Search this blog


Home About About Me
November 14, 2008

SQL server 2005 installation  

SQL Server 2005 Installation


SQL Server 2005 Installation

An interactive set up program helps the setup of SQL Server 2005. The steps have been designed to help the Administrator select the requisite options along the way. The setup screen automatically starts up as soon as the CD/DVD is inserted into the drive. If it does not, the user can start the setup process by browsing the contents of the CD/DVD and double clicking the setup.exe.


        The first screen to be displayed is the end user license agreement(EULA). The user is expected to read through the license agreement and accept the license before he can proceed any further. After accepting the license agreement, click on Next to proceed.



The next screen informs the user that some of the required components will be checked for and upgraded. Setup installs some necessary components prior to beginning theSQL Server installation and before any files are installed, the System Consistency Checker verifies that there are no problems that will prevent installation.



Note that .NET Framework 2.0, Microsoft SQL Native Client and Microsoft SQL Server2005 Setup support files have to be installed. The finish button is to be clicked. Now the Welcome screen appears.


The next step is the system configuration check. The report of the check is displayed to the user. The success or failure of the check is reported along with warnings if any.


Once the user clicks continue the installation begins.


The next step is to enter the registration information. The user enters his name, company name and the serial number as it appears on the yellow sticker on the cover of the DVD. The user then clicks on Next to continue.


Next the components to be installed have to be specified. The user can chose to install all the components or some of the components. Some of these components require further configuration information and the user will be prompted to enter such information if the components are selected. If the SQL Server is being installed on a cluster, the user will be required to enter cluster information.


On clicking Next, the Feature selection dialog box appears. All the selected features are displayed.

On clicking next the user is prompted to select the instance name. If he selects Default instance no name need be specified. If he selects Named instance, he will have to specify a name for the instance. Click Next to continue.

The user is now prompted to enter the details of the service account which is to be used for login to the server. The local or Domain user account can be selected. The security context required to run the SQL server demands that a user account be specified during installation. By default Windows authentication mode is supported.

The Authentication mode dialog box appears. The user must specify the authentication mode. It can be Windows authentication or Mixed mode. The user must assign a login irrespective of the mode selected. He must enter the password and confirm it before clicking next to continue.

The next dialog box is the Collation Settings dialog box. Collation settings define the sorting behaviour of the server. SQL server collations are used for setting up compatibility with earlier versions of SQL Servers.

The Report server database setup dialog box which appears requires the user to specify the instance of the SQL Server which will host the report server database. Select Host in current instance of SQL Server and specify the report server database name and click next to continue.

The Next dialog box is the Report Server Delivery Settings dialog box. The user has to specify the parameters required for sending email reports. Click Next to continue if you do not wish to enter any details here.

The Error Reporting dialog box appears prompting the user that SQL server, its components and Analysis services will be configured to send fatal service error reports to Microsoft or a corporate error reporting server. The user can select the check box and click next as this helps Microsoft in monitoring its services and improving upon its software. Click Next to continue.


The ready to install dialog box displays all the components that are going to be installed on the system. To proceed with the installation the user has to click on Next.

The setup progress bar is displayed. On completion of set up the Next button will become enabled and the user has to click on Next to proceed.

The next dialog box displays all the files that are being configured. The user has to click on Next to continue.


The last dialog box displays the progress of the set up. All the selected components being configured are displayed and their status indicated. Click on Next to continue.


This takes the user to the final screen of the setup. The system is required to be rebooted for the configuration to take effect. The user is asked to click on finish to reboot the system. The user is informed that any errors in set up are recorded in the summary log for future reference. Click on Finish to complete the process.


In the section that follows we shall see how this installation is maintained.

XP installation  


Installation process


Installing Windows XP can take up to two hours. To make the process more manageable, it has been broken up into several sections. When you are ready, install Windows XP:

Part 1: Begin the installation


1.



Insert the Windows XP CD into your computer and restart your computer.



2.



If prompted to start from the CD, press SPACEBAR. If you miss the prompt (it only appears for a few seconds), restart your computer to try again.


Command window with prompt "Press any key to boot from CD"



3.



Windows XP Setup begins. During this portion of setup, your mouse will not work, so you must use the keyboard. On theWelcome to Setup page, press ENTER.


Windows XP Professional Setup page



4.



On the Windows XP Licensing Agreement page, read the licensing agreement. Press the PAGE DOWN key to scroll to the bottom of the agreement. Then press F8.


Windows XP Licensing Agreement page



5.



This page enables you to select the hard disk drive on which Windows XP will be installed. Once you complete this step, all data on your hard disk drive will be removed and cannot be recovered. It is extremely important that you have a recent backup copy of your files before continuing. When you have a backup copy, press D, and then press L when prompted. This deletes your existing data.



6.



Press ENTER to select Unpartitioned space, which appears by default.


Windows XP Professional Setup, partitioned and unpartitioned space page



7.



Press ENTER again to select Format the partition using the NTFS file system, which appears by default.


Windows XP Professional Setup page with Format the partition using the NTFS file system selected


8.



Windows XP erases your hard disk drive using a process called formatting and then copies the setup files. You can leave your computer and return in 20 to 30 minutes.


Windows XP Professional Setup Please wait while Setup formats the partition page


Part 2: Continue the installation




9.



Windows XP restarts and then continues with the installation process. From this point forward, you can use your mouse. Eventually, the Regional and Language Options page appears. Click Next to accept the default settings. If you are multilingual or prefer a language other than English, you can change language settings after setup is complete.


Regional and Language Options page



10.



On the Personalize Your Software page, type your name and your organization name. Some programs use this information to automatically fill in your name when required. Then, click Next.


Personalize Your Software page



11.



On the Your Product Key page, type your product key as it appears on your Windows XP CD case. The product key is unique for every Windows XP installation. Then, click Next.


Your Product Key page



12.



On the Computer Name and Administrator Password page, in the Computer name box, type a name that uniquely identifies your computer in your house, such as FAMILYROOM or TOMS. You cannot use spaces or punctuation. If you connect your computer to a network, you will use this computer name to find shared files and printers. Type a strong password that you can remember in the Administrator password box, and then retype it in the Confirm password box. Write the password down and store it in a secure place. Click Next.


Computer Name and Administrator Password page



13.



On the Date and Time Settings page, set your computer’s clock. Then, click the Time Zone down arrow, and select your time zone. Click Next.Date and Time Settings page



14.



Windows XP will spend about a minute configuring your computer. On the Networking Settings page, click Next.

Networking Settings page



15.



On the Workgroup or Computer Domain page, click Next.


Workgroup or Computer Domain page


Part 3: Complete the installation




16.



Windows XP will spend 20 or 30 minutes configuring your computer and will automatically restart when finished. When theDisplay Settings dialog appears, click OK.


Display Settings dialog box



17.



When the Monitor Settings dialog box appears, click OK.


Monitor Settings dialog box



18.



The final stage of setup begins. On the Welcome to Microsoft Windows page, click Next.


Welcome to Microsoft Windows page



19.



On the Help protect your PC page, click Help protect my PC by turning on Automatic Updates now. Then, clickNext.


Help protect your PC page



20.



Windows XP will then check if you are connected to the Internet:



If you are connected to the Internet, select the choice that describes your network connection on the Will this computer connect to the Internet directly, or through a network? page. If you’re not sure, accept the default selection, and click Next.


Will this computer connect to the Internet directly, or through a network? page



If you use dial-up Internet access, or if Windows XP cannot connect to the Internet, you can connect to the Internet after setup is complete. On the How will this computer connect to the Internet? page, click Skip.


How will this computer connect to the Internet? page




21.



Windows XP Setup displays the Ready to activate Windows? page. If you are connected to the Internet, click Yes, and then click Next. If you are not yet connected to the Internet, click No, click Next, and then skip to step 24. After setup is complete, Windows XP will automatically remind you to activate and register your copy of Windows XP.


Ready to activate Windows? page



22.



On the Ready to register with Microsoft? page, click Yes, and then click Next.


Ready to register with Microsoft? page



23.



On the Collecting Registration Information page, complete the form. Then, click Next.


Collecting Registration Information page



24.



On the Who will use this computer? page, type the name of each person who will use the computer. You can use first names only, nicknames, or full names. Then click Next. To add users after setup is complete or to specify a password to keep your account private, read Create and customize user accounts.


Who will use this computer? page



25.



On the Thank you! page, click Finish.


Thank you! page



Congratulations! Windows XP setup is complete. You can log on by clicking your name on the logon screen. If you’ve installed Windows XP on a new computer or new hard disk drive, you can now use the File and Settings Transfer Wizard to copy your important data to your computer or hard disk drive.


Exchange server 2003  

Exchange Server 2003


Exchange Server 2003 (v6.5) debuted on September 28, 2003. Exchange Server 2003 (currently at Service Pack 2) can be run on Windows 2000 Server (only if Service Pack 4 is first installed) and 32-bit Windows Server 2003, although some new features only work with the latter. Like Windows Server 2003, Exchange Server 2003 has many compatibility modes to allow users to slowly migrate to the new system. This is useful in large companies with distributed Exchange Server environments who cannot afford the downtime and expense that comes with a complete migration.

One of the new features in Exchange Server 2003 is enhanced disaster recovery which allows administrators to bring the server online quicker. This is done by allowing the server to send and receive mail while the message stores are being recovered from backup. Some features previously available in the Microsoft Mobile Information Server 2001/2002 products have been added to the core Exchange Server product, like Outlook Mobile Access and server-side ActiveSync, while the Mobile Information Server product itself has been dropped. Better anti-virus and anti-spam protection have also been added, both by providing built-in APIs that facilitate filtering software and built-in support for the basic methods of originating IP address, SPF ("Sender ID"), and DNSBL filtering which were standard on other open source and *nix-based mail servers. Also new is the ability to drop inbound e-mail before being fully processed, thus preventing delays in the message routing system. There are also improved message and mailbox management tools, which allow administrators to execute common chores more quickly. Others, such as Instant Messaging and Exchange Conferencing Server have been extracted completely in order to form separate products. Microsoft now appears to be positioning a combination of Microsoft Office, Microsoft Office Live Communications Server, Live Meeting and Sharepoint as its collaboration software of choice. Exchange Server is now to be simply e-mail and calendaring.

Editions

Exchange Server 2003 is available in two versions, Standard Edition and Enterprise Edition. Standard Edition supports one message database per server, and supports databases up to 16 GB in size. Beginning with the release of Service Pack 2, Standard Edition allows a maximum database size of 75 GB, but only supports 18 GB by default; larger sized databases have to be updated-in with a registrychange.[3] Enterprise Edition allows a 16 TB maximum database size, and supports up to 4 storage groups with 5 databases per storage group for a total of 20 databases per server.[4]

Exchange Server 2003 is included with both Microsoft Small Business Server 2003 Standard and Premium editions and is 32-bit only, and will not install on the various 64-bit versions of Windows Server 2003.

Clients

Microsoft Exchange Server uses a proprietary RPC protocol, MAPI/RPC, documented here: [1]. It was designed to be used by theMicrosoft Outlook client. Clients capable of using the advanced features of Exchange Server include Microsoft Outlook, Novell Evolution, and the latest version of Microsoft Entourage for Mac.

E-mail hosted on an Exchange Server can also be accessed using POP3 and IMAP4 protocols, using clients such as Outlook Express,Mozilla Thunderbird, and Lotus Notes. (These protocols must be enabled on the server. Recent versions of Exchange Server turn them off by default.)

Exchange Server mailboxes can also be accessed through a web browser, using Outlook Web Access (OWA). Exchange Server 2003 also featured a version of OWA for mobile devices, called Outlook Mobile Access (OMA).

Coupled with Windows Mobile 5.0 AKU2 or higher, Exchange Server 2003 SP2 supports pushing e-mail to mobile devices—similar to the operation of BlackBerry devices or iPhone.[5][6]

Unlike Exchange Server 2000, Exchange Server 2003 no longer ships instant messaging for internal corporate systems. Microsoft releasedLive Communication Server to provide those services as a standalone program.

Exchange 2003 Anti-Spam Filtering

Exchange Server 2003 added several basic filtering methods to Exchange Server. They are not sophisticated enough to eliminate spam, but they can protect against DoS and mailbox flooding attacks. Exchange Server 2000 supported the ability to block a sender's address, or e-mail domain by adding '*@domain.com', which is still supported in Exchange Server 2003. Added filtering methods in Exchange Server 2003 are:


Connection filtering

Messages are blocked from DNS RBL lists[7] or from manually specified IP addresses/ranges

Recipient filtering

Messages blocked when sent to manually specified recipients on the server (for intranet-only addresses) or to any recipients not on the server (stopping spammers from guessing addresses)

Sender ID filtering

Sender ID, a form of Sender Policy Framework (SPF)

Intelligent Message Filter

A free Microsoft add-on that uses heuristic message analysis to block messages or direct them to the "Junk E-Mail" folder in Microsoft Outlook clients.[8]

Exchange Server 2007

Exchange Server 2007 was released in late 2006 to business customers as part of Microsoft's roll-out wave of new products. It includes new clustering options, 64-bit support for greater scalability, voice mail integration, better search and support for Web services, better filtering options, and a new Outlook Web Access interface. Exchange 2007 also dropped support for Exchange 5.50 migrations, routing groups, admin groups, Outlook Mobile Access, X.400, and some API interfaces, amongst other features.[9]

Exchange Server 2007 (v8 or with SP1 v8.1) runs on 64-bit x86-64 versions of Windows Server only. This requirement applies to supported production environments only; a 32-bit trial version is available for download and testing. However, companies currently running Exchange Server on 32-bit hardware will be required to replace or migrate hardware if they wish to upgrade to the new version. Companies that are currently running Exchange Server on 64-bit capable hardware are still required to migrate from their existing Exchange 2000/2003 servers to a new 2007 server since in-place upgrades are not supported in 2007.


The first beta of Exchange Server 2007 (then named "Exchange 12" or E12) was released in December 2005 to a very limited number of beta testers. A wider beta was made available via TechNet Plus and MSDN subscriptions in March 2006 according to the Microsoft Exchange team blog.[citation needed] On April 25, 2006, Microsoft announced that the next version of Exchange Server would be calledExchange Server 2007.


Exchange Server 2007 is an integrated part of the Innovative Communications Alliance products.[10]

Key improvements

The principal enhancements, as outlined by Microsoft, are:[11]

  • Protection: anti-spam, antivirus, compliance, clustering with data replication, improved security and encryption

  • Improved Information Worker Access: improved calendaring, unified messaging, improved mobility, improved web access

  • Improved IT Experience: 64-bit performance & scalability, command-line shell & simplified GUI, improved deployment, role separation, simplified routing

  • Exchange Management Shell: a new command-line shell and scripting language for system administration (based on Windows PowerShell). Shell users can perform every task that can be performed in the Exchange Server graphical user interface plus additional tasks, and can program often-used or complex tasks into scripts that can be saved, shared, and re-used. The Exchange Management Shell has over 375 unique commands to manage features of Microsoft Exchange Server 2007.[12]

  • "Unified Messaging" that lets users receive voice mail, e-mail, and faxes in their mailboxes, and lets them access their mailboxes from cell phones and other wireless devices. Voice commands can be given to control and listen to e-mail over the phone (and also send some basic messages, like "I'll be late")

  • Increased the database maximum size limit. Database size is now limited to 16Tb per database.

  • Increased the maximum number of storage groups and mail databases per server, to 5 each for Standard Edition (from 1 each in Exchange Server 2003 Standard), and to 50 each for Enterprise Edition (from 4 groups and 20 databases in Exchange Server 2003 Enterprise).

Clustering and high availability

Exchange Server Enterprise Edition supports clustering of up to 4 nodes when using Windows 2000 Server, and up to 8 nodes with Windows Server 2003. Exchange Server 2003 also introduced active-active clustering, but for two-node clusters only. In this setup, both servers in the cluster are allowed to be active simultaneously. This is opposed to Exchange's more common active-passive mode in which the failover servers in any cluster node cannot be used at all while their corresponding home servers are active. They must wait, inactive, for the home servers in the node to fail. Subsequent performance issues with active-active mode have led Microsoft to recommend that it should no longer be used.[13] In fact, support for active-active mode clustering has been discontinued with Exchange Server 2007.


Exchange's clustering (active-active or active-passive mode) has been criticised because of its requirement for servers in the cluster nodes to share the same physical data. The clustering in Exchange Server provides redundancy for Exchange Server as an application, but not for Exchange data.[14] In this scenario, the data can be regarded as a single point of failure, despite Microsoft's description of this set up as a "Shared Nothing" model.[15] This void has however been filled by ISV's and storage manufacturers, through "site resilience" solutions, such as geo-clustering and asynchronous data replication.[16] Exchange Server 2007 introduces new cluster terminology and configurations that address the shortcomings of the previous "shared data model".[17]


Exchange Server 2007 provides built-in support for asynchronous replication modeled on SQL Server's "Log Shipping"[18] in CCR (Cluster Continuous Replication)[19] clusters, which are built on MSCS MNS (Microsoft Cluster Service—Majority Node Set) clusters, which do not require shared storage. This type of cluster can be inexpensive and deployed in one, or "stretched" across two datacenters for protection against site-wide failures such as natural disasters. The limitation of CCR clusters is the ability to have only two nodes and the third node known as "voter node" or file share witness[20] that prevents "split brain"[20] scenarios, generally hosted as a file share on a Hub Transport Server.[21] The second type of cluster is the traditional clustering that was available in previous versions, and is now being referred to as SCC (Single Copy Cluster). In Exchange Server 2007 deployment of both CCR and SCC clusters has been simplified and improved; the entire cluster install process takes place during Exchange Server installation. LCR or Local Continuous Replication[21] has been referred to as the "poor man's cluster". It is designed to allow for data replication to an alternative drive attached to the same system and is intended to provide protection against local storage failures. It does not protect against the case where the server itself fails.


In November 2007, Microsoft released SP1 for Exchange Server 2007. This service pack includes an additional high-availability feature called SCR (Standby Continuous Replication). Unlike CCR which requires that both servers belong to a Windows cluster, typically residing in the same datacenter, SCR can replicate data to a non-clustered server, located in a separate datacenter.

Licensing

Like Windows Server products, Exchange Server requires Client Access Licenses, which are different from Windows CALs. Corporate license agreements, such as the Enterprise Agreement, or EA, include Exchange Server CALs. It also comes as part of the Core CAL. Just like Windows Server and other server products from Microsoft, you can choose to use User or Device CALs. Device CALs are assigned to a device (workstation, laptop or PDA). User CALs, are assigned to a user or employee (not a mailbox). User CALs allow a user to access Exchange e-mail from any device. User and Device CALs are the same price, however cannot be used interchangeably. For Service Providers looking to host Microsoft Exchange, there is an SPLA (Service Provider License Agreement) available whereby Microsoft receives a monthly service fee in the place of the traditional Client Access Licenses. Two types of Exchange CAL are available: Exchange CAL Standard and Exchange CAL Enterprise. The Enterprise CAL is an add-on licence to the Standard CAL

ISA2000 instalation  

A Windows 2000 Server with a full implementation of Active Directory is the minimum on which it is possible to install Microsoft ISA Server. Before installing ISA Server, one must configure Active Directory (adding required classes and selecting object properties).



Fig. 1: ISA Server setup screen with selected AD schema modification option

Before the system attempts to update the schema you will be warned that this action is not reversible.


Fig. 2: Active Directory’s modification-related warning

When modifying the schema, it is necessary to determine what the intended extent of modifications to the existing policies integrated in AD would be. In case of problems with the modification of Active Directory, one should consult the Ldif.log file.



Fig. 3: Modifying Active Directory

Once the Active Directory has been updated, you can attempt to install ISA Server. In the first step, you will be requested to supply the information about the installation mode (Typical, Full, Custom).




Fig. 4: ISA Server installation options

After this step, the set-up wizard checks whether Active Directory has already been installed or not and if any settings have been modified. Next, you will be prompted to determine if the server should be a part of a domain or be used as a standalone unit. In the next step, select the mode of operation from the following three options:

· Firewall – with this option, ISA Server will function as a very powerful firewall,

· Web Cache – will establish the ISA Server as a cache server and give access to ‘Net resources’

· Integrated Mode – when in integrated mode, all ISA Server implemented and initialized features will be available.



Fig. 5: Selecting the functional mode

Once the required mode has been selected, the next dialog box stops the Internet Information Services (if any are already installed) and prompts you to either deinstall IIS or re-configure it not to listen in on ports 80 and 8080 that are required for ISA Server. Despite possible joint operation, Microsoft recommends relocating the IIS Server to another machine.

In the next step, you will be prompted to specify the cache size for the Web Cache service.




Fig. 6: Configuring the cache size for WWW caching

If it is a multiple-disk server, one may benefit by distributing caches onto a few disks. This would accelerate the process of accessing cacheable information.

Having configured appropriate cache sizes for WWW Web services one may attempt to configure LAT (Local Address Table).



Fig. 7: LAT setup utility

LAT (Local Address Table) – these are tables that define all internal IP address ranges. If one selects this Table (Fig. 7), either the private IP address ranges as defined in RFC 1918 (10.X.X.X, 172.16.X.X, 192.168.X.X) or the external Windows 2000 routing tables will be used.




Fig. 8: A default LAT

Once this step is successful, you will get a screen with the end of LAT configuration. Remember to ensure that all network cards are connected to the Internet while installing ISA Server. Should any network card be inactive, LAT tables will probably not be created.



Fig. 9: Completing the LAT setup procedures

After completing the setup procedures, you can attempt to replicate the content of all files to the ISA Server directory. After installation, the ISA Server Administration utility will start.




Fig. 10: Microsoft ISA Server Administrator utility and Getting Started Wizard

To manage this utility, use the Microsoft Management Console (MMC) feature. The left dialog box contains all options that are necessary for setup whilst the right box provides the settings available for such options.


Getting Started Wizard

Because ISA Server is completely different from Proxy Server 2.0, Microsoft recommends that even experienced administrators become acquainted with the Wizard that will help in the initial steps of product configuration and customization.

The Getting Started Wizard works with a set of options that will aid

users through the process of customizing the product and will also clarify the effects of specific modifications when introduced to the ISA Server.

The Wizard is split into two sections (see Fig. 10):

  • Configuring policies,

  • Configuring arrays.

After you have finished the initial configuration of ISA Server with help from the Getting Started Wizard, you can fully adapt the product to the working environment by finally re-adjusting certain settings.

Creating protocol rules

Administering an ISA Server means creation of suitable arrays, rules and policies. Arrays and policies have already been explained so let us examine the term “rules”.

ISA Server uses two types of rules:


  • Site and content rule – determines if and when content from specific Internet destinations can be accessed by users,

  • Protocol rule – determines which packets may or may not access the ISA server.

Apart from the above rules, the following rules can also be defined for ISA server:


  • Bandwidth (Capacity) rule – this will prioritise different types of services using ISA server. This allows administrators to verify which specific www traffic or business-related traffic will be allocated to the available bandwidth.

  • Web publishing rules– to “publish” incoming HTTP, HTTPS, FTP requests and map them as services on the ISA Server.

  • Server publishing – with this feature, clients from the public Internet are directed to the ISA Server instead of to the web server. Moreover, the ISA Server may act as the proxy for inbound and outbound traffic between the public Internet clients and the internal web server.

Web Cache functions

ISA Server features high-performance Web Cache functions. With Cache Configuration tab the user is guided through Web service configuring. In addition to a variety of settings, the possibility exists to set up the size of the cache memory per hard disk and configure the schedule of caching tasks (TTL utility).



Fig. 11: Configuring caching services

When ISA Server is set up as a Web caching server, two situations are possible:


  • Forward Web Caching Server – this is the most popular use of the Web caching server. Its function is as follows: