Microsoft Word Hardware Reconfiguration Methodology V final2


Download 242.15 Kb.
bet3/70
Sana02.04.2023
Hajmi242.15 Kb.
#1321952
1   2   3   4   5   6   7   8   9   ...   70
Bog'liq
LInux1

Table of contents



Abstract i
Executive summary iii
Table of contents v

  1. Introduction 1

    1. Objective 1

    2. Background 1

      1. Reports 1

      2. Mandates 2

    3. Particulars 2

      1. Reader 2

      2. Navy 3

      3. Report 3

      4. Methodology 4

  2. Technical background 5

    1. Objective 5

    2. Reconfigurations and migrations 5

      1. Background 5

      2. Reconfigurations 6

      3. Migrations 6

    3. Operating systems 7

      1. Background 7

      2. Definition 7

      3. System dependencies 7

        1. Interdependencies 7

        2. System calls 8

    4. Compatibility issues 8

      1. Background 8

      2. Upgrades 9

      3. Updates 9

      4. Manual maintenance 10

      5. Issues 11

        1. Potential problems 11

        2. Solutions 11

        3. Tools 12

    5. Summary 13

  3. Methodology I - backup and restoration 15

    1. Objective 15

    2. Backup considerations 15

      1. Plan development 15

      2. Tools. 15

      3. Data-related factors 16

        1. Data type 16

        2. Special attributes 16

        3. Devices 16

        4. Raw data 16

        5. Locked files 16

        6. Data file volatility 17

        7. Running applications and services 17

        8. Active operating system 19

        9. Filesystem availability 20

      4. Other backup factors 20

        1. Media 20

        2. Lifespan and storage 21

        3. Data security requirements 22

        4. Size requirements 23

        5. Data accuracy and relevancy 23

        6. Speed and bandwidth 24

        7. Tool summary 25

        8. Resource availability 25

        9. Backup schedules 26

    3. Filesystem checking for backups and data restoration 27

      1. Filesystems 27

      2. Issues 27

      3. Periodic checks 27

      4. Repairs 28

      5. Scheduling 28

      6. Filesystem formats 29

      7. Bad blocks 29

    4. Restoration considerations 29

      1. Plan development 29

      2. Tools. 30

      3. Various restoration factors 30

        1. Resource allocation and assurance 30

        2. Scripts 30

        3. Data safeguarding 31

        4. Media testing and device diagnostics 31

        5. Alternate methods of restoration 31

        6. Procedure testing 32

        7. System and filesystem availability 32

        8. Operating system restoration 33

        9. Users and applications 33

        10. Databases 34

        11. File attributes 34

        12. Security, compression, and networking 34

        13. Multivolume restoration 35

    5. Miscellaneous 35

      1. Errors 35

      2. Testing 35

    6. Summary 36

  4. Methodology II – system maintenance steps and procedures 37

    1. Objective 37

    2. Introduction 37

    3. System maintenance 38

      1. Reasons for performing system maintenance 38

      2. When and why to perform system maintenance 39

      3. Requirements for system maintenance 41

    4. Maintenance types 42

      1. Short-term 43

      2. Medium-term 44

      3. Long-term 45

    5. Licensing 46

      1. Types 47

      2. Compatibility 47

      3. Permissions and limitations 48

      4. For consideration 48

    6. Laboratory testing 49

      1. Laboratory 49

      2. Laboratory isolation 50

      3. Backing up 50

      4. Benchmarking 50

      5. Incremental changes 51

      6. System administration testing 52

      7. Behaviour and functionality 52

      8. User-related system changes 53

      9. Impact assessment 54

      10. Modifying system configurations 54

      11. Outcome testing 55

      12. Versioning and change control 56

      13. Library and kernel modifications 56

      14. Reconfiguration and migration 57

      15. Documentation 57

      16. Approval process 58

    7. Deployment 58

      1. Backing up 58

      2. Deployment plan 59

      3. Rollout 60

      4. Reconfiguration and migration 60

      5. Reaccredidation and recertification 60

      6. Wrap-up 61

  5. Conclusion 62

References 63
List of symbols/abbreviations/acronyms/initialisms 65
  1. Introduction




    1. Objective


The objective of this Technical Note is to examine an update and upgrade-based methodology that can be applied to the Linux operating system in order to maintain it and its hardware throughout its expected long-term service. It is expected that over the years the Navy’s frigate C2 systems will not only require operating system maintenance but that they will also periodically undergo hardware upgrades. This Technical Note addresses the necessary methodologies required to proceed with an operating system update or upgrade and thus enable the system to support and accommodate for periodic hardware changes. This is accomplished through two methodologies; the first provides an outline for maintaining system integrity via backups and restorations and the other examines the various issues that must be assessed prior to performing any system-related maintenance. Both methodologies, when combined together form a comprehensive system maintenance methodology that will help the reader succeed in maintaining his system over the long-term.



    1. Download 242.15 Kb.

      Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   ...   70




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling