Friday, November 21, 2008

Hot Add Memory

Hot Add Memory

One of the smaller improvements made to SQL Server 2005 was the ability of SQL Server to utilize memory added while SQL Server was online and running. SQL Server before 2005 supported dynamic memory but if you needed to add memory to a server after you had started SQL Server, you couldn’t since SQL Server only recognized the memory that was present during start up. SQL Server 2005 added support for Hot Add Memory. While this is a great concept, I probably will have a hard time finding more than 2 people in the SQL Server world how have actually utilize this feature. I bet I could a few dozen who needed this feature but didn’t know about it or who knew about the feature but didn’t have their server configure to utilize Hot Add Memory. I hope this little blog helps a few database administrators understand this concept and how it may help them in the future.

So what is Hot Add Memory?

What Hot Add Memory basically means that a Windows administrator can crack open the case of a server, add new memory, and then close the server up and Windows and SQL Server will recognize that additional memory and utilize it without having to be bounced. This allows for the addition of extra memory at a later date without having to schedule server or SQL Server downtime. The ability of having additional memory added without downtime may actually serve a few of us with our uptime requirements or even allow us to put a server into place before we actually have that additional memory we figured out at a later date that we really needed for new environment.

So how do you configure your server to utilize Hot Add Memory?

As stated above, Hot Add Memory requires either Windows 2003 or later Enterprise or Data Center Edition. Hot Add Memory is available for both 64-bit and 32-bit SQL server. Hot Add Memory is a server feature that some of the server have, older servers may not the ability to add hot memory since the server itself must have the configuration and feature set added to the server, and requires either Windows 2003 (or 2008) Enterprise or Data Center edition.

There are a few SQL Server related configurations that must be in place before SQL Server can actually make use of Hot Add Memory. If you are on a 32-bit version, you must have AWE enabled, even if you do not have more than 4GB of memory. You cannot make use of Hot Add Memory without AWE. Another item which will keep most database administrators from using Hot Add Memory is that you must have the –h startup option in place before using Hot Add Memory on a 32-bit version. This startup parameter reserves additional virtual address space for the Hot Add Memory metadata when using 32-bit AWE and since it is a startup parameter, you must have set –h before starting SQL Server. While you could just set this parameter on all your servers and be done with it, the parameter comes with a price. The –h startup parameter consumes 500 MB of virtual address space. Remember VAS is limited to the first 2GB of memory (3GB of memory if you are using the /3GB switch) on a 32-bit installation. This means that 500 MB of the 2GB is being used for Hot Add Memory metadata. Just having this parameter set may cause the need to add additional memory. Be careful when setting this parameter and only do it for servers you know will require additional memory but the memory is still on order and you just need to put what you have in place before it comes in. I would also remove the parameter as soon as I added the new memory so that on the new reboot the 500MB of memory can be recaptured for SQL Server to utilize.

One good thing, if your server (not SQL Server) is configured to use Hot Add Memory, you no longer have to use the /PAE switch in the boot.ini. No, the 500MB will not be automatically consumed as the –h startup parameter is a SQL Server parameter, not a Windows setting.

Note: If for some reason you remove memory from a server - I can’t think of a single time I would allow this to happen to any of my servers - you still have to restart everything. There is no Hot Remove Memory feature.

Summary

This was just a small posting about a feature of SQL Server 2005 and 2008 that most of us do not know about. I know it will not be a heavily used feature, but when you need it, it will be great to know about Hot Add Memory.

Thursday, September 18, 2008

Tips for Torrent Client Config


http://www.clixsense.com/?2592760






Torrent Client Configuration

In order to apply these tips you need to know your maximum up- and download speed. You can test your bandwidth over here (stop all download activity while testing). Also make sure that you applied the tips provided in our previous posts.
Note that there’s a huge difference between kb/s(kilobits/second) and kB/s (kilobytes/second). To be precise, kB/s = kb/s divided by 8. In this tutorial we use
kB/s (like most torrent clients do). This means that you might need to calculate your max speed in kB/s yourself if the speedtest only gives you the results in kb\s (so divide by 8 then).
Settings 1-4 can be found in the options, settings or preference tab of most torrent clients.

1. Maximum upload speed
Probably the most important setting there is. Your connection is (sort of) like a pipeline, if you use you maximum upload speed there’s not enough space left for the
files you are downloading. So you have to cap your upload speed. Use the following formula to determine your optimal upload speed…
80% of your maximum upload speed
So, if your maximum upload speed is 40 kB/s, the optimal upload rate is 32kB/s
But keep seeding!

2. Maximum download speed
Although setting your maximum download speed to unlimited may sound interesting, in reality it will only hurt your connection. If you still want to be able to browse
properly, set your maximum download speed to: 95% of your maximum download speed
so if your maximum download speed is 400 kB/s, the optimal download speed is 380kB/s

3. Maximum connected peers per torrent
Yet another setting that you don’t want to max out.I experimented quite a lot with the max connected peers settings and came to the conclusion that both high and low
number hurt the download speed of a torrent. The following setting worked best for me.upload speed * 1.3 so, if your maximum upload speed is 40 kB/s, the optimal
amount of connected peers per torrent is 40 * 1.3 = 52
I didn’t noticed a difference for fast or slow connections here.

4. Maximum upload slots
1 + (upload speed / 6)
So, if your maximum upload speed is 30 kB/s, the optimal number of upload slots is
1 + (30 / 6) = 6

5. More tips
A. Seed.
Downloading speeds will be sub-optimal for everyone unless everyone plays their part and seeds. Private tracker sites are a great example of how the overall speed of the swarm increases when everyone is seeding and downloading in equal measure. So, play your part in seeding and tell others to as well.
B. Be connectable.
Make sure you’re not “firewalled” by opening up your incoming ports or by enabling UPnP in your router, otherwise you’ll be leaving bandwidth on the table.
C. Select the right torrents.
Your download will be faster if you choose to download a torrent where there is a good balance of seeds and peers. For instance, Vuze ranks its search results according to the number of seeds and peers to make this easier.
D. Be realistic.
Check the swarm average and if you’re already above average, then you just need to be patient. If you’re below average, go back and check some of these other things I’ve
mentioned.

Sunday, September 14, 2008

The History of the Middle Finger














Well, now......here' s something I never knew before, and now that I know it, I feel compelled to send it on to my more intelligent friends in the hope that they, too, will feel edified. Isn't history more fun when you know something about it?

Before the Battle of Agincourt in 1415, the French, anticipating victory over the English, proposed to cut off the middle finger of all captured English soldiers. Without the middle finger it would be impossible to draw the renowned English longbow and therefore they would be incapable of fighting in the future. This famous English longbow was made of the native English Yew tree, and the act of drawing the longbow was known as "plucking the yew" (or "pluck yew").

Much to the bewilderment of the French, the English won a major upset and began mocking the French by waving their middle fingers at the defeated French, saying, See, we can still pluck yew! Since 'pluck yew' is rather difficult to say, the difficult consonant cluster at the beginning has gradually changed to a labiodentals fricative F', and thus the words often used in conjunction with the one-finger-salute! It is also because of the pheasant feathers on the arrows used with the longbow that the symbolic gesture is known as "giving the bird."

IT IS STILL AN APPROPRIATE SALUTE TO THE FRENCH TODAY!
And yew thought yew knew every plucking thing.



Sunday, August 24, 2008

List of Port numbers






















5.0 Is Here!


height="104">
iDevAffiliate 5

/>Price: $99.99 USD




href="http://www.365jobs4u.com/idevaffiliate/pages/1877.php?set=4&link=1" target="_blank">more

information





List of frequently seen TCP and UDP ports and what they mean. The goal of this port table is to point to further resources for more information.


0
1tcpmux
3
4
5rje
7echo
9discard
11systat
13daytime
15netstat
17qotd
18send/rwp
19chargen
20ftp-data
21ftp
22ssh, pcAnywhere
23Telnet
25SMTP
27ETRN
29msg-icp
31msg-auth
33dsp
37time
38RAP
39rlp
40
41
42nameserv, WINS
43whois, nickname
49TACACS, Login Host Protocol
50RMCP, re-mail-ck
53DNS
57MTP
59NFILE
63whois++
66sql*net
67bootps
68bootpd/dhcp
69Trivial File Transfer Protocol (tftp)
70Gopher
79finger
80www-http
87
88Kerberos, WWW
95supdup
96DIXIE
98linuxconf
101HOSTNAME
102ISO, X.400, ITOT
105cso
106poppassd
109POP2
110POP3
111Sun RPC Portmapper
113identd/auth
115sftp
116
117uucp
118
119NNTP
120CFDP
123NTP
124SecureID
129PWDGEN
133statsrv
135loc-srv/epmap
137netbios-ns
138netbios-dgm (UDP)
139NetBIOS
143IMAP
144NewS
150
152BFTP
153SGMP
156
161SNMP
175vmnet
177XDMCP
178NextStep Window Server
179BGP
180SLmail admin
199smux
210Z39.50
213
218MPP
220IMAP3
256
257
258
259ESRO
264FW1_topo
311Apple WebAdmin
350MATIP type A
351MATIP type B
360
363RSVP tunnel
366ODMR (On-Demand Mail Relay)
371
387AURP (AppleTalk Update-Based Routing Protocol)
389LDAP
407Timbuktu
427
434Mobile IP
443ssl
444snpp, Simple Network Paging Protocol
445SMB
458QuickTime TV/Conferencing
468Photuris
475
500ISAKMP, pluto
511
512biff, rexec
513who, rlogin
514syslog, rsh
515lp, lpr, line printer
517talk
520RIP (Routing Information Protocol)
521RIPng
522ULS
531IRC
543KLogin, AppleShare over IP
545QuickTime
548AFP
554Real Time Streaming Protocol
555phAse Zero
563NNTP over SSL
575VEMMI
581Bundle Discovery Protocol
593MS-RPC
608SIFT/UFT
626Apple ASIA
631IPP (Internet Printing Protocol)
635mountd
636sldap
642EMSD
648RRP (NSI Registry Registrar Protocol)
655tinc
660Apple MacOS Server Admin
666Doom
674ACAP
687AppleShare IP Registry
700buddyphone
705AgentX for SNMP
901swat, realsecure
993s-imap
995s-pop
999
1024
1025
1050
1062Veracity
1080SOCKS
1085WebObjects
1100
1105
1114
1227DNS2Go
1234
1243SubSeven
1338Millennium Worm
1352Lotus Notes
1381Apple Network License Manager
1417Timbuktu
1418Timbuktu
1419Timbuktu
1420
1433Microsoft SQL Server
1434Microsoft SQL Monitor
1477
1478
1490
1494Citrix ICA Protocol
1498
1500
1503T.120
1521Oracle SQL
1522
1524
1525prospero
1526prospero
1527tlisrv
1529
1547
1604Citrix ICA, MS Terminal Server
1645RADIUS Authentication
1646RADIUS Accounting
1680Carbon Copy
1701L2TP/LSF
1717Convoy
1720H.323/Q.931
1723PPTP control port
1731
1755Windows Media .asf
1758TFTP multicast
1761
1762
1808
1812RADIUS server
1813RADIUS accounting
1818ETFTP
1968
1973DLSw DCAP/DRAP
1975
1978
1979
1985HSRP
1999Cisco AUTH
2000
2001glimpse
2005
2010
2023
2048
2049NFS
2064distributed.net
2065DLSw
2066DLSw
2080
2106MZAP
2140DeepThroat
2301Compaq Insight Management Web Agents
2327Netscape Conference
2336Apple UG Control
2345
2427MGCP gateway
2504WLBS
2535MADCAP
2543sip
2565
2592netrek
2727MGCP call agent
2766
2628DICT
2998ISS Real Secure Console Service Port
3000Firstclass
3001
3031Apple AgentVU
3052
3128squid
3130ICP
3150DeepThroat
3264ccmail
3283Apple NetAssitant
3288COPS
3305ODETTE
3306mySQL
3352
3389RDP Protocol (Terminal Server)
3520
3521netrek
3879
4000icq, command-n-conquer
4045
4144
4242
4321rwhois
4333mSQL
4444
47017
4827HTCP
5000
5001
5002
5004RTP
5005RTP
5010Yahoo! Messenger
5050
5060SIP
5135
5150
5190AIM
5222
5353
5400
5500securid
5501securidprop
5300
5423Apple VirtualUser
5555
5556
5631PCAnywhere data
5632PCAnywhere
5678
5800VNC
5801VNC
5900VNC
5901VNC
5843
6000X Windows
6112BattleNet
6050
6499
6500
6502Netscape Conference
6547
6548
6549
6666
6667IRC
6670VocalTec Internet Phone, DeepThroat
6699napster
6776Sub7
6968
6969
6970RTP
6971
7000
7007MSBD, Windows Media encoder
7070RealServer/QuickTime
7161
7323
7777
7778Unreal
7640
7648CU-SeeMe
7649CU-SeeMe
7654
8000
8002
8010WinGate 2.1
8080HTTP
8100
8181HTTP
8383IMail WWW
8765
8875napster
8888napster
8890
9000
9090
9200
9704
9669
9876
9989
10008cheese worm
10752
12345
11371PGP 5 Keyserver
12346
13000
13223PowWow
13224PowWow
14000
14237Palm
14238Palm
14690
16969
18888LiquidAudio
21157Activision
22555
22703
22793
23213PowWow
23214PowWow
23456EvilFTP
26000Quake
27000
27001QuakeWorld
27010Half-Life
27015Half-Life
27374
27444
27665
27910
27960QuakeIII
28000
28001
28002
28003
28004
28005
28006
28007
28008
30029AOL Admin
30100
30101
30102
30103
30303
30464
31335
31337Back Orifice
32000
32771
32777rpc.walld
34555
40193Novell
41524arcserve discovery
45000Cisco NetRanger postofficed
50505
52901
54321
61000
65301
Multicasthidden
ICMP Typehidden
9998
32773rpc.ttdbserverd
32776rpc.spray
32779rpc.cmsd
38036timestep