Title: Chapter 1 Introduction to Computers and C Programming
1CS 56
Chapter 10 Ensuring Network Security
Sonny Huang
2Chapter 10 Ensuring Network Security
- Outline
- Making Networks Secure
- Maintaining a Healthy Network Environment
- Avoiding Data Loss
3Making Networks Secure
- Planning for Network Security
- A. Overview
- 1. In a network environment, there must be
assurance that sensitive data will remain
private. - 2. It is equally important to protect network
operations from deliberate or unintentional
damage. - 3. Requires a balance between facilitating easy
access to data by authorized users and
restricting access to data by unauthorized users.
4Making Networks Secure
- 4. Four major threats to the security of data on
a network are - a. Unauthorized access
- b. Electronic tampering
- c. Theft
- d. Intentional or unintentional damage
- 5. Data security is not always implemented or
supported properly. - 6. It is the administrators task to ensure that
the network remains reliable and secure, free
from those threats.
5Making Networks Secure
- Most attacks on networks take place from within
company walls. Many security plans address only
attacks from outside. Teach users how to protect
against viruses, as well as intruders.
6Making Networks Secure
- B. Level of Security
- 1. Extent and level depend on the type of network
environment. - 2. Banks require more extensive security than a
LAN that links the computers in a small community
organization.
7Making Networks Secure
- C. Setting Policies
- 1. Overview
- a. Securing a network requires establishing a set
of rules, regulations, and policies so that
nothing is left to chance. - b. Implement policies that set the tone and help
to guide the administrator and users through
changes. - 2. Prevention
- a. Best way to design data security policies is
to take a proactive, preventative approach. - b. When unauthorized access is prevented, data
remains secure.
8Making Networks Secure
- c. Administrator must understand the tools and
methods available to keep data safe. - 3. Authentication
- a. A user must enter a valid user name and
password. - b. A password authentication system is the first
line of defense against unauthorized users. - c. Do not let overreliance on this authentication
process lull you into a false sense of security. - d. Authentication works only in a server-based
network in which the user name and password must
be authenticated from the security database.
9Making Networks Secure
- D. Training
- 1. Unintentional errors lead to security
failures. - 2. Knowledgeable users are less likely to cause
an accidental error and ruin a resource by
permanently corrupting or deleting data than a
novice user. - 3. Administrator should ensure that everyone who
uses the network is familiar with its operating
and security procedures. - 4. Develop a short, clear guide to what users
need to know, and require that new users attend
appropriate training classes.
10Making Networks Secure
- E. Securing Equipment
- 1. Overview
- a. Keep data safe by ensuring the physical
security of the network hardware. - b. Extent of security required depends on
- (1) Size of the company
- (2) Sensitivity of the data
- (3) Available resources
- c. In a peer-to-peer network, users are usually
responsible for the security of their own
computers and data.
11Making Networks Secure
- d. In a server-based network, security is the
responsibility of the network administrator. - Â
- It is a good idea to lock the computer room so
that not even the cleaning staff can get into the
room. Untrained people with physical access can
cause a range of network difficulties. At a
minimum, lock keyboards. The degree of security
established and maintained depends on the
sensitivity of the organizations data and the
resources available for protecting it.
12Making Networks Secure
- 2. Securing the Servers
- a. Secure the servers from accidental or
deliberate tampering. - b. Tactfully prevent unauthorized people from
fixing the server. - c. Lock the servers in a dedicated computer room
with limited access.
13Making Networks Secure
- 3. Securing the Cables
- a. Copper media, such as coaxial cable, emit
electronic signals that mimic the information the
cable carries like a radio. - b. These signals can be monitored with electronic
listening equipment. - c. Copper cable can also be tapped so that
information can be stolen directly from the
original cable. - d. Cable runs that handle sensitive data should
be accessible only to authorized people. - e. Proper planning can make cable runs
inaccessible to unauthorized people.
14Making Networks Secure
- Security Models
- A. Overview
- 1. Administrator needs to ensure that the network
resources will be safe from both unauthorized
access and accidental or deliberate damage. - 2. Policies for assigning permissions and rights
to network resources are at the heart of securing
the network. - 3. Two security models have evolved for keeping
data and hardware resources safe - a. Password protected shares (share-level
security). - b. Access permissions (user-level security).
15Making Networks Secure
- B. Password Protected Shares
- 1. Simple security method that allows anyone who
knows the password to obtain access to that
particular resource. - 2. Requires assigning a password to each shared
resource. - 3. Access to the shared resource is granted when
a user enters the correct password. - 4. Resources can be shared with different types
of permissions Read Only, Full, and Depends on
Password.
16Making Networks Secure
- Shares are available on FAT and NTFS partitions.
Share-level passwords protect directories, not
individual files. - Â
- C. Access Permissions
- 1. Overview
- a. Involves assigning certain rights on a
user-by-user basis. - b. User types a user name and password when
logging on to the network. - c. Server validates this user name and password
combination and uses it to grant or deny access
to shared resources by checking access to the
resource against a user access database.
17Making Networks Secure
- d. Provides a higher level of control over access
rights. - e. Because user-level security is more extensive
and can determine various levels of security, it
is usually the preferred model in larger
organizations. - Â
- User-level passwords protect directories and
their files individually.
18Making Networks Secure
- 2. Resource Security
- a. After the user has been authenticated and
allowed on the network, the security system gives
the user access to the appropriate resources. - b. Users have passwords resources have
permissions. - c. Administrator determines which users are
members of which groups. - d. Permissions control the type of access to a
resource.
19Making Networks Secure
- e. Windows NT Server Permissions.
- (1) Read Reads and copies files in the shared
directory. - (2) Execute Executes (runs) the files in the
directory. - (3) Write Creates new files in the directory.
- (4) Delete Deletes files in the directory.
- (5) No Access Prevents the user from gaining
access to directories, files, or resources.
20Making Networks Secure
- Different NOSs give different names to these
permissions.
21Making Networks Secure
22Making Networks Secure
- 3. Group Permissions
- a. Administrator assigns each user the
appropriate permissions to each resource. - b. Most efficient way to manage permissions is to
use groups. - c. Use Windows NT Explorer to set permissions.
- d. Permissions for groups work in the same way as
for users. - e. Administrator reviews which permissions are
required by each account and assigns the accounts
to the proper groups.
23Making Networks Secure
- Windows NT Server allows users to select the
file or folder for which they want to set group
permissions. - Â
- Â
-
Windows NT Explorer is used to set permissions
24Making Networks Secure
- The group Everyone has been granted Read access
to the directory public. This allows members of
the group Everyone to read, but not delete or
modify, the files in the public directory. - Â
- Â
-
25Making Networks Secure
- Assigning users to appropriate groups is more
convenient than having to assign separate
permissions to every user individually. - Â
- Â
- Video Note c10dem01 video shows a presentation
of share-based and server-based network security.
26Making Networks Secure
- Security Enhancements
- A. Firewalls
- 1. Security systems are usually a combination of
hardware and software intended to protect an
organizations network against external threats
coming from another network. - 2. Audit and record the volume of network traffic
and provide information about unauthorized access
attempts. - 3. Incoming and outgoing communication is routed
through a proxy server outside the organizations
network.
27Making Networks Secure
- 4. Proxy server determines file access to the
organizations network. - 5. Proxy server filters and discards requests
not consider appropriate, including requests for
unauthorized access to proprietary data. - Â
- A proxy server is a firewall component that
manages Internet traffic to and from a LAN.
28Making Networks Secure
- B. Auditing
- 1. Reviewing records in the security log of a
server is called auditing. - 2. Tracks network activities by user accounts.
- 3. Should be a routine element of network
security. - 4. Helps administrators identify unauthorized
activity. - 5. Records can indicate how the network is being
used.
29Making Networks Secure
- 6. Auditing can track functions such as
- a. Logon attempts
- b. Connection and disconnection from designated
resources - c. Connection termination
- d. Disabling of accounts
- e. Opening and closing of files
- f. Changes made to files
- g. Creation or deletion of directories
- h. Directory modification
- i. Server events and modifications
- j. Password changes
- k. Logon parameter changes
30Making Networks Secure
- C. Diskless Computers
- 1. No floppy drives or hard disks.
- 2. Can do everything a computer with disk drives
can do except store data on a local floppy disk
or hard disk. - 3. Ideal choice for maintaining security because
users cannot download data and take it away. - 4. Do not require boot disks.
- 5. Communicate with the server and log on by
means of a special Read Only Memory (ROM) boot
chip installed on the computers NIC. - 6. When the computer is turned on, the ROM boot
chip signals the server that it is ready to start.
31Making Networks Secure
- 7. Server responds by downloading boot software
into the diskless computers RAM and
automatically presents the user with a logon
screen as part of the boot process. - 8. After the user logs on, the computer is
connected to the network. - 9. All computer activity must be conducted over
the network traffic will increase accordingly. - 10. Network must be capable of handling
increased demands.
32Making Networks Secure
- D. Data Encryption
- 1. Data Encryption Basics
- a. Data encryption utilities scramble data before
it goes onto the network. - b. Makes the data unreadable even by someone who
taps the cable and attempts to read the data as
it passes over the network. - c. When the data arrives at the proper computer,
the code for deciphering encrypted data decodes
the bits, translating them into understandable
information.
33Making Networks Secure
- d. Advanced data encryption schemes automate both
encryption and decryption. - e. Best encryption systems are hardware-based and
can be expensive.
34Making Networks Secure
- 2. Data Encryption Standards (DES)
- a. Traditional standard for encryption developed
by IBM and adopted in 1975 as a specification for
encryption by the U.S. government. - b. System describes how data should be encrypted
and provides the specifications for the key to
decryption. - c. U.S. government continues to use DES.
- d. Both the sender and receiver need to have
access to the decryption key. - e. The only way to get the key from one location
to another is to physically or electronically
transmit it, which makes DES vulnerable to
unauthorized interception.
35Making Networks Secure
- 3. Commercial COMSEC Endorsement Program (CCEP)
- a. Newer standard that may eventually replace
DES. - b. CCEP introduced by National Security Agency
(NSA) and allows vendors with the proper security
clearance to join. - c. Approved vendors are authorized to incorporate
classified algorithms into communications systems.
36Making Networks Secure
- Computer Viruses
- A. Overview
- 1. Becoming more common.
- 2. Bits of computer programming, or code, that
hide in computer programs or on the boot sector
of storage devices. - 3. Primary purpose of a virus is to reproduce
itself as often as possible and thereby disrupt
the operation of the infected computer or the
program. - 4. A simple annoyance or completely catastrophic
in its effect. - 5. Written with an intent to do harm.
37Making Networks Secure
- 6. Boot Sector Virus
- a. Resides in the first sector of a floppy disk
or hard disk drive. - b. Executes when computer boots.
- c. Common method of transmitting viruses from one
floppy disk to another. - 7. File Infector Virus
- a. Attaches itself to a file or program.
- b. Activates any time the file is used.
38Making Networks Secure
- 8. Common File Infectors
- a. Companion Virus So named because it uses the
name of a real program. - b. Macro Virus Difficult to detect and is
becoming more common written as a macro for a
specific application. - c. Polymorphic Virus Changes its appearance
every time it is replicated. - d. Stealth Virus To hide from detection, it
returns false information to antivirus programs. - Â
- Keep virus detection data up-to-date. New viruses
appear daily.
39Making Networks Secure
- B. Virus Propagation
- 1. An exchange between two computers must take
place before transmission of the virus occurs. - 2. In the early days, the principal source of
infection was through the exchange of data on
floppy disks. - 3. Proliferation of LANS and growth of the
Internet have opened many new pathways to rapidly
spreading viruses. - 4. Some virus creators provide easy-to-use
software containing directions for how to create
a virus. - 5. An emerging method of spreading a virus is
through e-mail services.
40Making Networks Secure
- 6. A virus can be located in an inviting
attachment to an e-mail message. - 7. A Trojan Horse virus is packaged inside an
enticing cover. - 8. Common ways computers exchange information
include - a. CD-ROMs
- b. Cables directly connecting two computers
- c. Floppy disk drives
- d. Hard disk drives
- e. Internet connections
- f. LAN connections
- g. Modem connections
- h. Portable or removable drives
- i. Tape
41Making Networks Secure
- C. Consequences of a Virus
- 1. Common symptoms of computer virus infection
- a. Computer will not boot.
- b. Data is scrambled or corrupted.
- c. Computer operates erratically.
- d. A partition is lost.
- e. Hard drive is reformatted.
- 2. Peer-to-peer network
- a. All things are shared equally.
- b. Any infected computer has direct access to
any computer or resource that is shared to the
network.
42Making Networks Secure
- 3. Server-based networks
- a. Some have built-in protection because
permission is required to obtain access to some
portions of the server and, therefore, the
network. - b. More likely that a workstation will be
infected than a server, although servers are not
immune. - c. As the conduit from one computer to another,
the server participates in the transmission of
the virus, even though it might not be affected.
43Making Networks Secure
- D. Virus Prevention
- 1. Effective antivirus strategy is an essential
part of a network plan. - 2. Good antivirus software is essential.
- 3. Virus protection software can do some of the
following - a. Warn of a potential virus.
- b. Keep a virus from activating.
- c. Remove a virus.
- d. Repair some of the damage caused by a virus.
- e. Keep a virus in check after it activates.
- 4. Preventing unauthorized access to the network
is one of the best ways to avoid a virus.
44Making Networks Secure
- 5. Some standard preventive measures are
- a. Passwords to reduce the chance of
unauthorized access. - b. Well-planned access and privilege assignments
for all users. - c. User profiles to structure the users network
environment, including network connections and
program items that appear when the user logs on. - d. A policy that sets out which software can be
loaded. - e. A policy that specifies rules for
implementing virus protection on client
workstations and network servers. - f. Ensuring that all users are informed about
computer viruses and how to prevent their
activation.
45Maintaining a Healthy Network Environment
- Computers and the Environment
- A. Negative environmental impacts on electronic
equipment, while not always dramatic, do exist. - B. Slow and steady deterioration process can
lead to intermittent but increasingly more
frequent problems until a catastrophic system
failure occurs. - C. By recognizing these problems before they
occur and taking appropriate steps, one can
prevent or minimize such failures.
46Maintaining a Healthy Network Environment
- D. Computers and network equipment require
specific environments in order to function
properly. - E. Most computers are installed in
environmentally controlled areas even with such
controls in place, computers are not immune from
the effects of their surroundings. - F. When accessing how environmental conditions
will affect a computer network, the first step is
to consider the climatic conditions of the
region. - G. Different climatic circumstances require
different steps be taken to ensure that the
environment does not negatively affect the
network.
47Maintaining a Healthy Network Environment
- H. Environmental conditions for computers are
assumed to be the same as prevailing office
conditions. - I. Environmental factors can affect network
wiring that often runs through walls and in
ceilings, basements, and sometimes outside. - J. Think in terms of the global (entire) network,
visible or out of sight, and not just the local
components. - K. Environmentally triggered disasters are
usually the result of a long period of slow
deterioration, rather than a sudden catastrophe.
48Maintaining a Healthy Network Environment
- Creating the Right Environment
- A. Overview
- 1. The network administrator creates policies
governing safe practices around network
equipment, and implements and manages an
appropriate working environment for the network. - 2. Electronic equipment is designed to operate
within the same range of temperature and humidity
that feels comfortable to human beings.
49Maintaining a Healthy Network Environment
- B. Temperature
- 1. Electronic equipment generates heat during
normal operation, and it usually has a cooling
fan designed to maintain the temperature within
the specified limits. - 2. An environment in which the temperature is
constantly cycling between hot and cold presents
the worst scenario for electronic equipment. - 3. Extreme changes cause metal components to
expand and contract, which eventually may lead to
equipment failure.
50Maintaining a Healthy Network Environment
- C. Humidity
- 1. High humidity promotes corrosion.
- 2. Corrosion can increase the resistance of
electrical components, occurring first on
electrical contacts. - 3. Corroded contacts on expansion cards and cable
connections will cause intermittent failures. - 4. Most equipment will function adequately
between 50 and 70 percent relative humidity. - 5. Control temperature and humidity in the server
room. - Â
- In environments with low humidity, take extra
care to avoid static electricity.
51Maintaining a Healthy Network Environment
- D. Dust and Smoke
- 1. Dust is electrostatically attracted to
electronic equipment. - 2. Dust acts as an insulator that affects the
cooling of components. - 3. Dust can hold electrical charges, making them
conductive. - 4. Smoke coats the surfaces of electronic
components, acting as both insulator and
conductor. - 5. Smoke residue also enhances the accumulation
of dust.
52Maintaining a Healthy Network Environment
- E. Human Factors
- 1. Few employees have any awareness of the
ventilation requirements for computer equipment
they impede the natural flow of air in and around
the equipment. - 2. Spilling of liquid refreshments takes a toll
on keyboards and computers. - 3. Space heaters can overheat computers.
- 4. Space heaters can overload the power outlets,
tripping circuit breakers, or even causing fires.
53Maintaining a Healthy Network Environment
- F. Hidden Factors
- 1. Because we do not see these hidden elements on
a daily basis, we assume that all is well until
something goes wrong. - 2. Wiring is one network component that can cause
problems, especially wires lying on the floor. - 3. Wires that run through an attic can easily be
damaged by accident during repairs to other
objects in the attic. - 4. Bugs and rodents of all kinds are another
hidden factor. - Â
- Video Note c10dem02 video shows a presentation
of how environmental factors affect computers,
servers, and networks.
54Maintaining a Healthy Network Environment
- G. Industrial Factors
- 1. Computers in Manufacturing.
- a. Entire manufacturing process can be monitored
and controlled from a central location. - b. Equipment can even contact telephone
maintenance personnel at home when there is a
problem. - c. Manufacturing environments often have little
or no control over temperature and humidity. - d. Atmosphere can be contaminated with corrosive
chemicals. - e. Manufacturing environments that utilize heavy
equipment with large electrical motors can wreak
havoc on the stability of computer-operated
systems and networks.
55Avoiding Data Loss
- Data Protection
- A. A site disaster is defined as anything that
causes loss of data. - B. Many large organizations have extensive
disaster recovery plans to maintain operations
and rebuild after a natural disaster such as an
earthquake or a hurricane. - C. Many include a plan to recover the network.
- D. Disaster recovery for a network goes beyond
the replacing of the physical hardware the data
must be protected as well.
56Avoiding Data Loss
- E. Causes of a network disaster include
- 1. Component failure
- 2. Computer viruses
- 3. Data deletion and corruption
- 4. Fire caused by arson or electrical mishaps
- 5. Natural disasters, such as lightning, floods,
tornadoes, and earthquakes - 6. Power supply failure and power surges
- 7. Theft and vandalism
57Avoiding Data Loss
- F. Downtime spent recovering data from backup
storage (if backups exist) could result in a
serious loss of productivity. - G. Without backups, the consequences are even
more severe, possibly resulting in significant
financial losses. - H. To prevent or recover from data loss
- 1. Tape backup systems.
- 2. Use an uninterruptible power supply (UPS).
- 3. Build fault tolerant systems.
- 4. Use optical drives and disks.
58Avoiding Data Loss
- Any or all of these approaches can be used,
depending on how valuable the data is to the
organization budget constraints may also limit
security protection. - Â
- Tape Backup
- A. Overview
- 1. Simplest, most inexpensive way to avoid
disastrous loss of data is to implement a
schedule of periodic backups with storage
offsite. - 2. First line of defense against data loss.
- 3. A secure backup strategy minimizes the risk of
losing data.
59Avoiding Data Loss
- 4. To back up data requires
- a. Appropriate equipment.
- b. Regularly scheduled backups.
- c. Ensuring that backup files are current.
- d. Personnel assigned to make sure this schedule
is carried out. - 5. Any expense incurred from equipment costs is
likely to be minimal compared to the value of
what will be saved in the event of data loss. - Â
- Backups are the traditional method for data
recovery, and the first line of defense. Some
NOSs come with scheduling software that allows
for automatic after-hour backups.
60Avoiding Data Loss
- B. Implementing a Backup System
- 1. If you cant get along without it, back it
up. - 2. Whether you backup entire disks, selected
directories, or files depends on how fast you
will need to be operational after losing
important data. - 3. Critical data should be backed up according
to daily, weekly, or monthly schedules, depending
on how critical the data is and how frequently it
is updated. - 4. Schedule backup operations during periods of
low system use. - 5. Users should be notified when the backup will
be performed so that they will not use the server
during backup operations.
61Avoiding Data Loss
- C. Selecting a Tape Drive
- 1. Determine how much data needs to be backed up.
- 2. Determine the network requirements for backup
reliability, capacity, and speed. - 3. Assess the cost of the tape drive and related
media. - 4. Assess the tape drives compatibility.
- Ideally, a tape drive should have more than
enough capacity to back up a networks largest
server. It should also provide error detection
and correction during backup and restore
operations.
62Avoiding Data Loss
- D. Backup Methods
- 1. Full backup Backs up and marks selected
files, whether or not they have changed since the
last backup. - 2. Copy Backs up all selected files without
marking them as being backed up. - 3. Incremental backup Backs up and marks
selected files only if they have changed since
the last time they were backed up. - 4. Daily copy Backs up only those files that
have been modified that day, without marking them
as being backed up. - 5. Differential backup Backs up selected files
only if they have changed since the last time
they were backed up, without marking them as
being backed up.
63Avoiding Data Loss
- Another effective method is to schedule
streaming backups throughout the day. A low cost
technique that achieves highly reliable storage
and retrieval of data, it is useful when a steady
supply of data is required by a particular
application or computer.
64Avoiding Data Loss
- E. Testing and Storage
- 1. Test before committing to it.
- 2. Test regularly to verify its effectiveness.
- 3. Test restore procedures to ensure that
important files can be restored quickly. - 4. Make two copies of each tape One to be kept
onsite, and the other stored offsite in a safe
place. - 5. Storing tapes in a fireproof safe can keep
them from actually burning however, the heat
from a fire will still ruin stored data. - 6. Replace tapes regularly.
65Avoiding Data Loss
- F. Maintaining a Backup Log
- 1. Maintaining a log of all backups is critical
for later file recovery. - 2. A copy of the log should be kept with the
backup tapes, as well as at the computer site. - 3. Log should record the following information
- a. Date of backup
- b. Tape-set number
- c. Type of backup performed
- d. Which computer was backed up
- e. Which files were backed up
- f. Who performed the backup
- g. Location of the backup tapes
66Avoiding Data Loss
- G. Installing the Backup System
- 1. Tape drives can be connected to a server or a
computer. - 2. Backups can be initiated from the computer to
which the tape drive is installed or over the
network. - 3. Backup and restore operations occur very
quickly when run from a server because data does
not travel across the network. - 4. Backing up across the network is the most
efficient way to back up multiple systems
however, it creates a great deal of network
traffic and slows the network down considerably.
67Avoiding Data Loss
- 5. It is important to perform backups during
periods of low network use because network
traffic can cause performance degradation. - 6. If multiple servers reside in one location,
placing a backup computer on an isolated segment
can reduce network traffic.
68Avoiding Data Loss
- Uninterruptible Power Supply (UPS)
- A. Overview
- 1. An automated external power supply designed to
keep a server or other device running in the
event of a power failure. - 2. Can interface with an operating system such as
Microsoft Windows NT. - 3. Two crucial components
- a. A power source to run the server for a short
time - b. A safe shutdown management service
69Avoiding Data Loss
- 4. Power source is usually a battery, but the UPS
can also be a gasoline engine running an AC power
supply. - 5. If power fails, users are notified and warned
by the UPS to finish their tasks. - 6. Waits a predetermined amount of time and
performs an orderly system shutdown. - 7. If power is restored while UPS is active, UPS
will notify the users that the power has
returned. - 8. A good UPS system will
- a. Prevent any more users from accessing the
server. - b. Send an alert message to the network
administrator through the server.
70Avoiding Data Loss
- B. Types of UPS Systems
- 1. Online UPS systems.
- a. When power source fails, UPS batteries
automatically take over. - b. Process is invisible to users.
- 2. Stand-by UPS systems.
- a. Start when power source fails.
- b. Less expensive than online systems, but not
as reliable. - Â
- Stand-by UPSs are slower to react to power
failures and sometimes not reliable enough to
prevent system failures.
71Avoiding Data Loss
- C. Implementing UPS
- 1. Will UPS meet the basic power requirements of
this network? - 2. How many components can it support?
- 3. Does UPS communicate with the server to
notify it when a power failure has occurred and
the server is running on batteries? - 4. Does UPS guard against power spikes and
surges? - 5. What is the life span of a UPS battery? How
long can it be inactive before it starts to
degrade? - 6. Will UPS warn the administrator and users
that it is running out of power?
72Avoiding Data Loss
- Fault Tolerant Systems
- A. Overview
- 1. Protect data by duplicating or placing it in
different physical sources, such as partitions or
disks. - 2. Redundancy is a prominent feature common to
most fault tolerant systems. - 3. Data redundancy allows access to data even if
part of the data system fails. - 4. Should never replace regular backup of servers
and hard disks.
73Avoiding Data Loss
- 5. Fault tolerant systems offer these
alternatives for data redundancy - a. Disk striping
- b. Disk mirroring
- c. Sector sparing
- d. Mirrored drive arrays
- e. Clustering
- Â
- A carefully planned backup strategy is the best
insurance policy for recovering lost or damaged
data.
74Avoiding Data Loss
- B. Redundant Array of Independent Disks (RAID)
- 1. Overview
- a. Fault tolerance options are standardized and
categorized into levels. - b. Levels offer various combinations of
performance, reliability. - Â
- RAID also offers better use of disk space and
improved performance.
75Avoiding Data Loss
- 2. Level 0 Disk Striping
- a. Divides data into 64KB blocks and spreads it
equally in a fixed rate and order among all disks
in an array. - b. Does not provide any fault tolerance because
there is no data redundancy. - c. If any partition in the disk array fails, all
data is lost. - d. A stripe set combines multiple areas of
unformatted free space into one large logical
drive, distributing data storage across all
drives simultaneously. - e. In Windows NT, a stripe set requires at least
two physical drives and can use up to 32. - f. Can combine areas on different types of
drives, such as SCSI, ESDI, and IDE.
76Avoiding Data Loss
- g. Makes one large partition out of several small
partitions, which offers better use of disk
space and multiple disk controllers will result
in better performance. -
- 3. Level 1 Disk Mirroring
- a. Duplicates a partition and moves the
duplication onto another physical disk. - b. Always two copies of the data, with each copy
on a separate disk. - c. Any partition can be mirrored.
- d. Simplest way to protect a single disk against
failure. - e. Can be considered a form of continual backup
because it maintains a fully redundant copy of a
partition on another disk.
77Avoiding Data Loss
- 4. Duplexing
- a. Consists of a mirrored pair of disks with an
additional disk controller on the second drive. - b. Reduces channel traffic and potentially
improves performance. - c. Intended to protect against disk controller
failures as well as medial failures. - 5. Level 2 Disk Striping with Error Correction
Code (ECC) - a. When a block of data is written, the block is
broken up and distributed (interleaved) across
all data drives. - b. Requires a larger amount of disk space than
parity checking methods.
78Avoiding Data Loss
- 6. Level 3 ECC Stored as Parity
- a. Similar to Level 2
- b. Requires only one disk to store parity
- Â
- The term parity refers to an error checking
procedure in which the number of 1s must always
be the sameeither odd or evenfor each group of
bits transmitted without error.
79Avoiding Data Loss
- 7. Level 4 Disk Striping with Large Blocks
- a. Moves away from data interleaving by writing
complete blocks of data to each disk in the
array. - b. A separate check disk is used to store parity
information. - c. Each time a write operation occurs, the
associated parity information must be read from
the check disk and modified. - d. Works better for large block operations than
for transaction-based processing.
80Avoiding Data Loss
- 8. Level 5 Striping with Parity
- a. Most popular approach to fault tolerant
design. - b. Supports a minimum of 3 to 32 drives and
writes the parity information across all the
disks in the array (the entire stripe set). - c. Data and parity information are arranged so
that the two are always on different disks. - d. If a single drive fails, enough information
is spread across the remaining disks to allow the
data to be completely reconstructed. - e. Parity stripe block is used to reconstruct
data for a failed physical disk.
81Avoiding Data Loss
- 9. Level 10 Mirrored Drive Arrays
- a. Mirrors data across two identical RAID 0
drive arrays. - Â
- Windows NT Disk Administrator can be used for
all disk partitioning and mirroring.
82Avoiding Data Loss
- C. Sector Sparing
- 1. Windows NT Server operating system offers an
additional fault tolerant feature called sector
sparing, also known as hot fixing. - 2. If bad sectors are found during disk I/O
(input/output), the fault tolerant driver will
attempt to move the data to a good sector and map
out the bad sector. - 3. If the mapping is successful, the file system
is not alerted. - 4. It is possible for SCSI devices to perform
sector sparing, but ESDI and IDE devices cannot. - 5. Some NOSs, have a utility that notifies the
administrator of all sector failures and of the
potential for data loss if the redundant copy
also fails.
83Avoiding Data Loss
- D. Microsoft Clustering
- 1. Microsofts implementation of server
clustering. - 2. Clustering refers to a group of independent
systems that work together as a single system. - 3. Fault tolerance is built into clustering
technology. - 4. If a system within the cluster fails, the
cluster software will disperse the work from the
failed system to the remaining systems in the
cluster. - 5. Clustering is not intended to replace current
implementations of fault tolerant systems,
although it does provide an excellent enhancement.
84Avoiding Data Loss
- E. Implementing Fault Tolerance
- 1. Most advanced NOSs offer a utility for
implementing fault tolerance. - 2. Disk Administrator program is used to
configure Windows NT Server fault tolerance. - 3. If the disk is moved to a different
controller or its ID is changed, Windows NT will
still recognize it as the original disk. - 4. Use Disk Administrator to configure various
disk configurations, including - a. Stripe sets with parity
- b. Mirror sets
- c. Volume sets
- d. Stripe sets
85Avoiding Data Loss
- Optical Drives and Disks
- A. Overview
- 1. Optical drive is a generic term that is
applied to several devices. - 2. Optical drive manufacturers provide a large
array of storage configurations that are either
network-ready or can be used with a network
server. - Â
- In optical technology, data is stored on a rigid
disk by altering the disks surface with a laser
beam. - Â
86Avoiding Data Loss
- B. Compact Disc (CD-ROM) Technology
- 1. CDs are the most common form of optical data
storage. - 2. Only allow information to be read.
- 3. ISO 9660 specification defines an
international format standard for CD-ROM. - 4. Up to 650 MB of data on a 4.73-inch disk.
- 5. Portable and replaceable, and because data on
a CD-ROM cannot be changed, files cannot be
accidentally erased. - 6. Standard recording formats and inexpensive
readers make CDs ideal for data storage. - 7. Are also available in a multisession format
called CD-recordable (CD-R).
87Avoiding Data Loss
- 8. Can now be used for incremental updates and
inexpensive duplication. - 9. Also offered in a rewritable format called
CD-rewritable. -
- C. Digital Video Disc (DVD) Technology
- 1. DVD family of formats is replacing the CD-ROM
family of formats. - 2. Also known as digital versatile disc.
- 3. DVD has five formats
- a. DVD-ROM.
- (1) Also read-only discs.
88Avoiding Data Loss
- (2) Storage capacity of 4.7 GB (single-sided,
single-layer), 9.4 GB (double-sided,
single-layer), 8.5 GB (single-sided,
double-layer), 17 GB (double-sided,
double-layer). - (3) Backward-compatible with CD-Audio and
CD-ROM. - (4) Drives can play DVD-R and all the DVD
formats. - b. DVD Video
- c. DVD Audio
- d. DVD-R (the R stands for recordable)
- (1) Format for write-once (incremental updates).
- (2) Specifies 3.95 GB for single-sided discs and
7.9 GB for double-sided discs. - (3) UDF is the file system.
89Avoiding Data Loss
- (3) UDF is the file system.
- e. DVD-RAM
- (1) Format for rewritable discs.
- (2) Specifies 2.6 GB for single-sided discs and
5.2 GB for double-sided discs. - (3) Disc cartridge as an option.
- D. WORM (Write Once, Read Many) Technology
- 1. Has helped initiate the document imaging
revolution. - 2. Uses laser technology to permanently alter
sectors of the disc, thereby permanently writing
files onto the media. - 3. Device can write only once to each disc.
- 4. Typically employed in imaging systems,
rendering images static and permanent.
90Avoiding Data Loss
- E. Rewritable Optical Technology
- 1. Magneto-Optical (MO) drives are more widely
accepted because the media and drive
manufacturers use the same standards and their
products are compatible. - 2. Phase Change Rewritable (PCR) comes from one
manufacturer (Matsushita/Panasonic), and the
media comes from two manufacturers (Panasonic and
Plasmon).
91Avoiding Data Loss
- F. Multifunction Drives
- 1. One version uses firmware in the drive that
first determines whether a disc has been
formatted for write-once or rewritable recording
and then acts on that disc accordingly. - 2. In the MO version, two entirely different
media are used. - 3. Rewritable discs are conventional MO disks,
but write-once media are traditional WORM media.
92Avoiding Data Loss
- Disaster Recovery
- A. Disaster Prevention
- 1. Focus on factors that are controllable.
- 2. Determine the best method of prevention.
- 3. Implement and enforce the preventive measures
chosen. - 4. Continually check for new and better methods
of prevention. - 5. Perform regular and routine maintenance on
all network hardware and software components. - 6. Remember that training is the key to
preventing network disasters of the human kind.
93Avoiding Data Loss
- B. Disaster Preparation
- 1. Not all disasters can be prevented.
- 2. Each community is different recovery plans
must consider different factors. - 3. Implement a plan for hardware, software, and
data. - 4. Inventory all hardware and software,
including date of purchase, model, and serial
number. - 5. Physical components of a network can be
easily replaced and are usually covered by some
form of insurance, but data is highly vulnerable
to disaster. - 6. Store backups in a secure place, such as a
bank safe deposit box, away from the network
site. - 7. To fully recover from any disaster
- a. Create a disaster recovery plan.
- b. Implement the plan.
- c. Test the plan.