5 hours 18 minutes
Lesson two is implemented fell of a cluster
and lesson two, we're gonna look at preparing for fail over crossed the implementation.
We're going to hardware requirements for our fill of our cross string,
um network requirement, infrastructure requirement and so four requirements.
All right, prepare for feel of across the implementation
before you implement crossed fill of across dream technology. You must identify service is an application that you want to make. I'll be available to your clients
so you must identify those service and applications. Remember Phil of across Rennes. Note
um cannot be applied to all applications.
Remember, Philip across town does not provide improve scalability by adding additional note. If you want to improve scalability, you have to get used more powerful hardware
for individual notes. For example, using more powerful CPU, you can use our most souped up ram high end ram. I am I. I am memory I n c p U.
But when it when it comes to your men, go for Phil of our cross tree should be I I availability instead of scalability.
Fill of our clustering is more student for state. Full applications
there are restricted to a single set of data
databases. Such example.
you can also use still of a crossing for I pervy virtual machines.
Remember, I feel of are crossed in only using only uses I p based protocol.
Therefore his only student for I p based applications
sort of across the support boat I pee before and I p v six.
The best resource forfeit of our cross string is when the client or network protocol can reconnect to the application automatic automatically after Phil over.
That means 50. If they are, your clients are connected toe. Know that I notes
Well, you know, go all fly off when it falls over to the other. No, they should be able to automatically reconnect to the other. No, Daddy feels over too. If they can, they're gonna have to restart the machine. But the best way is for them to be able to automatically reconnect without user intervention.
Let's look at hardware requirement for Fred of our Cross street.
when you configure your fill of across to make sure you use the proper hardware. If not, you are the problem.
Actually, before you configure fill of our cross tree, you have to run evaluated configuration wizard was gonna check all your hardware and make sure they passed Feel of our cross string,
all outweigh their You select for Philip across three. Most are the logo on it that says 35 for Windows 7 2012
So each hardware components must have to certify for windows over 2012. Logo on it.
You're seven. Note should have the same configuration
on continue Samar similar components. Let me explain that
you showing style the same or similar hardware on each feel of across the node.
For example, if you choose a specific
Modelo network adapter which you installed the same specific model on each
if so, that's very, very important that he used the same or similar
If we're the same or similar components, I give you the example of the network adapter car using three com network adapter card. Make sure all of them used three come network adapter card.
let's look on network requirements.
Let's work requirement for Philo across there. Includes the network are they adopt an archway. Sorry. Network hardware component will solve this. 35 for Windows 7 2000 and 12 logo.
That's very important.
Okay, Network adapter. And each no should be identical.
And obviously my P protocol version. That means you're using. I pee before, but he's unhappy before using the I P V six of each one of the servers using the I. P V six. This the speed
because our settings you can set your network adapter car. The duplex on floor control should be the same
to be the same sentence.
The networks, the network equipment, which you're going to connect the notes who should be redundant
so that even a single fairly allows the notes to continue communicating.
So your network a network equipment, has toe have a redundant connection.
The network adapter and across the network must have the same i p address assignment metal.
either are using static I. P. Or they are using the X c p u. Can one do one set of using the extra PR except using our static
your network set in an I P address.
You also be, um,
the network says is an I. P. Address. You also become figure out,
for example, this speed
duplex mode flow control our media type should be the same.
Let's look at infrastructure requirements
if a structure requirement for Phil of across the includes
the notes in the cross, the most used their nets for name resolution
so they can find each other
all the service and across the most being the same active directory domain.
Also, remember the user account that crazy cross timbers have administrative rights and permission on our servers
on on the create computer objects permission in the domain.
Another recommendation are the very important recommendation for the network. For the infrastructure
of your fate of our crossed Renee's, the same role should be installed on each cluster node
the same role. For example, if you stole the NF you in whatever role in studying wants, no should be installed in other notes.
Active director Damen Service's role should not be in store in any of the cross. The notes
that means, and none of you sever crosses. You have active directory demand service is install on IT
Software requirement for Phil of our cluster and includes on those should be running Windows 7 2012 or Windows Server 2012 Released, too,
which can't be any of the following we in December 2012 when it's over 2000 of Standard
Fool or several Call installation, several core we all knows All come Online
should be with December 2012. Irwin December 2000 and 12. Released to Data Center, Fool
All seven corps installation.
All the nodes Most wronged. The same process of architecture.
You know, 64 bit architecture. All the nose must run. This same processor architectures
all the nose. You have the same service pack and updates.
That's very, very important that we have all this in place.
MTA 98-366 Networking Fundamentals
This MTA Networking Fundamentals certification course provides an entry point to the Microsoft Technology Associate ...
5 CEU/CPE Hours Available
Certificate of Completion Offered
MS-500: Microsoft 365 Security Administration
The Microsoft 365 Security Administration (MS-500) training course is designed to prepare students to take ...
7 CEU/CPE Hours Available
Certificate of Completion Offered