SlideShare a Scribd company logo
1 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Objectives


                 In this session, you will learn to:
                     Identify the components of remote access networking
                     implementations.
                     Identify the major components of a VPN implementation.
                     Identify the components of a disaster recovery plan.
                     Identify the primary tools and technologies used to back
                     up and recover data.
                     Identify tools and technologies used to implement fault
                     tolerance.




      Ver. 1.0                    Session 10                         Slide 1 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Remote Access Networking Implementations


                 Remote access networking is a popular remote networking
                 architecture
                 The components and the processes commonly found in
                 remote access networking implementations are:
                    Remote Access Protocols
                    Serial Line Internet Protocol (SLIP)
                    Point-to-Point Protocol (PPP)
                    The Remote Access Authentication Process
                    Password Authentication Protocol (PAP)
                    Challenge Handshake Authentication Protocol (CHAP)
                    The CHAP Process
                    Remote Authentication Dial-In User Service (RADIUS)




      Ver. 1.0                    Session 10                          Slide 2 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Remote Access Protocols


                 •   A remote access protocol is a type of protocol that
                     enables users to log on to a computer or network within an
                     organization from an external location.
                 •   Remote access protocols provide:
                           Direct dial-in connections via modems
                           Connections via ISPs and the Internet




                      Client configured for                           Server configured to
                      direct dial-up access                        receive dial-up connections




      Ver. 1.0                                Session 10                            Slide 3 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Serial Line Internet Protocol (SLIP)


                 •   SLIP is a legacy remote access protocol.
                 •   SLIP is used for sending IP byte streams over serial lines such as
                     modem/phone connections.
                 •   In SLIP transmission, both ends of communication channel need to
                     convert data to and from IP datagrams.
                 •   SLIP is also referred to as packet-framing protocol.




      Ver. 1.0                          Session 10                             Slide 4 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Point-to-Point Protocol (PPP)


                 •   PPP is an Internet standard for sending IP datagram over serial
                     point-to-point link.
                 •   PPP is used in synchronous and asynchronous connections.
                 •   PPP supports the use of NetBEUI, IP, IPX, and AppleTalk network
                     protocols.
                 •   PPP server needs to be configured to provide PPP services.




      Ver. 1.0                          Session 10                            Slide 5 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 The Remote Access Authentication Process


                     There are several steps that must occur to authenticate a
                     remote dial-up connection, as shown in the following figure:


                   Remote user                   Remote client dials a                 Remote server
           1             initiates   2           remote access server             3   answers the call
                 a dial-up session



                                         Request for client authentication, and
                                     4            agreement to send




                                         Connection established; authentication
                                          credentials requested, received, and
                                     5
                                                        accepted




      Ver. 1.0                              Session 10                                           Slide 6 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Password Authentication Protocol (PAP)


                 •   PAP is an authentication method that sends client IDs and
                     passwords as cleartext.



                                              Client identifies itself



                                           Server requests verification



                                            Client provides password




                 •   Shiva Password Authentication Protocol (SPAP)
                     enables remote connections between Windows and Shiva
                     machines.


      Ver. 1.0                        Session 10                          Slide 7 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

Challenge Handshake Authentication Protocol (CHAP)


                 •    CHAP is an encrypted authentication method that enables
                      connections from any encrypted authentication method that
                      the server requests.


                                       Logon requested



                                          Challenge



                                          Response

                     Remote client                             Remote
                                                             access server
                                        Logon accepted




      Ver. 1.0                        Session 10                             Slide 8 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 The CHAP Process


                 In the challenge-response authentication process, the
                 password is never sent across the network, as shown in the
                 following figure:
                                              Remote client requests
                                 1                connection




                                            Remote server sends a
                                 2        random value as a challenge




                                        Client encrypts challenge with its
                                 3       password and sends the result




                                          Server verifies response and
                                 4         allows access to resources




      Ver. 1.0                   Session 10                                  Slide 9 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Remote Authentication Dial-In User Service (RADIUS)


                 •   RADIUS provides standardized, centralized authentication
                     of remote users.
                                                       Dial-up servers receive requests
                                Remote clients
                                                                     and
                                    connect
                                                         pass credentials to RADIUS
                               to dial-up servers
                                                                    server




                                                                                                      RADIUS server
                                                                                                         accepts
                                                                                                     and processes all
                                                                                                      authentication
                                                                                                         requests

                                                                                     RADIUS server



                                                          Dial-up servers
                                Remote clients
                                                           configured as
                                                          RADIUS clients

                 •   In Windows, RADIUS implementation is accomplished through the
                     Internet Authentication Service.
      Ver. 1.0                                   Session 10                                                   Slide 10 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Activity 12-2




                       Activity on Implementing a
                        Remote Access Solution




      Ver. 1.0                Session 10                      Slide 11 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Tunneling


                 •   Tunneling is a data-transport technique in which a data
                     packet from the passenger protocol, is transferred inside the
                     frame or packet of the carrier protocol.
                 •   Tunnel types are:                      Carrier

                         Voluntary                                   protocol
                                                                   (IP) moves
                                                                                                  IP data
                                                                     the data
                         Compulsory                                                              unencaps
                                                                                                   ulated




                                                      Passenger
                                                       protocol
                                                      enters the                  Passenger
                                                       network                     protocol
                                                                                  leaves the
                                                                                   network
                                                                            ISP



                                     IP data
                                   encapsulated




      Ver. 1.0                           Session 10                                            Slide 12 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 VPNs


                   •   A virtual private network (VPN) is a private network that is
                       configured by tunneling through a public network such as the
                       Internet.                       VPN endpoint




                                                                                            VPN endpoint
                                                VPN endpoint




                              Private network                                                              Private network
                                                                         Public network




                                                               VPN endpoint
                                                                                           VPN endpoint



                                                                         Private network




        Ver. 1.0                                     Session 10                                                    Slide 13 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 VPNs (Contd.)


                 •   VPN protocols provide the VPN tunneling, security, and
                     data encryption services.
                             Tunneling protocols                   Encryption protocols
                               secure the path                       secure the data




                                                   T-I




                                                         CSU/DSU


                                                                       VPN server
                                      ISP




                            Encryption protocols
                              secure the data




      Ver. 1.0                                Session 10                                  Slide 14 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Activity 12-3




                     Activity on Investigating VPNs




      Ver. 1.0                Session 10                      Slide 15 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Point-to-Point Tunneling Protocol (PPTP)


                 PPTP is a Microsoft VPN protocol that increases the
                 security of PPP by providing tunneling and data encryption
                 for PPP packets.
                 PPTP is the most widely supported VPN method among
                 older Window clients.
                 PPTP encapsulates any time of network protocol and
                 transports it over IP networks.




      Ver. 1.0                    Session 10                         Slide 16 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Layer Two Tunneling Protocol (L2TP)


                 •   L2TP is an Internet-standard protocol for tunneling PPP
                     sessions across a variety of network protocols, such as IP,
                     frame relay, or ATM.
                 •   L2TP is designed to provide tunneling and security
                     interoperability for client-to-gateway and gateway-to-
                     gateway connection.




      Ver. 1.0                        Session 10                         Slide 17 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 VPN Data Encryption


                 VPN data encryption is accomplished by:
                    MPPE that has the following features:
                     • Is used with PPTP
                     • Provides strong and standard data encryption
                     • Requires the use of MS-CHAP, MS-CHAPv2, or EAP remote
                       authentication
                    IPSec that has the following features:
                     • Is used with L2TP
                     • Provides DES or 3DES data encryption to provide data
                       confidentiality




      Ver. 1.0                     Session 10                                 Slide 18 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 VPN Types


                 •   VPNs can be one of three types:
                         Access VPN
                         Intranet VPN
                         Extranet VPN

                     VPN on the basis of implementation can be classified into:
                        Hardware-based
                        Firewall-based
                        Software-based




      Ver. 1.0                          Session 10                       Slide 19 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Disasters and Disaster Recovery


                 •   A disaster is a catastrophic loss of system functioning due
                     to a cause that cannot reasonably be prevented.
                 •   Disaster recovery is the administrative function of
                     protecting people and resources while bringing a failed
                     network or system back online as quickly as possible.




                                     Administrator


                                                        Protect         Restore
                          Disaster
                                                             Recovery


      Ver. 1.0                         Session 10                           Slide 20 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Disaster Categories


                 Disasters that can affect network functioning fall into one of
                 three main categories, such as:
                        Natural disaster
                        Data disaster
                        Equipment disaster




                 Natural disaster            Data destruction   Equipment failure




      Ver. 1.0                       Session 10                               Slide 21 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Disaster Recovery Plans


                 •    A disaster recovery plan is a policy and set of procedures
                      that documents:
                              How people and resources will be protected in case of
                              disaster.
                              How the organization will recover from the disaster and restore
                              normal functioning.
                      Components that are included in the disaster recovery plan
                      are shown in the following figure:




                                                                                  Network reconstruction plan
                     Responsible individuals    Hardware and software inventory




      Ver. 1.0                                 Session 10                                    Slide 22 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Responsible Individuals


                 •   Individuals responsible for various elements of the network
                     is documented as a contact list that speeds the disaster
                     recovery process, such as:
                         Network administrators
                         Office managers
                         Security officials
                         Vendors
                         Service providers and contractors
                         Manufacturers
                         Past IT personnel




      Ver. 1.0                         Session 10                        Slide 23 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Critical Hardware and Software Inventory


                 Hardware and software inventory provides insurance
                 documentation and helps determine what is required to
                 rebuild the network, such as:
                    Hardware inventory:
                     •   Standard and specialty workstation
                     •   Basic and specialty server
                     •   Connectivity hardware
                     •   Backup hardware
                    Software inventory:
                         Operating system software
                         Productivity and application software
                         Maintenance utilities
                         Backup documentation
                         Overall corporate inventory



      Ver. 1.0                        Session 10                   Slide 24 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 The Network Reconstruction Plan


                 The network reconstruction plan provides all the steps
                 needed to bring the network back online, even if the original
                 administrators are unavailable, such as:
                     Network diagram
                     Fall-back plan
                     Data restoration plan




      Ver. 1.0                      Session 10                        Slide 25 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Data Backup


                 The primary tools and technologies used to back up and
                 recover data are:
                    Backup Policies
                    Backup Media Types
                    Rotation Methods
                    Backup Types
                    Data Backup System Maintenance
                    Specialized Data Backups




      Ver. 1.0                   Session 10                        Slide 26 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Backup Policies


                 Backup policies are specific to each organization that
                 documents its own backup requirements, procedures, and
                 systems.


                                                    Software




                                              Hardware and media




                       Backup
                        policy


                                                     Testing




                                                Administration

      Ver. 1.0                   Session 10                        Slide 27 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Backup Media Types


                     Backup media are of following types:
                         Magnetic Tape Formats
                         USB Ports on Removable Drives




                 Tapes         Hard disks          CD- and DVD-ROMs   Removable drives




      Ver. 1.0                              Session 10                                   Slide 28 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Activity 13-3




                       Activity on Backing Up Data




      Ver. 1.0                Session 10                      Slide 29 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Activity 13-4




                        Activity on Restoring Data




      Ver. 1.0                Session 10                      Slide 30 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Rotation Methods


                 •   A backup rotation method is the schedule that determines
                     how many backup tapes or other media sets are needed,
                     and the sequence in which they are used and reused.
                 •   Types of backup rotation methods:
                     •   The Grandfather-Father-Son (GFS) Rotation Method
                     •   The Towers of Hanoi Rotation Method




      Ver. 1.0                        Session 10                            Slide 31 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Rotation Methods (Contd.)


                 The GFS rotation method:




                        Daily tapes: 4 for Mon – Thur, plus                   Weekly tapes: 4 Fridays, plus 1 extra
                        1 extra


                                                  Monthly tapes: 12 plus 1 extra



      Ver. 1.0                             Session 10                                                             Slide 32 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Rotation Methods (Contd.)


                 The Towers of Hanoi rotation method:

                              1   2   3   4       5   6   7       8      9      10     11     12   13   14   15   16
                 Day
                              A       A           A       A              A             A           A         A
                  Media Set




                                  B                   B                         B                       B

                                          C                                                   C

                                                                  D

                                                                                                                  E



                                              Media Set        Used Every


                                              A                2 days


                                              B                4 days


                                              C                8 days

                                                               16 days alternating between set D
                                              D&E
                                                               and E




      Ver. 1.0                                    Session 10                                                          Slide 33 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Backup Types


                 Backup types determine which files on a volume are backed
                 up in a given backup operation, and also affect the
                 requirements for restoring the data.




                                               Amount of
                                                 data      1              2                 3            4            5


                                                                   Full backup

                                  1                                              1
                                  0                                  Amount of   0
                      Amount of




                                  0                                    data      0
                        data




                                  %
                                  5                                              %
                                                                                 5
                                  0                                              0
                                  %                                              %


                                        1     2                3                 4    1         5    2            3       4        5

                                      Full   Differential                            Full           Incremental




      Ver. 1.0                                 Session 10                                                                     Slide 34 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Data Backup System Maintenance


                 To ensure that data is secured and it can be restored
                 properly, the following regular backup system maintenance
                 procedures can be followed:
                    Verify backups
                    Test restoration
                    Review logs
                    Replace tapes on schedule
                    Maintain tapes and tape drives
                    Clean tape drives
                    Replace damaged tapes




      Ver. 1.0                    Session 10                       Slide 35 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Specialized Data Backups


                 Certain data types may require specialized procedures or
                 additional software components to perform a successful
                 backup, such as:



                                                                  Email
                      Open files                 Database




                                                            Enterprise
                     Power user             Mobile users
                                                            backups
                     workstations




      Ver. 1.0                      Session 10                            Slide 36 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Fault Tolerance Methods


                 The various tools and technologies used to implement fault
                 tolerance are:
                    Fault Tolerance
                    Uninterruptible Power Supplies (UPSs)
                    Partitions
                    Redundant Array of Independent Disks (RAID) Standards
                    Striping (RAID Level 0)
                    Mirroring or Duplexing (RAID Level 1)
                    Striping with Parity Spread Across Multiple Drives (RAID Level
                    5)
                    Link Redundancy
                    Enterprise Fault Tolerance




      Ver. 1.0                    Session 10                             Slide 37 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Fault Tolerance


                 •   Fault tolerance is the ability of a network or system to
                     withstand a foreseeable component failure and continue to
                     provide an acceptable level of service.




                                                                    100% of clients




                                 One system fails, one takes over




      Ver. 1.0                           Session 10                                   Slide 38 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Uninterruptible Power Supplies (UPSs)


                 •     UPS is a device that provides backup power when the
                       electrical power fails or drops to an unacceptable voltage
                       level.
                 •     Types of UPS :
                               Online UPS
                               Offline UPS




                     Power source                         UPS          Server




      Ver. 1.0                               Session 10                         Slide 39 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Partitions


                 •   A partition is a logical area of disk space that you can
                     format and treat as a single storage unit.



                                                     Primary partitions
                                           C
                        Physical disk
                                           D
                                                     Extended partition with
                                                         logical drives
                                         E F G




      Ver. 1.0                          Session 10                             Slide 40 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Redundant Array of Independent Disks (RAID) Standards


                 •   RAID standards are a set of vendor-independent
                     specifications for fault-tolerant configurations on multiple-
                     disk systems.
                 •   In RAID, if one or more disk fails, data can be recovered
                     from other disks.




                                                            Data can be restored if one
                                                                    disk fails




                                     Data written to
                                     multiple disks




      Ver. 1.0                          Session 10                                        Slide 41 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Striping (RAID Level 0)


                 •   RAID level 0 implements striping, which is the process of
                     spreading data across multiple drives.




                                             Data




                      D             A                T          A




      Ver. 1.0                          Session 10                      Slide 42 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Mirroring or Duplexing (RAID Level 1)



          •      In RAID level 1, data from an entire partition is duplicated on
                 two identical drives by either mirroring or duplexing.
          •      In mirroring, the two disks share a drive controller.
          •      In duplexing, each disk has its own drive controller.
                                              Mirroring                          Duplexing




                                                Data                              Data



                 Disk controllers




                                     DATA                    DATA      DATA                  DATA


                                    Drive 0                 Drive 1    Drive 0               Drive 1


      Ver. 1.0                                            Session 10                                   Slide 43 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Striping with Parity Spread Across Multiple Drives (RAID Level 5)


                 RAID level 5 systems spread data byte by byte across
                 multiple drives, with parity information also spread across
                 multiple drives.

                                                     Data




                     D           A                    T         A      Parity

                   Parity        D                    A         T        A
                     D           A                    T       Parity     A

                     D         Parity                 A                  A

                     D           A                   Parity              A




      Ver. 1.0                          Session 10                              Slide 44 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Link Redundancy


                 •   Link redundancy is a network fault-tolerance method that
                     provides alternative network connections that can function,
                     if a critical primary connection is interrupted.


                                            T1


                                            T3




                      Customer
                                                                  ISP




      Ver. 1.0                        Session 10                         Slide 45 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Enterprise Fault Tolerance


                 A well-defined enterprise-wide fault tolerance plan balances
                 service community and fault tolerance costs, by:
                     Power protection
                     Disk fault tolerance
                     Backup planning
                     Service redundancy
                     Link redundancy
                     Hot and cold spares        Service continuity   Fault tolerance costs




      Ver. 1.0                     Session 10                                   Slide 46 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Summary


                 In this session, you learned that:
                     The various components that are used in remote access
                     networking to support remote users are:
                        Remote Access Protocols
                        Serial Line Internet Protocol (SLIP)
                        Point-to-Point Protocol (PPP)
                        The Remote Access Authentication Process
                        Password Authentication Protocol (PAP)
                        Challenge Handshake Authentication Protocol (CHAP)
                        The CHAP Process
                        Remote Authentication Dial-In User Service (RADIUS)




      Ver. 1.0                      Session 10                                Slide 47 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Summary (Contd.)



                  A virtual private network (VPN) is a private network that is
                  configured by tunneling through a public network such as the
                  Internet.
                  The various components that are used in VPNs:
                     Tunneling
                     VPNs
                     Point-to-Point Tunneling Protocol (PPTP)
                     Layer Two Tunneling Protocol (L2TP)
                     VPN Data Encryption
                     VPN Types




      Ver. 1.0                   Session 10                            Slide 48 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Summary (Contd.)


                  The various components of disaster recovery plan are:
                   •   Disasters and Disaster Recovery
                   •   Disaster Categories
                   •   Disaster Recovery Plans
                   •   Responsible Individuals
                   •   Critical Hardware and Software Inventory
                   •   The Network Reconstruction Plan
                  The primary tools and technologies that are used to back up
                  and recover data are:
                       Backup Policies
                       Backup Media Types
                       Rotation Methods
                       Backup Types
                       Data Backup System Maintenance
                       Specialized Data Backups



      Ver. 1.0                     Session 10                          Slide 49 of 50
CompTIA N+ Certification: Remote Networking and Disaster Recovery
 Installing Windows XP Professional Using Attended Installation

 Summary (Contd.)


                  The various tools and technologies used to implement fault
                  tolerance are:
                   •   Fault Tolerance
                   •   Uninterruptible Power Supplies (UPSs)
                   •   Partitions
                   •   Redundant Array of Independent Disks (RAID) Standards
                   •   Striping (RAID Level 0)
                   •   Mirroring or Duplexing (RAID Level 1)
                   •   Striping with Parity Spread Across Multiple Drives (RAID Level 5)
                   •   Link Redundancy
                   • Enterprise Fault Tolerance




      Ver. 1.0                      Session 10                                 Slide 50 of 50

More Related Content

What's hot

Comp tia n+_session_06
Comp tia n+_session_06Comp tia n+_session_06
Comp tia n+_session_06Niit Care
 
Comp tia n+_session_02
Comp tia n+_session_02Comp tia n+_session_02
Comp tia n+_session_02Niit Care
 
Comp tia n+_intro_session
Comp tia n+_intro_sessionComp tia n+_intro_session
Comp tia n+_intro_sessionNiit Care
 
Comp tia n+_session_03
Comp tia n+_session_03Comp tia n+_session_03
Comp tia n+_session_03Niit Care
 
Comp tia a+_session_03
Comp tia a+_session_03Comp tia a+_session_03
Comp tia a+_session_03Niit Care
 
Understanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionUnderstanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionSenetas
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3Irsandi Hasan
 
preparing network connections
preparing network connectionspreparing network connections
preparing network connectionsaibad ahmed
 
BYOD - Ruckus way. Right way.
BYOD - Ruckus way. Right way.BYOD - Ruckus way. Right way.
BYOD - Ruckus way. Right way.Michal Jarski
 
Ds tz series_us_10_april10
Ds tz series_us_10_april10Ds tz series_us_10_april10
Ds tz series_us_10_april10Yustinus Malawau
 
Datacryptor Ethernet Layer 2 Rel 4.5
Datacryptor Ethernet Layer 2 Rel 4.5Datacryptor Ethernet Layer 2 Rel 4.5
Datacryptor Ethernet Layer 2 Rel 4.5Eugene Sushchenko
 
Dos on 802.11 and other security issues ( Case Study )
Dos on 802.11 and other security issues ( Case Study ) Dos on 802.11 and other security issues ( Case Study )
Dos on 802.11 and other security issues ( Case Study ) Shrobon Biswas
 
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...Network Configuration Example: Junos OS NAT Configuration Examples for Screen...
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...Juniper Networks
 
Ccna security
Ccna securityCcna security
Ccna securitydkaya
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Yustinus Malawau
 
CCNA Security - Chapter 2
CCNA Security - Chapter 2CCNA Security - Chapter 2
CCNA Security - Chapter 2Irsandi Hasan
 
Session Delivery Networks for the Enterprise
Session Delivery Networks for the EnterpriseSession Delivery Networks for the Enterprise
Session Delivery Networks for the EnterpriseAcmePacket
 

What's hot (19)

Comp tia n+_session_06
Comp tia n+_session_06Comp tia n+_session_06
Comp tia n+_session_06
 
Comp tia n+_session_02
Comp tia n+_session_02Comp tia n+_session_02
Comp tia n+_session_02
 
Comp tia n+_intro_session
Comp tia n+_intro_sessionComp tia n+_intro_session
Comp tia n+_intro_session
 
Comp tia n+_session_03
Comp tia n+_session_03Comp tia n+_session_03
Comp tia n+_session_03
 
Comp tia a+_session_03
Comp tia a+_session_03Comp tia a+_session_03
Comp tia a+_session_03
 
Understanding senetas layer 2 encryption
Understanding senetas layer 2 encryptionUnderstanding senetas layer 2 encryption
Understanding senetas layer 2 encryption
 
Tivoli firewall magic redp0227
Tivoli firewall magic redp0227Tivoli firewall magic redp0227
Tivoli firewall magic redp0227
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
 
preparing network connections
preparing network connectionspreparing network connections
preparing network connections
 
BYOD - Ruckus way. Right way.
BYOD - Ruckus way. Right way.BYOD - Ruckus way. Right way.
BYOD - Ruckus way. Right way.
 
Ds tz series_us_10_april10
Ds tz series_us_10_april10Ds tz series_us_10_april10
Ds tz series_us_10_april10
 
Datacryptor Ethernet Layer 2 Rel 4.5
Datacryptor Ethernet Layer 2 Rel 4.5Datacryptor Ethernet Layer 2 Rel 4.5
Datacryptor Ethernet Layer 2 Rel 4.5
 
Dos on 802.11 and other security issues ( Case Study )
Dos on 802.11 and other security issues ( Case Study ) Dos on 802.11 and other security issues ( Case Study )
Dos on 802.11 and other security issues ( Case Study )
 
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...Network Configuration Example: Junos OS NAT Configuration Examples for Screen...
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...
 
Sonic wall tz series
Sonic wall tz seriesSonic wall tz series
Sonic wall tz series
 
Ccna security
Ccna securityCcna security
Ccna security
 
Ds nsa series_us_10_april10
Ds nsa series_us_10_april10Ds nsa series_us_10_april10
Ds nsa series_us_10_april10
 
CCNA Security - Chapter 2
CCNA Security - Chapter 2CCNA Security - Chapter 2
CCNA Security - Chapter 2
 
Session Delivery Networks for the Enterprise
Session Delivery Networks for the EnterpriseSession Delivery Networks for the Enterprise
Session Delivery Networks for the Enterprise
 

Viewers also liked

Mol works diapositivas
Mol works diapositivasMol works diapositivas
Mol works diapositivasalejandro
 
Research and development in Life science and public Health
Research and development in Life science and public HealthResearch and development in Life science and public Health
Research and development in Life science and public HealthAsghar Abbas
 
Vb.net session 16
Vb.net session 16Vb.net session 16
Vb.net session 16Niit Care
 
Marketing
MarketingMarketing
MarketingLepipi
 
Top branż analizowanych w Top Marce
Top branż analizowanych w Top MarceTop branż analizowanych w Top Marce
Top branż analizowanych w Top MarceBrandDoctor.pl
 
Eaea sofia prsd
 Eaea sofia prsd Eaea sofia prsd
Eaea sofia prsdGIA VER
 
Antropologia argentina
Antropologia argentina Antropologia argentina
Antropologia argentina Roberto Rios
 
Prezentacja konres e-handlu 23.10.2014
Prezentacja konres e-handlu 23.10.2014Prezentacja konres e-handlu 23.10.2014
Prezentacja konres e-handlu 23.10.2014BrandDoctor.pl
 
Case study marki LUX MED z Albumu Superbrands Polska 2016
Case study marki LUX MED z Albumu Superbrands Polska 2016 Case study marki LUX MED z Albumu Superbrands Polska 2016
Case study marki LUX MED z Albumu Superbrands Polska 2016 Superbrands Polska
 
TEMA 3. 1º E:SO.Relieve de África 2015.
TEMA 3. 1º E:SO.Relieve de África 2015. TEMA 3. 1º E:SO.Relieve de África 2015.
TEMA 3. 1º E:SO.Relieve de África 2015. Chema R.
 
Tema 2.1ESO . Curso 2016 /2017 El relive terrestre.
Tema 2.1ESO . Curso 2016 /2017 El relive terrestre.Tema 2.1ESO . Curso 2016 /2017 El relive terrestre.
Tema 2.1ESO . Curso 2016 /2017 El relive terrestre.Chema R.
 
Spanish Football Fans' Perception of Competitive Balance in the Spanish Footb...
Spanish Football Fans' Perception of Competitive Balance in the Spanish Footb...Spanish Football Fans' Perception of Competitive Balance in the Spanish Footb...
Spanish Football Fans' Perception of Competitive Balance in the Spanish Footb...Manu Perez Vehi
 
Dec of indep quadrant notes
Dec of indep quadrant notesDec of indep quadrant notes
Dec of indep quadrant notesDavid Poss
 

Viewers also liked (20)

Mol works diapositivas
Mol works diapositivasMol works diapositivas
Mol works diapositivas
 
Research and development in Life science and public Health
Research and development in Life science and public HealthResearch and development in Life science and public Health
Research and development in Life science and public Health
 
Rnw CV
Rnw CVRnw CV
Rnw CV
 
Vb.net session 16
Vb.net session 16Vb.net session 16
Vb.net session 16
 
Marketing
MarketingMarketing
Marketing
 
TERCER MILITARISMO.
TERCER MILITARISMO.TERCER MILITARISMO.
TERCER MILITARISMO.
 
Top branż analizowanych w Top Marce
Top branż analizowanych w Top MarceTop branż analizowanych w Top Marce
Top branż analizowanych w Top Marce
 
Eaea sofia prsd
 Eaea sofia prsd Eaea sofia prsd
Eaea sofia prsd
 
Logistica
LogisticaLogistica
Logistica
 
Antropologia argentina
Antropologia argentina Antropologia argentina
Antropologia argentina
 
Prezentacja konres e-handlu 23.10.2014
Prezentacja konres e-handlu 23.10.2014Prezentacja konres e-handlu 23.10.2014
Prezentacja konres e-handlu 23.10.2014
 
Branding w muzyce: Muzyk 2.0
Branding w muzyce: Muzyk 2.0Branding w muzyce: Muzyk 2.0
Branding w muzyce: Muzyk 2.0
 
19 Materiales Cerámicos II
19 Materiales Cerámicos II19 Materiales Cerámicos II
19 Materiales Cerámicos II
 
Case study marki LUX MED z Albumu Superbrands Polska 2016
Case study marki LUX MED z Albumu Superbrands Polska 2016 Case study marki LUX MED z Albumu Superbrands Polska 2016
Case study marki LUX MED z Albumu Superbrands Polska 2016
 
TEMA 3. 1º E:SO.Relieve de África 2015.
TEMA 3. 1º E:SO.Relieve de África 2015. TEMA 3. 1º E:SO.Relieve de África 2015.
TEMA 3. 1º E:SO.Relieve de África 2015.
 
Tema 2.1ESO . Curso 2016 /2017 El relive terrestre.
Tema 2.1ESO . Curso 2016 /2017 El relive terrestre.Tema 2.1ESO . Curso 2016 /2017 El relive terrestre.
Tema 2.1ESO . Curso 2016 /2017 El relive terrestre.
 
Spanish Football Fans' Perception of Competitive Balance in the Spanish Footb...
Spanish Football Fans' Perception of Competitive Balance in the Spanish Footb...Spanish Football Fans' Perception of Competitive Balance in the Spanish Footb...
Spanish Football Fans' Perception of Competitive Balance in the Spanish Footb...
 
Dec of indep quadrant notes
Dec of indep quadrant notesDec of indep quadrant notes
Dec of indep quadrant notes
 
Hominidos
HominidosHominidos
Hominidos
 
Gametogénesis, espermatogenesis y ovogenesis
Gametogénesis, espermatogenesis y ovogenesisGametogénesis, espermatogenesis y ovogenesis
Gametogénesis, espermatogenesis y ovogenesis
 

Similar to Comp tia n+_session_10

Comp tia a+_session_11
Comp tia a+_session_11Comp tia a+_session_11
Comp tia a+_session_11Niit Care
 
Authenticated Identites in VoIP Call Control
Authenticated Identites in VoIP Call ControlAuthenticated Identites in VoIP Call Control
Authenticated Identites in VoIP Call ControlWarren Bent
 
Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2Warren Bent
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authenticationdkaya
 
Routing host certificates in eduroam/govroam
Routing host certificates in eduroam/govroamRouting host certificates in eduroam/govroam
Routing host certificates in eduroam/govroamKarri Huhtanen
 
Remote access connection
Remote access connection Remote access connection
Remote access connection Ah Fawad Saiq
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentRamesh Nagappan
 
Vpn security agenda by cover our privacy
Vpn security agenda by cover our privacyVpn security agenda by cover our privacy
Vpn security agenda by cover our privacyEric Fedewa
 
The WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems OverviewThe WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems OverviewNick Owen
 
Oded nahum branch repeater 6 technical introduction
Oded nahum branch repeater 6 technical introductionOded nahum branch repeater 6 technical introduction
Oded nahum branch repeater 6 technical introductionDigicomp Academy AG
 
Systems and Network Analysis Center Information Assurance ...
Systems and Network Analysis Center Information Assurance ...Systems and Network Analysis Center Information Assurance ...
Systems and Network Analysis Center Information Assurance ...Videoguy
 
presentation_4102_1493726768.pdf
presentation_4102_1493726768.pdfpresentation_4102_1493726768.pdf
presentation_4102_1493726768.pdfssuserf0e32f
 
Cloud infrastructure, IaaS
Cloud infrastructure,  IaaSCloud infrastructure,  IaaS
Cloud infrastructure, IaaSSATYAVEER PAL
 
IEEE 802.1X and Axis’ Implementation
IEEE 802.1X and Axis’ ImplementationIEEE 802.1X and Axis’ Implementation
IEEE 802.1X and Axis’ ImplementationAxis Communications
 
Dhcp authentication using certificates
Dhcp authentication using certificatesDhcp authentication using certificates
Dhcp authentication using certificatesHadi Fadlallah
 
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...Microsoft TechNet - Belgium and Luxembourg
 
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...DATA SECURITY SOLUTIONS
 

Similar to Comp tia n+_session_10 (20)

Comp tia a+_session_11
Comp tia a+_session_11Comp tia a+_session_11
Comp tia a+_session_11
 
Authenticated Identites in VoIP Call Control
Authenticated Identites in VoIP Call ControlAuthenticated Identites in VoIP Call Control
Authenticated Identites in VoIP Call Control
 
Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
 
Routing host certificates in eduroam/govroam
Routing host certificates in eduroam/govroamRouting host certificates in eduroam/govroam
Routing host certificates in eduroam/govroam
 
6421 b Module-05
6421 b Module-056421 b Module-05
6421 b Module-05
 
Iuwne10 S04 L04
Iuwne10 S04 L04Iuwne10 S04 L04
Iuwne10 S04 L04
 
Remote access connection
Remote access connection Remote access connection
Remote access connection
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environment
 
Vpn security agenda by cover our privacy
Vpn security agenda by cover our privacyVpn security agenda by cover our privacy
Vpn security agenda by cover our privacy
 
The WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems OverviewThe WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems Overview
 
Oded nahum branch repeater 6 technical introduction
Oded nahum branch repeater 6 technical introductionOded nahum branch repeater 6 technical introduction
Oded nahum branch repeater 6 technical introduction
 
Systems and Network Analysis Center Information Assurance ...
Systems and Network Analysis Center Information Assurance ...Systems and Network Analysis Center Information Assurance ...
Systems and Network Analysis Center Information Assurance ...
 
Remote Console: Say goodbye to RDP
Remote Console: Say goodbye to RDPRemote Console: Say goodbye to RDP
Remote Console: Say goodbye to RDP
 
presentation_4102_1493726768.pdf
presentation_4102_1493726768.pdfpresentation_4102_1493726768.pdf
presentation_4102_1493726768.pdf
 
Cloud infrastructure, IaaS
Cloud infrastructure,  IaaSCloud infrastructure,  IaaS
Cloud infrastructure, IaaS
 
IEEE 802.1X and Axis’ Implementation
IEEE 802.1X and Axis’ ImplementationIEEE 802.1X and Axis’ Implementation
IEEE 802.1X and Axis’ Implementation
 
Dhcp authentication using certificates
Dhcp authentication using certificatesDhcp authentication using certificates
Dhcp authentication using certificates
 
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
 
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
 

More from Niit Care (20)

Ajs 1 b
Ajs 1 bAjs 1 b
Ajs 1 b
 
Ajs 4 b
Ajs 4 bAjs 4 b
Ajs 4 b
 
Ajs 4 a
Ajs 4 aAjs 4 a
Ajs 4 a
 
Ajs 4 c
Ajs 4 cAjs 4 c
Ajs 4 c
 
Ajs 3 b
Ajs 3 bAjs 3 b
Ajs 3 b
 
Ajs 3 a
Ajs 3 aAjs 3 a
Ajs 3 a
 
Ajs 3 c
Ajs 3 cAjs 3 c
Ajs 3 c
 
Ajs 2 b
Ajs 2 bAjs 2 b
Ajs 2 b
 
Ajs 2 a
Ajs 2 aAjs 2 a
Ajs 2 a
 
Ajs 2 c
Ajs 2 cAjs 2 c
Ajs 2 c
 
Ajs 1 a
Ajs 1 aAjs 1 a
Ajs 1 a
 
Ajs 1 c
Ajs 1 cAjs 1 c
Ajs 1 c
 
Dacj 4 2-c
Dacj 4 2-cDacj 4 2-c
Dacj 4 2-c
 
Dacj 4 2-b
Dacj 4 2-bDacj 4 2-b
Dacj 4 2-b
 
Dacj 4 2-a
Dacj 4 2-aDacj 4 2-a
Dacj 4 2-a
 
Dacj 4 1-c
Dacj 4 1-cDacj 4 1-c
Dacj 4 1-c
 
Dacj 4 1-b
Dacj 4 1-bDacj 4 1-b
Dacj 4 1-b
 
Dacj 4 1-a
Dacj 4 1-aDacj 4 1-a
Dacj 4 1-a
 
Dacj 1-2 b
Dacj 1-2 bDacj 1-2 b
Dacj 1-2 b
 
Dacj 1-3 c
Dacj 1-3 cDacj 1-3 c
Dacj 1-3 c
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Comp tia n+_session_10

  • 1. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Objectives In this session, you will learn to: Identify the components of remote access networking implementations. Identify the major components of a VPN implementation. Identify the components of a disaster recovery plan. Identify the primary tools and technologies used to back up and recover data. Identify tools and technologies used to implement fault tolerance. Ver. 1.0 Session 10 Slide 1 of 50
  • 2. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Remote Access Networking Implementations Remote access networking is a popular remote networking architecture The components and the processes commonly found in remote access networking implementations are: Remote Access Protocols Serial Line Internet Protocol (SLIP) Point-to-Point Protocol (PPP) The Remote Access Authentication Process Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) The CHAP Process Remote Authentication Dial-In User Service (RADIUS) Ver. 1.0 Session 10 Slide 2 of 50
  • 3. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Remote Access Protocols • A remote access protocol is a type of protocol that enables users to log on to a computer or network within an organization from an external location. • Remote access protocols provide: Direct dial-in connections via modems Connections via ISPs and the Internet Client configured for Server configured to direct dial-up access receive dial-up connections Ver. 1.0 Session 10 Slide 3 of 50
  • 4. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Serial Line Internet Protocol (SLIP) • SLIP is a legacy remote access protocol. • SLIP is used for sending IP byte streams over serial lines such as modem/phone connections. • In SLIP transmission, both ends of communication channel need to convert data to and from IP datagrams. • SLIP is also referred to as packet-framing protocol. Ver. 1.0 Session 10 Slide 4 of 50
  • 5. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Point-to-Point Protocol (PPP) • PPP is an Internet standard for sending IP datagram over serial point-to-point link. • PPP is used in synchronous and asynchronous connections. • PPP supports the use of NetBEUI, IP, IPX, and AppleTalk network protocols. • PPP server needs to be configured to provide PPP services. Ver. 1.0 Session 10 Slide 5 of 50
  • 6. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation The Remote Access Authentication Process There are several steps that must occur to authenticate a remote dial-up connection, as shown in the following figure: Remote user Remote client dials a Remote server 1 initiates 2 remote access server 3 answers the call a dial-up session Request for client authentication, and 4 agreement to send Connection established; authentication credentials requested, received, and 5 accepted Ver. 1.0 Session 10 Slide 6 of 50
  • 7. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Password Authentication Protocol (PAP) • PAP is an authentication method that sends client IDs and passwords as cleartext. Client identifies itself Server requests verification Client provides password • Shiva Password Authentication Protocol (SPAP) enables remote connections between Windows and Shiva machines. Ver. 1.0 Session 10 Slide 7 of 50
  • 8. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Challenge Handshake Authentication Protocol (CHAP) • CHAP is an encrypted authentication method that enables connections from any encrypted authentication method that the server requests. Logon requested Challenge Response Remote client Remote access server Logon accepted Ver. 1.0 Session 10 Slide 8 of 50
  • 9. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation The CHAP Process In the challenge-response authentication process, the password is never sent across the network, as shown in the following figure: Remote client requests 1 connection Remote server sends a 2 random value as a challenge Client encrypts challenge with its 3 password and sends the result Server verifies response and 4 allows access to resources Ver. 1.0 Session 10 Slide 9 of 50
  • 10. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Remote Authentication Dial-In User Service (RADIUS) • RADIUS provides standardized, centralized authentication of remote users. Dial-up servers receive requests Remote clients and connect pass credentials to RADIUS to dial-up servers server RADIUS server accepts and processes all authentication requests RADIUS server Dial-up servers Remote clients configured as RADIUS clients • In Windows, RADIUS implementation is accomplished through the Internet Authentication Service. Ver. 1.0 Session 10 Slide 10 of 50
  • 11. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Activity 12-2 Activity on Implementing a Remote Access Solution Ver. 1.0 Session 10 Slide 11 of 50
  • 12. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Tunneling • Tunneling is a data-transport technique in which a data packet from the passenger protocol, is transferred inside the frame or packet of the carrier protocol. • Tunnel types are: Carrier Voluntary protocol (IP) moves IP data the data Compulsory unencaps ulated Passenger protocol enters the Passenger network protocol leaves the network ISP IP data encapsulated Ver. 1.0 Session 10 Slide 12 of 50
  • 13. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation VPNs • A virtual private network (VPN) is a private network that is configured by tunneling through a public network such as the Internet. VPN endpoint VPN endpoint VPN endpoint Private network Private network Public network VPN endpoint VPN endpoint Private network Ver. 1.0 Session 10 Slide 13 of 50
  • 14. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation VPNs (Contd.) • VPN protocols provide the VPN tunneling, security, and data encryption services. Tunneling protocols Encryption protocols secure the path secure the data T-I CSU/DSU VPN server ISP Encryption protocols secure the data Ver. 1.0 Session 10 Slide 14 of 50
  • 15. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Activity 12-3 Activity on Investigating VPNs Ver. 1.0 Session 10 Slide 15 of 50
  • 16. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Point-to-Point Tunneling Protocol (PPTP) PPTP is a Microsoft VPN protocol that increases the security of PPP by providing tunneling and data encryption for PPP packets. PPTP is the most widely supported VPN method among older Window clients. PPTP encapsulates any time of network protocol and transports it over IP networks. Ver. 1.0 Session 10 Slide 16 of 50
  • 17. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Layer Two Tunneling Protocol (L2TP) • L2TP is an Internet-standard protocol for tunneling PPP sessions across a variety of network protocols, such as IP, frame relay, or ATM. • L2TP is designed to provide tunneling and security interoperability for client-to-gateway and gateway-to- gateway connection. Ver. 1.0 Session 10 Slide 17 of 50
  • 18. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation VPN Data Encryption VPN data encryption is accomplished by: MPPE that has the following features: • Is used with PPTP • Provides strong and standard data encryption • Requires the use of MS-CHAP, MS-CHAPv2, or EAP remote authentication IPSec that has the following features: • Is used with L2TP • Provides DES or 3DES data encryption to provide data confidentiality Ver. 1.0 Session 10 Slide 18 of 50
  • 19. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation VPN Types • VPNs can be one of three types: Access VPN Intranet VPN Extranet VPN VPN on the basis of implementation can be classified into: Hardware-based Firewall-based Software-based Ver. 1.0 Session 10 Slide 19 of 50
  • 20. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Disasters and Disaster Recovery • A disaster is a catastrophic loss of system functioning due to a cause that cannot reasonably be prevented. • Disaster recovery is the administrative function of protecting people and resources while bringing a failed network or system back online as quickly as possible. Administrator Protect Restore Disaster Recovery Ver. 1.0 Session 10 Slide 20 of 50
  • 21. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Disaster Categories Disasters that can affect network functioning fall into one of three main categories, such as: Natural disaster Data disaster Equipment disaster Natural disaster Data destruction Equipment failure Ver. 1.0 Session 10 Slide 21 of 50
  • 22. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Disaster Recovery Plans • A disaster recovery plan is a policy and set of procedures that documents: How people and resources will be protected in case of disaster. How the organization will recover from the disaster and restore normal functioning. Components that are included in the disaster recovery plan are shown in the following figure: Network reconstruction plan Responsible individuals Hardware and software inventory Ver. 1.0 Session 10 Slide 22 of 50
  • 23. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Responsible Individuals • Individuals responsible for various elements of the network is documented as a contact list that speeds the disaster recovery process, such as: Network administrators Office managers Security officials Vendors Service providers and contractors Manufacturers Past IT personnel Ver. 1.0 Session 10 Slide 23 of 50
  • 24. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Critical Hardware and Software Inventory Hardware and software inventory provides insurance documentation and helps determine what is required to rebuild the network, such as: Hardware inventory: • Standard and specialty workstation • Basic and specialty server • Connectivity hardware • Backup hardware Software inventory: Operating system software Productivity and application software Maintenance utilities Backup documentation Overall corporate inventory Ver. 1.0 Session 10 Slide 24 of 50
  • 25. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation The Network Reconstruction Plan The network reconstruction plan provides all the steps needed to bring the network back online, even if the original administrators are unavailable, such as: Network diagram Fall-back plan Data restoration plan Ver. 1.0 Session 10 Slide 25 of 50
  • 26. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Data Backup The primary tools and technologies used to back up and recover data are: Backup Policies Backup Media Types Rotation Methods Backup Types Data Backup System Maintenance Specialized Data Backups Ver. 1.0 Session 10 Slide 26 of 50
  • 27. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Backup Policies Backup policies are specific to each organization that documents its own backup requirements, procedures, and systems. Software Hardware and media Backup policy Testing Administration Ver. 1.0 Session 10 Slide 27 of 50
  • 28. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Backup Media Types Backup media are of following types: Magnetic Tape Formats USB Ports on Removable Drives Tapes Hard disks CD- and DVD-ROMs Removable drives Ver. 1.0 Session 10 Slide 28 of 50
  • 29. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Activity 13-3 Activity on Backing Up Data Ver. 1.0 Session 10 Slide 29 of 50
  • 30. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Activity 13-4 Activity on Restoring Data Ver. 1.0 Session 10 Slide 30 of 50
  • 31. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Rotation Methods • A backup rotation method is the schedule that determines how many backup tapes or other media sets are needed, and the sequence in which they are used and reused. • Types of backup rotation methods: • The Grandfather-Father-Son (GFS) Rotation Method • The Towers of Hanoi Rotation Method Ver. 1.0 Session 10 Slide 31 of 50
  • 32. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Rotation Methods (Contd.) The GFS rotation method: Daily tapes: 4 for Mon – Thur, plus Weekly tapes: 4 Fridays, plus 1 extra 1 extra Monthly tapes: 12 plus 1 extra Ver. 1.0 Session 10 Slide 32 of 50
  • 33. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Rotation Methods (Contd.) The Towers of Hanoi rotation method: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Day A A A A A A A A Media Set B B B B C C D E Media Set Used Every A 2 days B 4 days C 8 days 16 days alternating between set D D&E and E Ver. 1.0 Session 10 Slide 33 of 50
  • 34. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Backup Types Backup types determine which files on a volume are backed up in a given backup operation, and also affect the requirements for restoring the data. Amount of data 1 2 3 4 5 Full backup 1 1 0 Amount of 0 Amount of 0 data 0 data % 5 % 5 0 0 % % 1 2 3 4 1 5 2 3 4 5 Full Differential Full Incremental Ver. 1.0 Session 10 Slide 34 of 50
  • 35. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Data Backup System Maintenance To ensure that data is secured and it can be restored properly, the following regular backup system maintenance procedures can be followed: Verify backups Test restoration Review logs Replace tapes on schedule Maintain tapes and tape drives Clean tape drives Replace damaged tapes Ver. 1.0 Session 10 Slide 35 of 50
  • 36. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Specialized Data Backups Certain data types may require specialized procedures or additional software components to perform a successful backup, such as: Email Open files Database Enterprise Power user Mobile users backups workstations Ver. 1.0 Session 10 Slide 36 of 50
  • 37. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Fault Tolerance Methods The various tools and technologies used to implement fault tolerance are: Fault Tolerance Uninterruptible Power Supplies (UPSs) Partitions Redundant Array of Independent Disks (RAID) Standards Striping (RAID Level 0) Mirroring or Duplexing (RAID Level 1) Striping with Parity Spread Across Multiple Drives (RAID Level 5) Link Redundancy Enterprise Fault Tolerance Ver. 1.0 Session 10 Slide 37 of 50
  • 38. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Fault Tolerance • Fault tolerance is the ability of a network or system to withstand a foreseeable component failure and continue to provide an acceptable level of service. 100% of clients One system fails, one takes over Ver. 1.0 Session 10 Slide 38 of 50
  • 39. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Uninterruptible Power Supplies (UPSs) • UPS is a device that provides backup power when the electrical power fails or drops to an unacceptable voltage level. • Types of UPS : Online UPS Offline UPS Power source UPS Server Ver. 1.0 Session 10 Slide 39 of 50
  • 40. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Partitions • A partition is a logical area of disk space that you can format and treat as a single storage unit. Primary partitions C Physical disk D Extended partition with logical drives E F G Ver. 1.0 Session 10 Slide 40 of 50
  • 41. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Redundant Array of Independent Disks (RAID) Standards • RAID standards are a set of vendor-independent specifications for fault-tolerant configurations on multiple- disk systems. • In RAID, if one or more disk fails, data can be recovered from other disks. Data can be restored if one disk fails Data written to multiple disks Ver. 1.0 Session 10 Slide 41 of 50
  • 42. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Striping (RAID Level 0) • RAID level 0 implements striping, which is the process of spreading data across multiple drives. Data D A T A Ver. 1.0 Session 10 Slide 42 of 50
  • 43. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Mirroring or Duplexing (RAID Level 1) • In RAID level 1, data from an entire partition is duplicated on two identical drives by either mirroring or duplexing. • In mirroring, the two disks share a drive controller. • In duplexing, each disk has its own drive controller. Mirroring Duplexing Data Data Disk controllers DATA DATA DATA DATA Drive 0 Drive 1 Drive 0 Drive 1 Ver. 1.0 Session 10 Slide 43 of 50
  • 44. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Striping with Parity Spread Across Multiple Drives (RAID Level 5) RAID level 5 systems spread data byte by byte across multiple drives, with parity information also spread across multiple drives. Data D A T A Parity Parity D A T A D A T Parity A D Parity A A D A Parity A Ver. 1.0 Session 10 Slide 44 of 50
  • 45. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Link Redundancy • Link redundancy is a network fault-tolerance method that provides alternative network connections that can function, if a critical primary connection is interrupted. T1 T3 Customer ISP Ver. 1.0 Session 10 Slide 45 of 50
  • 46. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Enterprise Fault Tolerance A well-defined enterprise-wide fault tolerance plan balances service community and fault tolerance costs, by: Power protection Disk fault tolerance Backup planning Service redundancy Link redundancy Hot and cold spares Service continuity Fault tolerance costs Ver. 1.0 Session 10 Slide 46 of 50
  • 47. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Summary In this session, you learned that: The various components that are used in remote access networking to support remote users are: Remote Access Protocols Serial Line Internet Protocol (SLIP) Point-to-Point Protocol (PPP) The Remote Access Authentication Process Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) The CHAP Process Remote Authentication Dial-In User Service (RADIUS) Ver. 1.0 Session 10 Slide 47 of 50
  • 48. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Summary (Contd.) A virtual private network (VPN) is a private network that is configured by tunneling through a public network such as the Internet. The various components that are used in VPNs: Tunneling VPNs Point-to-Point Tunneling Protocol (PPTP) Layer Two Tunneling Protocol (L2TP) VPN Data Encryption VPN Types Ver. 1.0 Session 10 Slide 48 of 50
  • 49. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Summary (Contd.) The various components of disaster recovery plan are: • Disasters and Disaster Recovery • Disaster Categories • Disaster Recovery Plans • Responsible Individuals • Critical Hardware and Software Inventory • The Network Reconstruction Plan The primary tools and technologies that are used to back up and recover data are: Backup Policies Backup Media Types Rotation Methods Backup Types Data Backup System Maintenance Specialized Data Backups Ver. 1.0 Session 10 Slide 49 of 50
  • 50. CompTIA N+ Certification: Remote Networking and Disaster Recovery Installing Windows XP Professional Using Attended Installation Summary (Contd.) The various tools and technologies used to implement fault tolerance are: • Fault Tolerance • Uninterruptible Power Supplies (UPSs) • Partitions • Redundant Array of Independent Disks (RAID) Standards • Striping (RAID Level 0) • Mirroring or Duplexing (RAID Level 1) • Striping with Parity Spread Across Multiple Drives (RAID Level 5) • Link Redundancy • Enterprise Fault Tolerance Ver. 1.0 Session 10 Slide 50 of 50

Editor's Notes

  1. You need to tell the password complexity requirements as given in page no. 377 of CG.
  2. You need to tell about: 1.The comparison between SLIP and PPP as given in page no 434 and 435 of CG. 2.PPPoE and EAP as given in page no. 435 of CG.
  3. You need to tell about IEEE 802.1x and EAP Implementation in Windows as given in page no. 380 in CG.
  4. You need to tell about MS-CHAP and MS-CHAPv2 as given in page no. 437 of CG.
  5. You need to tell on RSA as given in page no 391 of CG.
  6. A proxy server combines NAT, firewall, and caching functionality.
  7. You need to tell about Hot, Warm, and Cold Sites; Hot and Cold Spares as given in page no 459 of CG
  8. You need to tell about the back up policy considerations as given in page no 464 of CG.
  9. You need to tell about Snapshot backups and offline files as shown in page no 471 of CG.
  10. You need to tell the comparison between online and offline UPSs as given in page no 479 of CG.
  11. You need to tell about partition limits in windows systems as given in page no. 480 of CG.
  12. To be modified
  13. To be modified
  14. To be modified
  15. To be modified