installation is required to be done in Main office of Client in 2 Different Computers with different operating systems.
- Windows Xp ( System 1)
- Windows 7 ( System 2)
There are various types of servers, available in IT industry having different properties from each other and are used to install on basics requirements or environment.
MS Server 2008 Common Types Are;
- Single Application Server
- Multi-Application Server
- Multiple X Application Server
System 1
Elements | Capacity |
OS | Windows Xp |
RAM | 2GB |
HDD | 250 GB |
VGA | 512MB |
Processor | IBM Core 2 Duo |
Type | Desktop |
Installation Scale:
Scale-out involves running an Enterprise Server for .NET installation across multiple, clustered machines:
- The setup uses a single Microsoft SQL Server installation that operates on one or more machines.
- Setting up an installation to run on multiple machines.
- Setting up network load balancing to define the cluster.
- Configuring the service endpoints, that is configuring the locations of the various Enterprise Server for .NET services operating on the cluster machines, so that they can communicate with each other.
- Configuring network load balancing to handle distribution of traffic.
Preference Option:
- Server 2, Multi-Application Server
Properties
Exceed Connection Server supports Gateway connection configuration. In this configuration, Exceed Connection Server and X applications are housed in spate machines. This server will act as a gateway between client PCs and those application servers. This configuration will provide the following benefits.
-
Less
Administrative Overhead
- No need to manage multiple files configurations.
-
Non-Intrusive
in critical line of business applications
- Don’t have to share system resources
-
Highly
Scalable
- The Open Text managed application access solution can easily scale by forming an Exceed Connection Server Cluster.
- Company can enjoy the benefits of automatic load balancing and fail-over protection.
Other Features
- Delivers high performance over any network connection
- Improves user productivity be offering the ability to suspend and resume Exceed on Demand sessions.
- Safeguards Exceed on Demand sessions through the built-in crash and resume feature
- Enables project collaboration with desktop sharing and session shadowing feature
- Centralize control of application access and license usage
Data Migration
Host-based file-level migration
This open source tool has been around for a long time and distinguishes itself by being very simple, yet powerful, and totally host- and storage-agnostic. Rsync is very flexible and can be adapted to almost every data migration need, but it shines especially brightly with largely static unstructured content.
Back-Up Requirements:
For back up , following tool is requirement;
- Back Up Agent
System Requirements
Hardware
Hardware | Requirements |
Physical Memory | Minimum 512 MB |
Free Disk Space |
Minimum 256 GB 15%+ free space on protected drives is recommended to maintain point-in-time snapshots during replication. |
Primary Storage Types |
Directly Attached Storage Including: IDE, SATA, SCSI, SAS, ISCSI, Fibre Channel, Dynamic Disks (Software RAID), Hardware RAID, Solid State Drives (SSD) |
File Systems | NTFS (512 byte – 64 KB cluster sizes) |
Virtualization | MS Hyper-V, Xen Source Hypervisor, Oracle Virtual Box |
Recovery Requirements
Data Recovery Tool
Following tools are Suitable More for Recovery purposes For installation of Server in Different OS.
Recuva
Recuva is a user-friendly Windows-based tool. When you run Recuva, you can resurrect missing files using either the file-recovery wizard or the application’s manual mode.
Pandora Recovery
With a free version for recovering data from secondary drives, and a pay version you can put on a USB key to recover an operating system drive, Pandora Recovery has a versatile offering that can bring back most data without issue.
PC INSPECTOR File Recovery
Completely free, PC INSPECTOR File Recovery is a great recovery tool for Windows systems. It can recognize data types even when the header is missing, so you can recover from deletions, formatting, or even total volume loss.
PC INSPECTOR Smart Recovery
Also free, Smart Recovery is a tool focused on recovery files from external media, like flash drives and SD cards. It’s a bit older than File Recovery, but still works great and can handle proprietary file formats.
Free Undelete
The name of this tool from Office Recovery says it all. It’s free for personal use, and it undeletes files that you have deleted, even if you SHIFT-DEL or empty the Recycle Bin. What it lacks in fancy features it more than makes up for in efficiency and simplicity.
Recommendation:-
Recuva:-
As Recuva is a user-friendly Windows-based tool.
Training
Following Training Strategy is necessary to be placed.
- Training Delivery Technology
- Training the Technical Staff
- Systems Administrator Training
- LAN Administration
- Operating System Issues
- Application Issues
Server Installation Deployment Plan:
1. Name according to naming standard
2. Install operating system
3. Install OS patches
4. Configure network settings
5. Configure necessary services and disable unnecessary services, ports and protocols
6. Disable unneeded accounts such as Guest
7. Configure time server to point to DC using GPO.
8. Configure event logging to corporate standard
a. If server is placed in existing AD server OU then GPO will ensure appropriate event logs are created. This GPO includes the following settings:
i. Log file size sufficient for 7 days worth of records,
ii. Server will shut down if unable to write log records,
iii. Log audit event for create, read, update and delete events of protected information,
iv. Log audit event for execution of any privileged function,
v. Log audit event for management activities including system startup/shutdown and security policy changes.
9. Install Oracle virtual box tools if virtual or HPtools if physical
10. Add to HP IRS if physical
11. Document IP address
12. Add to server inventory
13. Install AV, update signatures and place in correct group in AV Manager
14. Join to domain
15. Place in correct OU in AD
16. Configure RDP security
17. Configure windows updates
18. Add to backup schedule
19. Add to Log monitoring
20. Add to vulnerability scanner
Part B
System Downtime
System downtime is not defined actually. Ideally it is 0 but depends on clients requirements that how much he can afford to maintain server’s and systems stability. For multiple application servers, it should Be 9s as a standard Measurement.
Different OS Server’s Installation
System 2
Elements | Capacity |
OS | Windows 7 |
RAM | 2GB |
HDD | 250 GB |
VGA | 512MB |
Processor | IBM Core 2 Duo |
Type | Desktop |
Server 2008 R2 Installation:
These steps describe the installation of Windows Server 2008 R2 Enterprise (Full Edition).These steps are included to demonstrate ground-up installations of an Infinity application in a two machine and three machine scenario.
- Insert the installation media for Windows Server 2008 R2.
- After the installer runs, the Install Windows screen appears. Enter language and other preferences.
- Click Next. Click Install now. The setup begins.
- The installer prompts to select an operation system.
- Select Windows Server 2008 R2 Enterprise (Full Installation) and click Next.
- The installer prompts to read the license terms.
- Read the license terms. If you agree to the license terms, select I accept the license terms and click next.
- The installer asks you which type of installation. For a new installation, click Custom (advanced).
- The installer asks for disk location information. Make your selection and click next.
- The installation begins.
- The installer prompts to change the password. Click OK.
- Enter a new password, re-enter the password to confirm it, and click the right-arrow.
After you click OK on the confirmation screen, the operating system prepares your desktop.
Server Configuration & Connection
Configuration Required:- WebSphere Application Server
Server 2008 is installed in premises and as per Client’s Requirement, WebSphere Application Server configuration Can be Performed along with following steps.
- Install Installation Manager on Machine A and Machine B.
- Use Installation Manager to install WebSphere Application Server Network Deployment on Machine A.
- Create the first application server profile using the Profile Management Tool on Machine A.
-
Use
Installation Manager to install the following on Machine B.
- Web Server Plug-ins for WebSphere Application Server
- Websphere Customization Toolbox
- Use Installation Manager to install the IBM HTTP Server on Machine B, or install another supported web server on Machine B.
- Open the WebSphere Customization Toolbox, and launch the Web Server Plug-ins Configuration Tool on the machine with the web server.
- Select a web server plug-in runtime location.
If the location of a previously installed web server that you want to use is not in the list, perform the following actions to add the location to your working set:
- Click Add.
- Enter a name for the web server plug-in location.
-
Perform
one of the following actions:
- Enter the location.
- Click Browse, find the location, and click OK.
Following Procedures Are Done in Stimulated workplace for Server’s Installation;
- Server Installed Successfully in 2 different OS.
- Configured and Connected according to finalized plan with Client
- Security, malware detection and Systems stability Tested and Approved
- Log-in created for multiple users and Guidelines provided to help out and explain structure of design.
Server is than successfully configured and connected and tested for performance and malware security. Log in Files are created separately for users who are authorized and hand book created to help out users as Access Documentation.
Project Sign-Off
Install & Manage A Server
Created by:- Usman
.
Project: Install & Manage A Server | |
This
document has been issued by: Usman
| Date Issued:15/02/2019 |
The Project Outcome has been measured against its acceptance criteria and has been formally accepted on behalf of the customer. The project may now be closed. | |
Additional Comments about the Client’s Acceptance: | |
| |
Recorded Shortfalls of the Final Project Outcome (if any): | |
| |
Executive Client: Project Manager: |
Signature: _________________________ Name: _________________________ Date: _________________________ Signature: _________________________ Name: _________________________ Date: _________________________ Signature: _________________________ Name: _________________________ Date:_________________________ |