45
Confidential Server Types When planning for server installation, it is essential to identify the type of servers that is the best suited for the network requirements of an organization. To identify the appropriate server, you need to be acquainted with the features of various server types.

Server Technology

Embed Size (px)

Citation preview

Confidential

Server Types

When planning for server installation, it is essential to identify the

type of servers that is the best suited for the network requirements

of an organization.

To identify the appropriate server, you need to be acquainted with

the features of various server types.

Confidential

Client/Server Model

In a network, a client/server model enables the efficient

interconnectivity of program makes a service request to a server

program, which fulfils the request.

Multiple client programs share the services of a common server

program.

Confidential

Name of Servers

Access Servers

Security Servers

Network Infrastructure Servers

File Distribution Servers

Communication Servers

Confidential

Access Servers

Access Servers provide interconnectivity between computers and

devices with in a LAN, connect WAN sites, and provide internet

access.

Types of access servers are:

Gateway Server

Router Server

Bridge Server

Confidential

Gateway Server

A gateway server connects diverse networks by using a

combination of hardware and software.

A gateway server must be configured with multiple network cards,

which are linked internally and connected to different networks. This

feature is known as multihoming.

Confidential

Router Server

A router server consist of routing table, which specified the optimum

path for transmitting network information to a particular destination.

Like a gateway server, a router must be multihomed and can be

substituted by a dedicated network device.

Confidential

Bridge Server

A bridge server transmits network packets between two diverse

networks. For example, a bridge server enables an Ethernet

network to communicate with a Token Ring network.

Bridge servers are protocol independent but they can not perform

special routing functions.

Confidential

Security Servers

Security Server Provide security by allowing or blocking specified

applications, protocols or network traffic. They are also capable of

redirecting network traffic to its specified destination.

Example-

Firewall Servers

Proxy Servers

Confidential

Firewall Servers

A firewall server functions as a security filter for segregating private

and public networks to preserve confidential data.

The traffic is directed through the firewall server and is allowed or

blocked on the basis of rules and filters configured by the server

administrator.

Confidential

Implementation of a Firewall Server

Generally, firewall security is implemented in three zones:

An internal network

An external network

A demilitarized Zone

Confidential

DMZ

A DMZ grants external users access to certain services, such as e-

mail services, on the internal network while preventing unauthorized

access to sensitive internal services, such as file and print services.

However, a separate NIC should be installed on the firewall server

when a DMZ network is implemented.

Confidential

Proxy Server

A proxy server forwards requests from a client or another server. It is used to redirect webpage requests from a client to a web server.

A proxy server caches web pages so that a web page downloads faster the next time it is requested.

If a web page is not available on the cache, the server retrieves it from the internet.

Proxy server can also use for restricting access to unauthorized websites.

Confidential

Network Infrastructure Servers

Network Infrastructure Servers provide network services, such as IP services and domain name resolving that are critical to the functioning of the LAN or WAN.

EXAMPLES- DHCP DNS WINS SNA

Confidential

DHCP server

A DHCP server dynamically assigns network IP addresses to

network clients at start-up. Therefore, each client computer does not

require a static IP address.

When the client computer starts, the DHCP server assigns an IP

address to the client computer in response to its request

Confidential

DNS Server

A DNS server uses a database of tables to resolve FQDN to their

respective IP address.

A user can therefore access an Internet server by referring to its

name.

Confidential

WINS Server

A WINS server is a special Microsoft Windows server that enables clients to resolve windows NETBIOS name to IP addresses.

Therefore, clients must communicate with the WINS server using NETBIOS over TCP/IP(NBT). Clients send information to the WINS Server instead of broadcasting it over the network.

Confidential

SNA Server

An SNA Server functions as a gateway between a client computer

and a mainframe computer.

This server uses the SNA set of protocols developed by IBM for

main mainframe computers.

Confidential

File Distribution Servers

File distribution servers enable authenticated users to access files

and printers. These servers enable users to share a common

network printer, share files across LANs, WANs or the INTERNET

and host web sites.

Confidential

File Distribution Server

FTP Server

File and Print Server

Web Server

Database Server

Confidential

FTP Server

An FTP server transfers files efficiently and securely and ensures

that the integrity of the files is maintained.

After authenticating the logon credentials of a user, the FTP server

enables the user to access files on the server.

Confidential

File and Print Server

File and print servers enable client computers to store files and access printers. A file server provides a centralized location for client files. This enables them to be backed up easily.

A print server facilitates client computers to send print requests to a network printer. It queues the requests for printing and directs them to the destination printer.

Confidential

Web Server

A web server enables the client computers to access Web Pages. A

client computer uses a web browser to request the server for a web

page.

The server processes the request and downloads the required web

page on the client’s web browser, where it is displayed.

Confidential

Database Server

A database server stores structured data in filing system that can be

accessed by several users concurrently.

To ensure efficient storage and processing of data, the database

server must be equipped with a large amount of disk space and

RAM.

Confidential

Communication Servers

Communication Servers provide access to methods of

communication, such as fax and e-mails. These servers can be

configured to operate locally on a LAN or through the internet.

Example:

FAX SERVER

MAIL SERVER

Confidential

FAX server

A fax server is configured by using special faxing software and a

modem and telephone line.

This server facilitates users to fax documents directly from their

computer.

Confidential

Mail Server

A Mail server enables users to send and receive e-mail. Users

connect to the mail server by supplying their mail account

information.

A mail server is accessible from the internal network. However,

external users can also send and receive e-mail messages over the

internet.

Confidential

Server Hardware Types

Blade Servers

Tower Servers

Rack-Mount Servers

Confidential

Blade Servers

Blade servers are self-contained servers embedded in computer boards. A

blade server consists of a single circuit board that may have one or more

processors, chipsets memory and storage units.

The blades are housed in a chassis known a razor. Each blade server can

be hot plugged into a common chassis so that power supplies, network

connections, and cooling are all shared.

Confidential

Confidential

Blade Server- advantages

The main advantage of a blade server is that it requires less space that a

conventional server. Also, in blade servers many processors are utilized on

a single system.

This is useful for organizations that use high density cluster of servers. In

addition, if one of the blade server fails, it can easily and quickly be replaced

without affecting the whole system.

Confidential

Blade Servers- disadvantages

Disadvantage of a blade server is the amount of power consumed to cool the dense cluster of servers.

Blade servers have low performance and storage capacities. A blade servers do not include floppy drives, issues related to updating or

resolving is difficult. Moreover, blade servers are generally proprietary and do not work with

blade servers from other manufacturers.

Confidential

Tower Servers

Tower Servers are typically servers that resemble traditional

personal computer cases.

They are independent units that have dedicated storage and

network capabilities. The tower server can range from single

processor systems to multiple processor systems.

Confidential

Confidential

Tower Servers- Advantages and disadvantages

The main advantages of tower servers is that they provide the flexibility of having different adapter cards, dedicated storage and peripheral connections.

The design of the tower server is robust to ensure power reliability. The disadvantage of tower servers is that it requires more space. Wiring of these servers is a tedious job.

Confidential

Rack- Mount Servers

A Rack mount server is designed to fit in a standardized rack

enclosure and stacked vertically. As the servers are mounted on

racks, floor space is better utilized in a data center.

A rack-mount server can be an independent unit, similar to tower

servers, or can be blade server based.

Confidential

Confidential

Rack-Mount Servers: advantages and disadvantages

As rack-mount servers are mounted in racks, they can be easily

managed using centralized management systems, such as a

keyboard/video/mouse (KVM) system.

The KVM system can be plugged into any server for configuration

purposes. In addition, the rack-mount server allows easier

scalability.

Confidential

Application Server model

Application Server models are used for designing computing

environments.

Types-

Dedicated Application Server Model

Distributed Application Server Model

Peer to Peer Application Server Model

Confidential

Dedicated Application Server Model

A dedicated application server model uses servers for hosting

special single-purpose application services, such as Web services

and e-mail services.

This servers are specifically configured to host applications such as

web hosting and middleware applications.

Confidential

Confidential

Distributed Application Server Modle

A distributed application server model is also referred to as

client/server model or an n-tier model.

This model allows a client to access more than one server on a

network simultaniously.

Confidential

Confidential

Distributed Application Server Model- an example

Examples of networks that implement a distributed application

server model are Web and Internet.

They are very large distributed networks.

The web browsers allow clients to access applications and

resources on local as well as remote servers.

Confidential

Peer to Peer Application Server Model

In peer to peer application server model, applications can perform

as both clients and servers. This model is usually used in

decentralized networks where servers and clients are equal

contributors.

Confidential