Introduction The system administration report discusses about the command line tools and the configuration of the system services. The focus is mainly on handling the hardware components of the sever and then work over the troubleshooting in the system. A proper development procedure is set for the effective planning and handling the troubleshooting of the network connectivity. This will help in properly administering the windows server 2012 and explain about the different models and features as well (Lownds et al. 2017). Discussion Task 1: The three different command tools are Zypper, RPM and URPMI. Zypper has been best for the installation and updating the packages which are for the accomplishments of the remote software management tasks and the management of software is mainly done from the shell scripts. Here, the execution is done to type the name with the command (Kadiri, 2016). The syntax for the same is: zypper [global-options]command[command-options] [arguments] ... There are options which are specific for the command with the arguments based on the search pattern. It also asks for the confirmation before working further. URPMI is for the management of the packages and the repositories which could easily be installed, updated and removed with the particular software package. They are effective for the working over the software management where the mirrors are set for the core, non-free and the tainted forms of the software that are subjected to the patent claiming in the different countries.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
RMI command is also for the installation, uninstallation, upgrading and then checking the lists of the queries which are on the LINUX systems. The Red Hat Packet Manager is able to work with the installation through using rpm -ivh with proper package name, version, release and the architecture name as well (Stanek, 2013). Task 2: The five components are: a.The motherboard which is considered to be important electronic circuit board which is able to handle the different components on the computer. b.The processor which is able to handle the overall system performance. Along with this, it works on the proper handling the clock time speed which refers to the basic clock that drives the processor operational ticks as well. c.The memory is rarely to be complained about where the servers have different types of memory which are available. Here, the total capacity is to match with the new servers that can easily support the memory of at least 12 GB and the range can go upto 32GB. d.The hard driver is considered to use IDE drivers where there are individual users for the performance and are important for the servers as well. Here, the performance is based on matching it with the SCSI controller card. The new type of the inexpensive drive is considered to be appearing on the desktop computers which is used more in the server due to better reliability and performance (Stanek, 2013). e.Power supply is also important to be handled so that the system does not lose the connection with the system screen. For this, there is a need for the devices to match up the monitoring without affecting the performance of network.
Task 3: a.They are the work folders which brings the change in functionality of the Dropbox with the corporate servers. Here, the installation also includes the fully functional standards with the secured replication service of the file. With this, there are other releases that tend to support the clients of Windows 8.1. Here, the support for the windows 7 comes with future scope that includes the copies of the files on the server and client end with performing sync operations when the client tends to establish the server connection. b.The desired state configuration is to match with the servers and system administrators to work over the solutions and in-house tools that have been programmatic to establish the baseline of the roles and the features. It is important to monitor and update the system where the requirement of the PowerShell 4.0 is able to work on new cmdlets to accomplish the monitoring and administering with the specific states and standards. c.The storage tiering has been set with the different features which are in Windows Server 2012 R2 that allow the ability to hold the moving of chunks of the stored data between the different storage classes. There are high end storage systems works over the automation process with the operating level system. Microsoft tends to make use of the heat mapping algorithm with determining the chunks of data which is for the activity and automatically working over the hot chunks to the fast tier (Kadiri, 2016). d.The storage pinning pins over the selected files with the specific tier. Here, there is a need to ensure that the files are pinning with the boot disks on the virtual desktop infrastructure deployment. The files are important for the SSD which is then moved to the HDD tier after there is a periodic inactivity standard. The data duplication in Windows Server 2012 works over the features where the limitations are related to the
VDI deployment that works on the new capability includes the overall effectiveness with the deduplications, with boot performance of virtual desktops. e.The write back cache need to create the proper storage of the volume in Windows Server 2012 R2 where there are options to enable the standards of physical storage. Here, the fast SSD need to make use of writing cache to help the smooth functioning with the ups and downs at the time of writing intensive operations. There is different database scenario with the large volume of disks which writes and tends to exceed with the ability to drive the controller and disks to keep up. The cache has been for the elimination of any pauses which are caused by the overwhelming storage system. Task 4: The virtualisation works over the new challenge with addressing the capacity for the organisation. The capacity management works on enabling and making sure the adequate resources with computing, storage, network etc. The business, time and minimised possible cost to the organisation. The enterprise works on the changing requirements with the cloud capacity modelling which is planned and challenging (Ostermann et al., 2009). The enterprise works on embracing the private cloud model to run with the IT infrastructure with the specific capacity challenges. The needs are important for the effective and cost model with increased penetration of mobile devices in enterprise that tends to work over computing the resources (Mell et al., 2011).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Consumption of the trends over the time. The virtual infrastructure works over the responsibility with capacity planning to execute the planning and the changes with the “just in time” basis. There is virtual environment at the fingertips where the complexity of the virtualised environment approach is set with the lining charts that could be for modelling the resource usage and consumption over the time (Armbrust et al., 2010). The usage of the trends, there is a need to focus on the VMWare vCenter Operations which could help. The operations are important to work over helping the capacity helpers to understand the historical trends and environmental behaviours (Qian et al., 2009).
The standards are set for the empowering of the IT administrator with adaptable response to the resource demands and supply fluctuations. The converged infrastructure allows the IT organisation to integrate the servers, storage and then worked on the shared pools of reusable physical resources to support pools of virtual resources (Li et al., 2009). The complexity associated with the management of the infrastructures tend to work with the resources with higher degree of business agility. The effectiveness is based on the implementation with the minimum service costing (Buyya et al., 2009). The organisation works over the financial components to deliver the IT services where the leveraging is for the self-service activities that allow the enterprise to begin with the IT services. The true IT costs works on helping with IT practitioners that tends to obtain the visibility into the true cost of virtualised workloads. The encouragement standards are set for the end-user responsibility with self-service to provide the
cloud and help in eliminate the free virtual machines. This is in-line with the business needs to match the costs. The capacity planning need to focus on capacity increment that aligns with the business needs as well. The analysis is based on infrastructure where there are large, medium and the small virtual machines to handle the physical server with proper support (Armbrust et al., 2009). It also includes the prediction of the pain points with the VMs that tend to utilise the CPU with the proper storage of the I/O and the memory of physical server. The fall is on the administer to predict the issues based on the metrics with the hosts, VMs and the data storage. Task 5: a.The ping is considered as the network tool where the focus is on the basic connectivity test between the requesting and the destination host. This is mainly through the Internet Control Message Protocol where the ability is to send echo packet for the response from the host. b.Tracer and the traceroute is set to determine the path to the destination host which includes the route of the packet. c.Ipconfig works over the networking issues with the specific config that works over the addressing of configuration statistically with the dynamic addressing methods. The utility on Windows machines and the ipconfig utility on Linux based machines (Stanek, 2013). d.NsLookup works over the networking issues with DNS address resolutions. They are set for the use of the internet to resolve the domain names and work over the functionality with people who tend to make use of resolving the information. The nslookup utility is about the query specific DNS servers is to determine the issues with the default DNS servers which are configured on the hosts.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
e.Netstat works on the figuring out of the active network connections. Here, the information is about finding the different reasons and verifying the status of listening port over the hosts or the check. The remote hosts are generally connected to the local hosts with the specific port. This is also important and possible to use the netstat utility for determine the services on the hosts which are associated to the specific active ports. Task 6: a.IAAS model: This is about the representation of the IT environment which includes the proper access and the management through the cloud service based interface and the tools. They are set for the environment which includes the proper network, hardware and the connectivity (Langone et al., 2016). The general focus is on the cloud consumers with the proper higher level of control and responsibility which is mainly to match with the configuration and placing the administrative responsibility upon the customer. The model is also used by the cloud consumers to work with the higher level of control with the cloud based environment setup (Stanek, 2013). b.PaaS works over the pre-defined with the ready to use environment with the deployment and the configuration of the IT resources. The reliability is on the usage with ready-made environment to establish the pre-packaged products to support the entire delivery lifecycle. The cloud consumer works over the extension on-premise environment into the cloud for the scalability and the economic purpose. The use is mainly for the ready-made environment works on the substitutions of the on-premise environment. The cloud consumer works over the cloud provider and deployment of the cloud services which works over the ready-made platform (Foster et al., 2008). The cloud consumer need to
work on the administrative burden and maintaining the infrastructure IT resources through the IaaS model. c.SaaS works on the positioning with the sharing of the cloud services that has been for the product and the generic utility. The representation works over the entity that controls the cloud service with the ownership role. The organisation needs to work over the cloud consumer with using and working over the PaaS environment that could be helpful to build the cloud service (Buyya et al., 2008). The decision is about the deployment in the same environment with the SaaS offering. The organisation effects the cloud provider role with the SaaS based cloud service that has been available to the other organisations with the cloud consumers using the cloud services. Conclusion The standards are set with the cloud computing features where the standards are to check over the different sources and standards. The Windows Server 2012 takes hold of the system along with providing a complete leverageof system setting. The standards are set to meet the system administration along with working over the cloud computing.
References Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., ... & Zaharia, M. (2009).Above the clouds: A berkeley view of cloud computing(Vol. 17). Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... & Zaharia, M. (2010). A view of cloud computing.Communications of the ACM,53(4), 50-58. Buyya, R., Yeo, C. S., & Venugopal, S. (2008, September). Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities. InHigh Performance Computing and Communications, 2008. HPCC'08. 10th IEEE International Conference on(pp. 5-13). Ieee. Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility.Future Generation computer systems,25(6), 599-616. Foster, I., Zhao, Y., Raicu, I., & Lu, S. (2008, November). Cloud computing and grid computing 360- degree compared. InGrid Computing Environments Workshop, 2008. GCE'08(pp. 1-10). Ieee. Kadiri, H. (2016). Remote Desktop Services Windows Server 2012 R2: Design, Deployment and Management (Volume 1). Langone, J., Key, S., & Alder, U. S. (2016). Release: Windows Server 2016 with support for Window Server & Hyper-V containers. Li, H., Dai, Y., Tian, L., & Yang, H. (2009). Identity-based authentication for cloud computing.Cloud computing, 157-166. Lownds, P., Nemnom, C., & Carvalho, L. (2017). Windows Server 2016 Hyper-V cookbook: save time and resources by getting to know the best practices and intelligence from industry experts. Mell, P., & Grance, T. (2011). The NIST definition of cloud computing.