CNE Training Guide NetWare 4.1 Administration

Previous chapterNext chapterContents


- 9 -

Network Fault Tolerance


This chapter discusses the system fault-tolerant capabilities of NetWare 4.x. System fault tolerance is important for preserving the integrity of data. NetWare 4.x also provides support for UPS and the native backup services. NetWare 4.x backup uses the Storage Management Services (SMS), a hardware- and software-independent method for performing backups.

This chapter also discusses the different types of backup strategies such as full backup, differential backup, and incremental backup. The principal tool for performing backups in NetWare 4.x is SBACKUP. Use of this tool is discussed at length.

Examining System Fault Tolerance

NetWare 4.x System Fault Tolerance (SFT) keeps data and software in a reliable state. This reliability is maintained dynamically while the system is up and running. NetWare 4.x provides three levels of fault tolerance:

SFT Level I

System Fault Tolerance Level I provides data reliability by implementing the following:

SFT Level I implements read-after-write verification and hot fix (see fig. 9.1). When a block is written in any version of NetWare, it is immediately read to verify that the block that was read is the same as that which was written. This verification works by comparing the block read after it was written, giving it the name read-after-write verify. If the two blocks are different, the area on the disk is bad, and the block is rewritten into a special area called the redirection area or the hot fix area. About 2 percent of the disk (by default) is reserved as redirection area. The bad spot on the disk is recorded in a bad block table. The process of writing the bad block to the redirection area and marking the original bad block location in the bad block table is called hot fix. The bad block area of the disk never is written into until the disk is formatted and prepared again for server installation using the Surface Analysis option in INSTALL.NLM.

Figure 9.1 Read-after-write verify and hot fix.

On large disks, 2 percent represents a great deal of disk space, so you might want to reduce the percentage of redirection area.

The File Allocation Table (FAT) and the Directory Entry Table (DET) are two critical data structures of the NetWare File System (see fig. 9.2). The FAT contains the location of the data blocks on the server disk, and the DET contains the directory of files in a volume. When the NetWare 4.x server is started, the FAT and DET stored on the server volume are loaded into memory: the entire FAT is cached, and needed portions of the DET also are cached. Because loss of FAT or DET can result in loss of access to data, the FAT and DET are duplicated in separate areas of the server disk. If one of the copies of FAT or DET is corrupted, it can be restored from the second copy.

Figure 9.2 Duplicate FATs and DETs.

NetWare 4.x servers implement the Transaction Tracking System (TTS) feature for critical data operations. TTS (see fig. 9.3) enables you to back out incomplete file operations in the event of a crash. You can implement TTS on a file by flagging the file with a Transaction attribute using the FLAG command. TTS uses Novell's Btrieve database engine. Btrieve enables you to encapsulate transactions by the Begin Transaction and End Transaction operations. If the operations defined in the transaction cannot be completed, the entire transaction can be rolled back to the Begin Transaction point.

Figure 9.3 The Transaction Tracking System (TTS).

SFT Level II

SFT Level II has two options. The first option is disk mirroring. Most ISA disk controllers support two disk channels. Disks of the same size are attached to the disk controller. One of the NetWare partitions is designated as the primary partition and a NetWare partition on another disk is designated as the secondary partition (see fig. 9.4). The secondary partition acts as a mirror image of the primary. When a block is written, it is written to both partitions. When a block is read, the read command is issued to both partitions. The disk read response that is the fastest is the one used. If disks with different sizes are used for mirroring, make the mirrored partitions on the disk the same size.

Figure 9.4 SFT Level II disk mirroring.

If the primary disk fails, control is transferred to the secondary disk. When the primary disk is repaired, the secondary disk information is transferred to the primary disk. If the disk controller fails, having a secondary disk attached to the same controller is not useful. Disk duplexing (see fig. 9.5) enables the primary and secondary disks to be attached to separate disk controllers. This feature makes the server fault tolerant toward disk controller failures. Note that SFT Level II includes the features and capabilities of SFT Level I.

Figure 9.5 SFT Level II disk duplexing.

SFT Level III

SFT Level III enables a second server to act as a backup for a primary server if two servers are connected by a high-speed bus (see fig. 9.6). If the primary server fails, the secondary server takes over. SFT Level III includes SFT Level II.

Figure 9.6 SFT Level III server duplexing.

UPS Monitoring

You can use Uninterrupted Power Supply (UPS) to provide a regulated power supply and minimize the impact of power failures (see fig. 9.7). UPS guards against data loss at both the workstation and the server by keeping them up in case of power failure. The power is supplied to the server or workstations through the UPS device, even under normal circumstances with no power failures. The UPS device provides a well-regulated power supply. If the main power line fails, the UPS is capable of continuing to supply this power while its batteries last. If the main power supply fails, the UPS sends a signal to the server that power failure has occurred. The UPS.NLM, which must be loaded at the server, receives the signal and is capable of performing an immediate shutdown of the server or waiting for a certain time before initiating a shutdown. Many UPS devices are capable of sending a separate signal when the UPS battery is depleted, and this capability can be used to initiate server shutdown.

Figure 9.7 UPS monitoring.

Overview of Backup Services

In NetWare 4.x, backup services are consolidated in SBACKUP.NLM. Because SBACKUP is an NLM, it can run only on a NetWare server. The server on which the SBACKUP.NLM runs should have a backup device. This server is called the host server. The data source that is to be backed up and restored is called the target. The target data can be file systems or databases on network nodes such as NetWare 3.x or 4.x, or DOS or OS/2 workstations (see fig. 9.8).


STUDY NOTE: NetWare 4.x backup services are consolidated in SBACKUP.NLM.

Figure 9.8 SBACKUP host and target machines. You can use many backup strategies with NetWare 4.x. These strategies include the following:


STUDY NOTE: SBACKUP supports full backup, incremental backup, differential backup, and custom backup.

Full Backup

In full backup, all data is backed up, including all diretories and files on a volume, or all volumes on a file server. After the data is backed up, the archive bit is cleared for all backed up files.

The archive bit indicates whether the data should be backed up. When a file is modified, the archive bit is set indicating that the file is a candidate for backup. Backup programs clear the archive bit to indicate that backup is complete.

The full backup strategy is the most comprehensive of all backup strategies because it backs up all files regardless of whether they have been modified since the last backup. Because of the large volume of data that might need to be backed up, however, full backup is the slowest of the backup strategies.


STUDY NOTE: The following points are true about full backups:


Incremental Backup

Incremental backup backs up all files modified since the last backup (full or incremental). Files that have not been modified are not backed up. To obtain a complete record of the most up-to-date versions of the files, start with the most recent full backup and add all the incremental changes recorded in each incremental backup session. Because only modified files are backed up, the incremental backup strategy tends to be very fast. If the number of files modified between incremental backup increases, the time required for an incremental backup also increases.

After performing an incremental backup, the archive bits of the backed up files are cleared.


STUDY NOTE: The following points are true about incremental backups:


Differential Backup

Differential backup backs up all files modified since the last full backup. The archive bit is not cleared at the end of the backup, as is done in the case of full and incremental backups. This means that all files backed up in the first differential backup also are backed up in the second differential backup, together with any files modified since the first differential backup. This process continues with each differential backup, and more files can be expected to be backed up with each differential backup.

To obtain a complete record of the most up-to-date versions of the files, start with the most recent full backup and add to it the files in the most recent differential backup session.

Because the differential backup contains all files modified since the last full backup, you can restore data with just two tape backup sets: the backup set for the full backup and the backup set for the last differential backup.

If the data on one of the last differential backups is corrupted, you can fall back on the next-to-the-last differential backup. On the other hand, if any data in another differential backup tape is corrupted, it does not matter as long as the data in the most recent differential backup is good.

Because all modified files are backed up, the differential backup is the same as the incremental backup for the first backup after the full backup. After that, the size of the data that needs to be backed up tends to grow with each differential backup. If all files have been modified, the differential backup session is the same as the full backup sessions. This tends not to be the case, because most network volumes contain a mix of program and data, and program files usually are not modified.


STUDY NOTE: The following points are true about differential backups:


It is best to use either a differential backup or incremental backup strategy. Mixing these two, while theoretically possible, can lead to confusion and should therefore be avoided.

Custom Backup

Custom backups give you complete control over what files to back up or not to back up. You can include or exclude parts of the directory structure to be backed up or select different types of data items to be backed up. Custom backup options are presented in detail in a later section in this chapter.

Custom backups are useful if you want to selectively back up a few files and directories rather than wait for a scheduled backup.

Examining Storage Management Service

NetWare 4.x implements backup services using Storage Management Service (SMS). SMS enables data to be backed up and restored independent of the backup hardware and file system. The SMS supports a variety of backup hardware devices and can back up DOS, OS/2, Macintosh, and Unix file systems. The capability to back up different file systems is particularly important because NetWare-based networks support a heterogeneous workstation operating system environment. SMS provides support for the following workstations and data representation:

The primary tool that uses SMS is SBACKUP. SBACKUP runs as an NLM and relies on target service agents to communicate a data representation to it. The SBACKUP.NLM runs on the server that has the backup device. The SBACKUP.NLM is responsible for backup and restore operations. The NBACKUP function of earlier NetWare releases is now consolidated in SBACKUP.

The target service agents can run on NetWare servers and communicate with servers and workstations on the network. The target service agents have knowledge of different data representations. A target service agent called TSA410.NLM, for example, is used to back up/restore NetWare 4.x file systems, and the target service agent TSA311.NLM does the same for NetWare 3.x. Table 9.1 contains a list of TSAs installed with NetWare 4.x. These TSAs can be found in the SYS:SYSTEM directory.

Table 9.1 Target Service Agents

TSA Name Description
TSA311.NLM NetWare 3.11 file system TSA.
TSA312.NLM NetWare 3.12 file system TSA.
TSA410.NLM NetWare 4.1 file system TSA.
TSA410.NLM NetWare 4.0, 4.01, 4.02 file system TSA
TSA220.NLM NetWare 2.2 file system TSA.
TSADOS.NLM TSA for backing up DOS files--runs at server.
TSASMS.COM TSA runs at DOS workstation to be backed up/restored. Normally kept in the C:\NWCLIENT directory of the workstation.
TSANDS.NLM NetWare 4.1 TSA for backing up NDS.
TSA_OS2.NLM TSA for backing up OS/2 file system.


STUDY NOTE: The following apply to SMS:


SMS Architecture

Besides SBACKUP.NLM and TSAs, SMS consists of a number of other support NLMs that work together to provide backup and restore operations. Figure 9.9 shows how this can be done.

SMS consists of a number of other modules, such as the Storage Management Data Requester (SMDR), that are used to pass commands between the SBACKUP and the TSAs, and device drivers that use the Storage Device Interface (SDI) to communi-cate between the SBACKUP program and the storage devices.

Figure 9.9 The SMS components.


STUDY NOTE: SBACKUP makes use of SDI and SMDR NLMs.

SBACKUP uses the SMDR to access the TSA. If the TSA is on the same server as the SBACKUP.NLM, the data source is on the same server. An example is using the TSA410.NLM on the host server to back up the host file system. Another example is using the TSA_NDS.NLM on the host to back up the NDS database on the host server.


STUDY NOTE: The Storage Management Data Requester (SMDR) passes commands between the SBACKUP and the TSAs.

The term host refers to the server that has the backup device. The term target refers to the network device (workstation or server) that has the data to be backed up or restored.

If the TSA is on a remote machine, such as a NetWare 3.x server running TSA_311.NLM, the file system on the remote machine can be backed up. It is the responsibility of the TSA to obtain the requested data and pass it on to SBACKUP through the SMDR. The TSA is the agent closest to the source data being backed up and restored. It has knowledge of the file system or data representation of the source data.

SBACKUP is capable of backing up or restoring data by communicating with the backup device through the Storage Device Interface NLM (SDI.NLM) and the backup device drivers. The Storage Device Interface detects the presence of the device and media and presents a list of devices available to the SBACKUP program. The backup operator then can select the appropriate backup device through the SBACKUP interface. The SMDR.NLM provides a high-level interface to the backup device drivers. The backup device drivers have knowledge of the backup device hardware and use commands for reading, writing, rewinding, and ejecting the storage media. The SDI.NLM, SMDR.NLM, STREAMS.NLM, CLIB.NLM, SPXS.NLM, and NWSNUT.NLM are autoloaded when SBACKUP loads.

To back up and restore workstations, a component called the Workstation Manager (WSMAN.NLM) must be loaded on the host server. WSMAN.NLM is autoloaded when TSADOS or TSA_OS2 loads. The Workstation Manager keeps an internal list of DOS TSRs (or OS/2 and Unix daemons) that have contacted it and are available for backup/restore operation.


STUDY NOTE: Please note the following facts about SBACKUP-related components:


Using the SBACKUP Tool

The SBACKUP.NLM is loaded at the server. It is similar to the SBACKUP.NLM for NetWare 3.x servers but has been customized for the NetWare 4.x operating system.

To use SBACKUP, you first must load all the necessary drivers and TSAs for the target being backed up. NetWare 4.x ships with the tape drivers listed in table 9.2. The TAPEDAI.DSK can work with any tape device on a SCSI controller.


AUTHOR'S NOTE: If the TAPEDAI.DSK driver is not installed in the SYS:SYSTEM directory on the server, you can find a copy of it in the \NW410\DISKDRV directory on the NetWare 4.x CD-ROM.


PRACTICAL TIP: Contact the tape vendor to find out if it has specialized tape device drivers that work with NetWare 4.x SBACKUP. Specialized tape device drivers are optimized for speed and work more efficiently than generic device drivers. The list of drivers bundled with NetWare 4.x changes with time. Contact your Novell reseller or Novell at 1-800-NETWARE or 801-429-7000 for the most recent list of supported drivers.

Table 9.2 Backup Device Drivers

Device Driver Description
TAPEDAI.DSK A generic ASPI-compatible tape driver for SCSI controllers. It is designed to use the Advanced SCSI Programming Interface (ASPI). ASPI is a programming interface promoted by the company Adaptec. Most SCSI drive vendors have adopted it.
MNS16S.NLM and MNSDAT.DSK Device drivers for Mountain Network Solutions, Inc. SCSI controllers and tape devices.
PS2SCSI.DSK Work with PS/2 SCSI controllers and IBM 2.2 GB 8mm tape devices.
AHA1540.DSK, AHA1640.DSK, AHA1740.DSK, ASPITRAN.DSK Work with devices that use the Adaptec 1540, 1640, and 1740 controllers.


STUDY NOTE: To use SBACKUP, first load all the necessary drivers and TSAs for the target being backed up.
The TAPEDAI.DSK can work with any tape device on a SCSI controller.

Using SBACKUP

The following steps guide you through the basics of performing an SBACKUP.


AUTHOR'S NOTE: The actual screens presented using SBACKUP often depend on the selections you make from the SBACKUP menu for your network environment. You can select the Backup option without logging on to the Target Service first, for example. In this case, you are presented with a screen to log in to the target service first before performing the backup operation. Another example is writing labels on tapes. If you are using a new tape or completely rewriting the tape and you have not written a new label on the tape, you are given a screen to label the tape.
1. First, load the appropriate backup device drivers on the server console by typing the following command:
		LOAD TAPEDAI
If you are using a SCSI controller, you might be able to use the generic TAPEDAI.DSK device driver.

Figure 9.10 shows the server console screen when this device drive loads. The version number of the TAPEDAI.DSK and its date of creation are displayed. In this particular version of the TAPEDAI driver, three outdated API calls were found and a warning message was generated.


PRACTICAL TIP: TAPEDAI uses the ASPI interface. ASPI does not provide sharing of tape devices between competing applications. Do not load any other device that uses ASPI when using the TAPEDAI driver.

Figure 9.10 The LOAD TAPEDAI messages.

2. Optional: Load any other device drivers required by the manufacturer's hardware.

3. Load the TSA agents on the target. For this example, back up the NetWare 4.x file system and the NDS database. You must, therefore, load the TSA410.NLM and the TSANDS.NLM by typing the following commands:
		LOAD TSA410
		LOAD TSANDS
Figure 9.11 shows the server console screen when the TSA for the NetWare 4.x file system loads. The version number of the TSA agent and its date of creation are displayed.

Figure 9.12 shows the server console screen when the TSA for the NDS database loads. The version number of the TSA agent and its date of creation are displayed.

Figure 9.11 The LOAD TSA410 messages.

Figure 9.12 The LOAD TSA_NDS messages.

4. Before loading the SBACKUP.NLM, issue the command SCAN FOR NEW DEVICES. This command ensures that the tape device recognized by TAPEDAI is registered by NetWare 4.x.

You can use the command LIST DEVICES to see current devices. The commands below show the list of devices before and after executing the SCAN FOR NEW DEVICES command.
		LIST DEVICES
		SCAN FOR NEW DEVICES
		LIST DEVICES
Figure 9.13 shows the output of the LIST DEVICES command. Only one device, device # 0, is listed. This is the Micropolis 1528 hard disk with 1.2 GB capacity.
		SCAN FOR NEW DEVICES

Figure 9.13 The LIST DEVICE command before scanning for new devices.

Figure 9.14 shows the output of the preceding SCAN FOR NEW DEVICES command. No output is generated, but the command takes a few seconds.

Figure 9.14 Executing the SCAN FOR NEW DEVICES command.


PRACTICAL TIP: When you execute the SCAN FOR NEW DEVICES command, the light indicators on the backup device light up when the device is accessed. If this does not happen, check for a loose cable or incorrect hardware configuration for the tape device.
Figure 9.15 shows the output of the last LIST DEVICES command after the SCAN FOR NEW DEVICES recognizes the backup device. An additional device, device # 1, is listed. This is the HP 35470A tape drive unit for DAT tapes.

5. Load the SBACKUP.NLM by entering the following commands:
		LOAD SBACKUP
		LIST DEVICES

Figure 9.15 The LIST DEVICE command after scanning for new devices.


PRACTICAL TIP: SBACKUP has a SIZE and BUFFERS option, as shown in the following:

LOAD SBACKUP SIZE=sizeInKB  BUFFERS=numberOfBuffers

The SIZE parameter is the buffer size used by SBACKUP in KB. The value ranges from 16, 32, 64, 128, or 256 KB. The default value is 64 KB.
The BUFFERS parameter is the number of buffers reserved by SBACKUP. The value can range from 2 to 10. The default value is 4.

You can experiment with higher values to improve backup performance. If you do, take into account the additional memory required by SBACKUP. This could adversely affect server performance. Selecting a buffer size of 256 KB and 10 buffers, for example, requires an additional 2.56 MB of server RAM. Because NetWare 4.x does not use virtual memory, this is a real RAM requirement.


After you load SBACKUP, you can use it to perform backup and restores.

Unload SBACKUP and the support NLMs in the reverse order of their load sequence; that is, unload SBACKUP first, then the TSA NLMs, and finally the backup device drivers. An example of this unload sequence follows:

UNLOAD SBACKUP

UNLOAD TSANDS

UNLOAD TSA410

UNLOAD TAPEDAI


PRACTICAL TIP: Unload SBACKUP and the support NLMs in the reverse order of their load sequence; that is, unload SBACKUP first, then the TSA NLMs, and finally the backup device drivers.

Using SBACKUP to Perform a Backup

The following steps explain how to perform a backup operation. The steps assume that all the necessary drivers have already been loaded. If you have not done this, please refer to the previous section.

1. Load the SBACKUP.NLM on the host server by typing the following command:
		LOAD SBACKUP
After SBACKUP loads, the SBACKUP main menu appears, as shown in figure 9.16.

Figure 9.16 The SBACKUP Main Menu.

The Backup option enables you to specify a target to back up. It also asks you to specify the location of the session log, the device and media to use, and the type of backup to perform.

The Restore option enables you to specify the target to which you want to restore. It asks you to specify which data you want to restore and the location to which you want it restored. If a session log has been maintained, you can restore based on the session name. Alternatively, you can select the data directly from the tape. One reason for restoring directly from tape is that the session log file has been deleted or is corrupted. Restoring from a session log is convenient and quicker.

The Log/error File Administration option enables you to browse through the error log file created during a backup or restore session. This option provides a quick way to determine if any errors occurred during backup or restore operations.

The Storage Device Administration option enables you to choose the device and media to use for the backup or restore operation. This option is useful if you have more than one backup device. You also can use it to check the status of the media in the backup device.

The Change Target to Back Up From or Restore To option displays the names of the targets to which you are attached. You can select a target for performing an operation. When you do so, you are asked to specify a username/password for logging on to the target.

2. Select Storage Device Administration to see the list of backup devices (see fig. 9.17). In figure 9.17, only one backup device is shown because only one backup unit is attached to the host server. From figure 9.17, you can see that the HP 35470A device is available for use.

Figure 9.17 The list of devices.

3. Press Tab to display the status of the device, shown in figure 9.18.

The Current operation indicates whether the device is currently reading, writing, or formatting the media. Its value is shown as None: no operation is being performed by the device. Device mode indicates whether the device is selected for reading, writing, or both. Maximum capacity indicates the storage capacity of the media in the backup device. In figure 9.18, the Maximum capacity has a value of "unknown" because the tape device driver does not report the media status.

Figure 9.18 Device status.

4. Next, label the media in the device. If the media has never been labeled, you can label it now or postpone it until later in the Backup option, when you are prompted to label the media.

To change or add a label to the media, follow these steps:
a. Highlight the device, press F3, and enter the media label name.

b. To view the label for the media, highlight the backup device from the List of devices menu and press Insert.

The media for the device appears, as shown in figure 9.19.

In figure 9.19, the media has the label NETWARE_LABEL, which means that it was labeled in an earlier SBACKUP operation.

Figure 9.19 The media list.

c. Press Tab on the media listed to view the status of the media (see fig. 9.20).

Figure 9.20 The status of the media in the backup device.

If pressing Tab doesn't work, press Esc to return to the List of devices screen and press Enter or the device you plan to use. Then try the listed steps again.

If the media was written by an SMS application (such as SBACKUP), the media owner is not displayed. If the media was written by a non-SMS application, or if it was initially "blank," the media owner is listed as "Unidentified."

Select the media you want to use by highlighting it and pressing Enter.

You are informed which media you have selected (see fig. 9.21).

Figure 9.21 The selected media.

In the media status box, Number in media set shows the media (tape) number within a particular media set. If the backup session takes more than one tape, the tapes are numbered consecutively in the order in which they are used. In figure 9.20, the first of these tapes is identified with the number 1.

Creation time shows the time when the media label was created and used.

Mount status indicates a value of "Mounted," "Mount Pending," "Not Mounted," or "unknown." A "Mounted" value indicates that the media is ready for reading or writing. A "Mount Pending" value indicates that the request to mount is waiting in a queue to be processed. "Not Mounted" indicates that the media is not mounted in the device.

Media mode indicates whether the media is selected for reading, writing, or reading and writing, or if the mount request is pending.

The Media type indicates the type of media in the device, such as a 4mm or 8mm tape.

Total capacity indicates the capacity of the media. If the driver does not report this value, a value of "unknown" is shown.

5. Select the Change Target to Back Up From or Restore To option from the SBACKUP Main Menu.

Figure 9.22 shows the target service choices that are running. Because the TSA410.NLM and TSA_NDS.NLM were loaded, you see that the target services are NetWare 4.0 Directory (NDS) and the NetWare 4.0 File System.

Figure 9.22 The running target services.

6. In this backup example, select the NDS database for backing up. Select the NetWare 4.0 Directory option.

You are then prompted for the user name for the target NDSTS (NDS target service) and the password, as shown in figures 9.23 and 9.24.

Figure 9.23 The prompt for the user name of the target NDSTS.

Figure 9.24 The prompt for the password of the target NDSTS.


PRACTICAL TIP: If you are having a problem logging in with a user name, use the complete name. If you are logging in as user Admin in container O=ESL, for example, use the following name:

.CN=Admin.O=ESL

Some of the NLMs expect complete names with attribute type specifications.


If you are logged in correctly, a status message appears informing you that you are connected to the target service. If you do not see this message, check to see if the complete user name you typed exists and that you have entered the password correctly.

The target you are connected to always is reported on the top part of the SBACKUP screen.

7. From the SBACKUP main menu, select Backup. A box appears displaying the media and backup device to be used, as shown in figure 9.25. If you did not select the media type in step 2, a prompt appears asking you to do so.

Figure 9.25 Device media to be used for backup.

8. Another prompt appears asking you to select a location for the log and error file (see fig. 9.26). If you have been using SBACKUP for some time and already have selected this option, this screen is bypassed.

Figure 9.26 Location of log/error files.

The default location is SYS:SYSTEM/TSA/LOG. You can, however, select any other location.

9. Next, you are asked if you want to perform a full backup or a custom backup (see fig. 9.27). In general, the choices are Full, Differential, Incremental, and Custom. For backing up an NDS database, however, your choices are Full and Custom only. The different backup types are explained earlier in the chapter.

Figure 9.27 Type of backup.

10. For this example, select the Full backup method. The Backup Options box appears (see fig. 9.28).

Figure 9.28 Backup options.

11. Enter a description of what you want to back up.

Keep the description informative because when you select data to be restored, you are presented with a choice of the backup descriptions that you enter at this step.

12. To proceed with the backup, press F10. You are given a choice of when to start the backup (see fig. 9.29).

Figure 9.29 Proceed with backup options.

13. Select Start the Backup Later to access a form to schedule a backup at a future date and time (see fig. 9.30).

Select Start the Backup Now.

Figure 9.30 Scheduling a backup.

A status screen appears (see fig. 9.31). Press Enter to proceed to the next step.

Figure 9.31 The status screen on media label.

14. If the media is being completely overwritten, you are prompted for the label. Enter the name of the label for the media set.

15. As the backup proceeds, a status window on the upper right corner of the screen informs you of the status of the backup. It shows the elapsed time and the amount of data backed up, among other things. The data that is backed up appears in the upper left corner of the screen.

16. At the end of the backup, a message appears informing you that the backup is complete (see fig. 9.32).

Press Enter to continue and exit SBACKUP.

Figure 9.32 The backup completion screen.


STUDY NOTE: The default location of the SBACKUP error log files is SYS:SYSTEM\TSA\LOG.

Using SBACKUP to Perform a Restore

The following steps explain how to complete a restore operation. The steps assume that all necessary drivers have already been loaded.

1. Load the SBACKUP.NLM on the host server by typing the following command:
LOAD SBACKUP
After SBACKUP loads, the SBACKUP main menu appears. The SBACKUP options are described in the previous section, "Using SBACKUP to Perform a Backup."

2. Select Storage Device Administration to see the list of devices to which to back up.

3. Press Ins to see the media in the device (see fig. 9.33).

Figure 9.33 The media list of backup devices.

Highlight the media and press Enter to select the media to restore from (see fig. 9.34).

4. Press Tab on the media that is listed to view the status of the media.

Refer to the previous section on performing a backup using SBACKUP to see a description of the media status.

Figure 9.34 The selected media.

5. Select Change Target to Back Up From or Restore To from the SBACKUP main menu.

Figure 9.35 shows the choices of target services that are running. Because the TSA410.NLM and TSA_NDS.NLM were loaded, the target services are NetWare 4.0 Directory (NDS) and the NetWare 4.0 File System.

Figure 9.35 Running restore target services.

6. For this restore example, select the NDS database for restoring. If you select the NetWare 4.0 Directory option, you are prompted for the user name of the target NDSTS (NDS target service) and the password, as shown in figures 9.36 and 9.37.

Figure 9.36 Prompt for the target NDSTS user name.

Figure 9.37 Prompt for the target NDSTS password.


PRACTICAL TIP: If you are having a problem logging in as a user name, use the complete name. If you are logging in as user Admin in container O=ESL, for example, use the following name:

.CN=Admin.O=ESL


7. If you are logged in correctly, a status message informs you that you are connected to the target service. If you do not see this message, check to see if the complete user name you typed exists, and that you have entered the password correctly.

8. From the SBACKUP main menu, select Restore. You are presented with a choice of restoring with session files or without session files (see fig. 9.38). Restoring with session files is simpler, but you might have to select restoring without session files if the log file has been deleted or corrupted.

Figure 9.38 The session restore options.

If you select Choose a Session to Restore , you are asked to select a location for the log and error files (see fig. 9.39). If you have been using SBACKUP for some time and have already selected this option, this screen is bypassed. The default location is SYS:SYSTEM/TSA/LOG. If you selected a different location at the time of backup, specify this location.

Figure 9.39 Selecting the location of the log and error files.

9. Figure 9.40 shows the different backup sessions that have been performed. The most recent session is listed first. Highlight the session you want to restore and press Enter.

Figure 9.40 A list of sessions to restore from.

If the session files are not available, use the Restore Without Session Files option explained later in this chapter.


PRACTICAL TIP: Keep descriptive names of the sessions so that you can identify them later.
10. Next, select a device and media from which to restore (see fig. 9.41).

Figure 9.41 A status message for selecting device and media.

Insert the media in the device, if you have not done so already.

11. Press Enter to continue. A Please wait message is displayed on-screen as the media is read. The backup device and media you are to use also are displayed (see fig. 9.42).

Figure 9.42 Media and device to be used for restoring.

12. You are presented with Restore options (see fig. 9.43). Select Restore an Entire Session.

Figure 9.43 The restore options for NDS.

13. You are asked to verify your choice (see fig. 9.44). Select Yes.

Figure 9.44 Verify the restore operation.

14. As the restore proceeds, a status window is displayed on the upper right corner of the screen, informing you of the status of the restore. You see the elapsed time and the amount of data restored, among other information. The data that is restored is shown on the upper left corner of the screen.

At the end of the restore, a message appears informing you that the restore is complete (see fig. 9.45).

15. Press Enter. Next, exit SBACKUP.

Figure 9.45 Restore completion.

Restoring without Session Files

Occasionally, you might have a corrupted session log, or the session log might have been accidentally deleted, or the session log might not exist if you are restoring to a different server. In these cases, you must perform the restore without a session log. Perform the following steps, which complement the steps outlined in the previous section.

1. Complete steps 1 to 4 from the preceding section.

2. From the SBACKUP Main Menu, select Restore. You are given the choice of restoring with session files or without session files. Select Restore Without Session Files if the session files are corrupt or have been deleted. A message appears that indicates that you must select the device and media from which to restore.

3. Press Enter. SBACKUP identifies the media you have inserted.

4. Press Enter.

5. The restore options appear. Make the appropriate choices.

6. After selecting the restore options you want, use the F1 key if in doubt about their functions. (The meanings of these restore options are covered in the next step.)

7. Press F10. Verify that you want to continue.

8. SBACKUP reads the sessions from the media. Figure 9.46 shows the first session found.

Figure 9.46 A session description read from media and its restore options.

If this is not the session you want to restore, select No, Go on to the Next Session on the Media. When many sessions are on the media, this procedure can take a long time.

When you find the session you want to restore, select Yes, Restore This Session.

9. Proceed with the restore operations outlined in the preceding section.

Using Restore Options for Restoring a File System

The example of the restore operation was given in the context of restoring an NDS database. The restore options for restoring a file system are quite different. This section discusses the restore options peculiar to restoring a file system.

When you select the Restore a Session option from the Restore Menu for restoring a file system, you are asked to select the device/media and the name of the session from which to restore. Then the restore options shown in figure 9.47 appear.

Figure 9.47 Restore options for restoring a file system.

Select Subsets of the session to be restored from the Restore Options menu to view the data items (also called data structure) available for restoring (see fig. 9.48). This option classifies data items as Major TSA or Minor TSA resources. A Major TSA resource contains data that can be backed up as a whole when selected. Examples of Major TSAs are the file server and the volume. When you select a Major TSA resource such as a volume, all directories and files within it are considered for restore operation. A Minor TSA resource is contained within a directory structure of a Major TSA resource. An example of this is the directories and files within a volume.

Figure 9.48 Selecting restore subsets.

To include an entire volume for a restore operation, select Include major TSA resources. The box shown in figure 9.49 appears. Press Insert to see a list of major TSA resources available for selection (see fig. 9.50).

Figure 9.49 The Include major TSA resources box.

Figure 9.50 Selections for Major TSA resources.

You can use the other options for excluding or including directories or files. If you want to include a specific directory for backup, select Include directories (full path) from the Choose subsets of the session to be restored menu and press Insert to add a directory name. Figure 9.51 shows that the directory SYS:SYSTEM is selected for restore operation.

Figure 9.51 Using the Include directories option.

Select How to scan the session to be restored from the Restore Options form to view options for excluding different aspects of the file system (see fig. 9.52). This option is used for searching for the type of data contained in the data sets being restored. A data set is a group of data files and directories being restored.

Figure 9.52 The How to Scan the Session to be Restored menu.

You can select data sets to exclude from the restore operation. If you want to restore a type of data from this list, select No; otherwise, select Yes. By default, all the Exclude options have a value of No, meaning that all aspects of the data set are to be scanned for the restore operation.

The Exclude option works in conjunction with the options Subsets of the session to be restored, and Overwrite. It narrows the types of data sets scanned for in the restore operation. You can use this to exclude or include any of the following:

To restore data to a different location from where it was backed up, set the Restore data to different location field to Yes. (The default value for this field is No, which means that data is restored on top of existing data.)


STUDY NOTE: While restoring files and directories, you can exclude or include any of the following:


Using Custom Backup Options

The example backup operation (in the section "Using SBACKUP to Perform a Backup") was given in the context of an NDS database. The backup options are different when the custom Backup Method is selected for file systems.

When you select the Custom: Only Specified Data option from the Type of Backup menu (refer to figure 9.27), the custom backup options shown in figure 9.53 appear.

Figure 9.53 Custom backup options for a file system.

Select What do you want to back up? to view the Major TSA resource that is to be backed up (see fig. 9.54). Press Ins for a choice of other Major TSAs to back up.

Figure 9.54 The What to Back Up menu.

Select Subsets of what you are backing up from the What to Back Up menu to view the data items available for backing up (see fig. 9.55). This option classifies data items as Major TSA or Minor TSA resources.

Figure 9.55 Selections for the What do you want to back up? option.

To include an entire volume for a restore operation, select Include major TSA resources from the Choose subsets of what you are backing up menu (see fig. 9.56). The box shown in figure 9.57 appears. Press Ins to view a list of major TSA resources available for selection (see fig. 9.58).

Figure 9.56 The Choose subsets of what you are backing up menu.

Figure 9.57 The Include major TSA resources box.

Figure 9.58 Major TSA resources available for backup.

Select How to scan for what you are backing up from the What to Back Up menu to view the options for excluding different aspects of the file system (see fig. 9.59). This option shows the type of data contained in the data sets for the type of target (NetWare 4.x file system, in this case) being backed up.

Figure 9.59 The How to Scan What You Are Backing Up options.

Select the data sets you want to exclude from the backup operation. If you want to back up a type of data from this list, select No; otherwise, select Yes. By default, all the Exclude options have a value of No. This means that all aspects of the data set are scanned for the backup operation. The Exclude option works with the Choose subsets of what you are backing up option. You can exclude (Yes) or include (No) any of the following:

Using SBACKUP and Compressed Files

Using SBACKUP, you can specify whether to back up files in a compressed state. The default on NetWare 4.x volumes is that compression is enabled. This default is set at the time a volume is first created as part of the server installation.

In general, you should back up compressed files in their compressed state because the backup is faster. If you back up compressed files in the compressed state, you cannot restore them to a NetWare server that does not support the NetWare 4.x compression.

It is not a good idea to run SBACKUP when file compression is occurring on the volume; this degrades the performance of SBACKUP. Both the default time for compressing newly created or modified files and scheduling a delayed backup is 12:00 a.m. Therefore, you should schedule SBACKUP several hours after volume compression begins.

Using SBACKUP Log and Error Files

You administer the SBACKUP session files by selecting Log/error File Administration from the SBACKUP main menu. Figure 9.60 shows the options available when this item is selected. Select View a Log File to see a list such as that shown in figure 9.61. Similarly, you can view an error file by selecting View an Error File. Select Set Location of Log and Error Files to specify the location of log and error files (see fig. 9.62).

Figure 9.60 The Log/error File Administration menu.

Figure 9.61 Selecting a log file to view.

Figure 9.62 Setting the location of log and error files.

Examining SBACKUP Rights and Security Issues

Before you can use SMS, the backup operator must be able to log into NDS. To perform SBACKUP, you also need Read and File Scan rights to the file system being backed up. These rights enable the operator to read the files and scan for names of files in directories being backed up.

If you are performing an incremental or full backup, clear the archive bit at the end of the backup pass. To do this, the backup operator must have Modify rights. To back up the NDS database, you must be able to view the NDS tree structure and read the property values of the NDS object. To perform these operations, the backup operator must have Browse object trustee rights to the NDS tree, and Read property rights to All Properties. Because Browse rights are assigned to the implicit group [public], no special considerations need to be made, unless these rights are blocked by the IRF. The Read All Properties rights must be assigned to the root of the NDS subtree for which the backup operator has authority.

If the TSA at the workstation has a password set, the backup operator must have knowledge of this password.


STUDY NOTE: The following guidelines apply to SBACKUP file rights:


Backing Up DOS Workstations

You can use SBACKUP to back up and restore DOS workstations. Specific drives and directories can be backed up at the workstation. To perform a backup/restore of the DOS workstation, follow these steps:

1. Load TSADOS.NLM at the server. This autoloads WSMAN.NLM, which is required.

2. Load TSASMS.COM at the workstation. TSASMS.COM can be found in the C:\NWCLIENT directory on the workstation.

3. Load SBACKUP and select the DOS workstation's TSA. Do this by selecting Change Target to Back Up From or Restore To from the SBACKUP main menu to see a list of the TSA agents registered with SBACKUP running on the host server.

Backing up DOS workstations is covered in more detail in the second part of this book.

Caveats when Using SBACKUP

Keep in mind these useful caveats when performing SBACKUP:


PRACTICAL TIP: Always have an extra supply of reusable tapes on hand in case you need to back up more data than usual.

Study Guide for the Chapter

If you are preparing for passing exams, review the chapter with the following goals:

1. Understand the system fault-tolerant features of NetWare 4.x and that SMS is the principal tool used for performing SBACKUP. Use the Study Notes as a quick review.

2. Pay particular attention to the different types of backup techniques.

3. After studying this chapter, attempt the sample test questions. If you make mistakes, review the appropriate topics until you understand the reasons for the correct answers.

Chapter Summary

This chapter discusses the native backup service for NetWare 4.x. NetWare 4.x backup uses the Storage Management Services (SMS). The primary tool that uses SMS is SBACKUP.NLM.

You can use SBACKUP to support different types of backup strat-egies such as full backup, differential backup, and incremental backup. The advantages and disadvantages of each type of backup strategy are discussed.

The chapter explains in detail the operation of SBACKUP for backup and restoring operations.

Chapter Test Questions

Test questions can have a single correct answer or multiple correct answers. Where a single answer is desired, a l notation precedes the possible answers. Some questions require you to select more than one answer. These questions are indicated by the n preceding each answer. Not all questions are multiple choice. Occasionally, a question asks you to type in an answer. The answer in this case is usually a one-word answer. The answer is not case sensitive, so you can type in the answer in lower- or uppercase.

Certain questions are repeated in different ways so you can recognize them even when the wording is different. Taking practice quizzes not only tests your knowledge, it gives you confidence when you take your exam.

1. NetWare 4.x backup services are consolidated in ______.

A. SBACKUP.NLM

B. SBACKUP.EXE

C. NBACKUP.NLM

D. NBACKUP.EXE

2. Which of the following backup methods are supported by SBACKUP?

A. Full backup

B. Modified backup

C. Fast backup

D. Incremental backup

E. Differential backup

3. In full backup, ______.

A. the archive bits of all files that are backed up are cleared

B. only modified files that have their archive bit set are backed up

C. the archive bits of the backed up files are not cleared

D. the archive bits of the manually selected files are not cleared

4. In incremental backup, ______.

A. the archive bits of all files that are backed up are cleared

B. only modified files that have their archive bit set are backed up

C. the archive bits of the backed up files are not cleared

D. the archive bits of the manually selected files are not cleared

5. In differential backup, ______.

A. the archive bits of all files that are backed up are cleared

B. only modified files that have their archive bit set are backed up

C. the archive bits of the backed up files are not cleared

D. the archive bits of the manually selected files are not cleared

6. Which of the following statements about the full backup strategy is true?

A. It takes the shortest amount of backup time.

B. It enables files to be selectively backed up.

C. It takes more time than incremental backup but less time than differential backup.

D. It takes the longest amount of backup time.

7. Which of the following statements about the incremental backup strategy is true?

A. It takes the shortest amount of backup time.

B. It enables files to be selectively backed up.

C. It takes more time than differential backup but less time than full backup.

D. It takes the longest amount of backup time.

8. Which of the following backup methods contains a sequential history of the files that have been modified?

A. Full backup

B. Incremental

C. Differential

D. Custom

9. To restore data in incremental backup, you will need ______.

A. the last full backup

B. the last full backup and last incremental backup

C. the last full backup and first incremental backup

D. the last full backup and every incremental backup after it

10. If any data in a differential backup tape not belonging to the last differential backup set is corrupted, ______.

A. the data cannot be recovered

B. the data can still be recovered from the last full backup and the first differential backup

C. the data can still be recovered from the last full backup

D. the data can still be recovered from the last full backup and the most recent differential backup

11. If the last differential backup is bad, ______.

A. you can restore data only up to the next to the last differential backup

B. the data can still be recovered from the last full backup and the first differential backup

C. the data can still be recovered from the last full backup

D. the data can still be recovered from the last full backup and the most recent differential backup

12. Custom backup enables you to ______.

A. include parts of the directory structure to be backed up or select different types of data items to be backed up

B. include/exclude parts of the directory structure to be backed up or select different types of data items to be backed up

C. exclude parts of the directory structure to be backed up or select different types of data items to be backed up

D. include but not exclude parts of the directory structure to be backed up

13. Which of the following TSAs can be used for backing up a NetWare 4.x file system?

A. TSA311.NLM

B. TSA41.NLM

C. TSA410.NLM

D. TSADOS.NLM

E. TSA_DOS.NLM

F. TSANDS.NLM

G. TSA_NDS.NLM

14. Which of the following TSAs can be used for backing up an NDS database?

A. TSA311.NLM

B. TSA411.NLM

C. TSA400.NLM

D. TSADOS.NLM

E. TSA_DOS.NLM

F. TSANDS.NLM

G. TSAXNDS.NLM

15. SMS enables data to be backed up and restored ______.

A. independent of the backup hardware but dependent on the file system

B. independent of the backup hardware and file system

C. independent of the file system but dependent on the backup hardware

D. in a manner independent of the operating system

16. SBACKUP makes use of ______.

A. SDI.NLM

B. DIBI.NLM

C. SMDR NLMs

D. VLMs

E. SQRDR.NLM

17. SBACKUP autoloads which of the following NLMs if they are not already loaded?

A. SDI.NLM

B. SMDR.NLM

C. TSA410.NLM

D. STREAMS.NLM

E. TSA_NDS.NLM

F. CLIB.NLM

G. SPXS.NLM

H. NWSNUT.NLM

18. Storage Management Data Requester (SMDR) is used to ______.

A. pass commands between SBACKUP and the SDI NLM

B. pass commands between SBACKUP and the TSAs

C. pass commands between the SDI and the device driver

D. communicate with the SDR NLM

19. Which of the following NLMs are not auto-loaded by SBACKUP?

A. SDI.NLM

B. SMDR.NLM

C. TSA410.NLM

D. STREAMS.NLM

E. TSANDS.NLM

F. CLIB.NLM

G. SPXS.NLM

H. NWSNUT.NLM

20. The Storage Device Interface is used to ______.

A. detect the presence of the device and media and present a list of devices available to the SBACKUP program

B. communicate with the TSA

C. detect the presence of the correctly configured device driver

D. communicate with the SMDR NLM

E. communicate with the SDR NLM

21. To back up and restore workstations, the ______ must be loaded on the host server.

A. TSA_NDS.NLM

B. TSA400.NLM

C. WSMAN.NLM

D. WS_MAN.NLM

22. WS_MAN.NLM is autoloaded when which of the following NLMs load?

A. TSA_DOS

B. TSA400

C. TSA_OS2

D. TSA_NDS

23. The name of the driver that can work with any tape device on a SCSI controller is ______.

A. TAPEDAI.DSK

B. TAPEDISK.NLM

C. TAPEASPI.DSK

D. TAPEASPI.NLM

24. To unload SBACKUP and the support NLMs, ______.

A. you must unload the TSA NLMs first, then the SBACKUP program, and finally the backup device drivers

B. you must unload SBACKUP first, then the backup device drivers, and finally the TSA NLMs

C. you must unload SBACKUP first, then the TSA NLMs, and finally the backup device drivers

D. you must unload device drivers first, then the TSA NLMs, and finally the SBACKUP program

25. The Log/error File Administration option in SBACKUP enables you to ______.

A. browse through the error log file created in the backup session only

B. browse through the error log file created during a backup or restore session

C. browse through the error log file created during a backup or restore session and edit it

D. edit the error log file created during a backup or restore session

26. The default location of the SBACKUP error log files is ______.

A. SYS:SYSTEM\TSA\LOG

B. SYS:PUBLIC\TSA\LOG

C. SYS:SYSTEM\SBACKUP\LOG

D. SYS:PUBLIC\SBACKUP\LOG

27. If you are performing an incremental or full backup you must have the ______.

A. Modify right to the files being backed up

B. Access Control right to the files being backed up

C. Supervisor right to the files being backed up

D. Delete right to the files being backed up

28. In read-after-write verification, ______.

A. data is verified by special hardware on all hard disk controllers

B. the data block written to the hard disk is read back and compared with the original

C. data blocks read are compared to previously written data

D. data is verified by error-correcting information


Previous chapterNext chapterContents


© Copyright, Macmillan Computer Publishing. All rights reserved.