Presentation is loading. Please wait.

Presentation is loading. Please wait.

Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice HallChapter Eight 1 Business Data Communications Chapter Eight Servers in the.

Similar presentations


Presentation on theme: "Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice HallChapter Eight 1 Business Data Communications Chapter Eight Servers in the."— Presentation transcript:

1 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice HallChapter Eight 1 Business Data Communications Chapter Eight Servers in the Enterprise

2 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 2 Primary Learning Objectives Differentiate between clients and servers Describe five server physical components Identify major server types Understand the concept of well-known ports Explain server clustering Define “system area network”

3 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 3 Clients and Servers Networks commonly make use of both clients and servers: Clients request networked resources from servers Servers manage and distribute networked resources to clients Clients and servers both have operating systems that differentiate them from each other Modern client operating systems are network-aware Server operating systems are specialized

4 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 4 Clients and Servers

5 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 5 Client and Server Software

6 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 6 Server Physical Components A server has a variety of physical components Five physical components particularly important to a server’s performance are: Physical case Memory Processor Drive interface Network Interface Card

7 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 7 Physical Case A client desktop’s physical case is usually kept to a minimal size as it occupies and shares space in a user’s work environment The case occupies a “footprint” Servers are typically secured and locked away, with infrequent physical access by staff: Therefore, a server’s footprint can be larger than a client’s The server’s physical case is often more rugged The server’s physical case is referred to as its chassis

8 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 8 Physical Case A larger server physical chassis: Allows technicians more room for working within the chassis Facilitates upgrading the server Provides more bays for expansion Offers more space for additional components Allows for a larger and more robust power supply A server may require a redundant power supply, as well as its own internal power surge protector

9 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 9 Physical Case Intel Server Chassis SC5250-E: Has four fixed-drive bays and supports up to five hot-swap SCSI or four hot-swap SATA hard-drive bays. This chassis allows adding more storage without having to take the server offline. Expansion cards can be easily added due to the tool-free access enabled by thumb screws on side panels.

10 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 10 Memory Memory is also called RAM, for random access memory RAM “sticks” plug into slots housed on a server computer’s motherboard Servers generally support much higher capacities of RAM than do clients A server’s RAM slots are often able to support higher capacity RAM sticks than a client’s

11 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 11 Memory

12 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 12 Processor A server’s processor is also called a CPU, for central processing unit The CPU is the workhorse of the server and is critical for processing of instructions and data Server motherboards often support multiple CPUs If a server has multiple CPUs, its server operating system (SOS) must be able to support the number configured If multiple CPUs are used, the SOS must be capable of managing the CPUs that reference each other’s cache

13 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 13 Processor An INTEL server motherboard, model S845WD1-E

14 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 14 Drive Interface Servers usually support more drives than does a typical client device Drives include: Floppy Tape CD Hard drive Hard drives, in particular, are a key server component Drives require an interface to the server’s CPU

15 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 15 Drive Interface Two common drive interfaces are: IDE – Integrated Drive Electronics Is used mostly by clients Requires a controller SCSI – Small Computer System Interface Is used mostly by servers Requires a controller The SCSI controller is often an adapter card that plugs into a motherboard’s expansion slot The SCSI adapter card uses a parallel bus to communicate with devices connected to the parallel bus The SCSI adapter can support up to 15 internal and/or external devices

16 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 16 Drive Interface

17 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 17 Network Interface Card – NIC Critical server NIC considerations include: Throughput capacity Half- or full-duplex communications Direct memory access (DMA) Bus mastering Buffers On-board processor

18 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 18 Major Types of Servers If a resource needs to be shared or managed, a server can likely be configured to do it Many types of servers are possible, including: File and application Database Web, e-mail, and FTP Domain Name System (DNS) Dynamic Host Configuration Protocol (DHCP)

19 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 19 File and Application Servers Having duplicate files and applications on multiple devices raises numerous questions, including: Who has the most current version of the file or application? How can multiple copies be adequately secured? How many copies have been distributed? Who maintains these multiple copies? File and application servers allow for centralized management, control, and distribution Users are typically authenticated before being given access to networked file and application resources

20 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 20 File and Application Servers Must be fast and reliable Require sufficient storage to accommodate user needs Are often implemented in software File servers transmit the entire file from the server to the client: For small files this may be suitable For large files this may result in a server bottleneck Application servers control applications, using two components: The client front-end The server back-end

21 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 21 File and Application Servers Licensing is an additional legal and ethical consideration when sharing files and applications across the network Three forms of licensing are: Individual Metered Site For a file or application to be distributed across a network, it must be network-compatible Not all applications, nor other resources, can be shared

22 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 22 Database Servers Provide management access control software that makes database records available to users across the network In most implementations, perform much of the processing, with only the result being transmitted to the client As with application servers, require a client front- end process and a server back-end process Allow for distributed databases

23 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 23 Database Server

24 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 24 Web, E-mail, and FTP Servers A Web server runs application layer TCP/IP protocols A client accessing a Web server utilizes a browser Web pages hosted on a Web server are expressed using HTML – HyperText Markup Language Two popular Web server programs are: Apache – an open system program Internet Information Server (IIS) – a Microsoft program

25 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 25 Web, E-mail, and FTP Servers – Well-known Ports Requests come to a Web server through “ports” These ports are logical designations that represent a particular type of requested service Port values are also called “well-known ports” The most common port used by a client Web browser is well-known port 80 Well-known ports are primary targets by hackers Many application layer server requests have been standardized to use particular well-known ports

26 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 26 Web, E-mail, and FTP Servers – A few Well-known Ports

27 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 27 Web, E-mail, and FTP Servers A client request is initiated through a Uniform Resource Locator, or URL For most users of a Web server the URL takes the form of a World Wide Web (WWW) address: www.woodbury.edu A URL has four parts: The protocol (HTTP or FTP, for example) The server’s IP or Domain Name System address An optional port number The directory or file being requested

28 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 28 Web, E-mail, and FTP Servers Popular e-mail Web server protocols include: SMTP – Simple Mail Transfer Protocol POP3 – Post Office Protocol version 3 IMAP – Internet Message Access Protocol A single physical mail server might be running multiple logical mail services FTP provides for transfer of files from a server to a client, and vice-versa Whether Web, e-mail, or FTP, a client component and a server component must both be configured

29 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 29 Domain Name System (DNS) Servers DNS servers are critical in a TCP/IP network DNS servers resolve logical IP network layer addresses to logical application layer domain name addresses The DNS system is designed around a hierarchy of domains: There are top- and second-level domains A domain can have subdomains A domain name is resolved when the DNS server matches a host’s IP address to a domain name address

30 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 30 Domain Name System (DNS) Servers Clients must be configured to know who their DNS server is. A redundant DNS server can be specified.

31 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 31 Domain Name System (DNS) Hierarchy

32 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 32 Dynamic Host Configuration Protocol (DHCP) Servers Clients in a TCP/IP network must be configured to know their logical network layer IP address This IP address can be manually configured or automatically configured using software: In a small enterprise, manual configuration is often practical In a large enterprise, with hundreds or thousands of clients, manual configuration is not practical DHCP servers are used primarily to automate a client IP addressing configuration

33 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 33 Dynamic Host Configuration Protocol (DHCP) Servers This Windows client has been configured so that DHCP has been automatically enabled.

34 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 34 Proxy Servers Are used primarily to provide increased security: A “proxy” literally means authorization to act on behalf of another A proxy server: Intercepts an internal networked client’s request Attaches its own IP address to that request Hands the request out to the external world, so that the external world sees the address of the proxy, not the address of the originating client Reverses the above process when requested resources are returned Maintains an address list of which internal client is making what request Is often used in conjunction with a firewall

35 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 35 Proxy Servers

36 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 36 Server Clusters Connect multiple physical servers into a single logical group: To clients accessing the server cluster, the servers in the cluster appear to be one single server Servers in the cluster can share their workload, resulting in load balancing of network traffic Should one of the servers in the cluster fail, other servers in the cluster can take over its duties This is called failover capability Servers in a cluster must have a server operating system that supports clustering Server clusters are highly scalable

37 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 37 Server Clusters

38 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 38 System Area Networks Are a local network designed for high-speed interconnection in cluster environments Almost exclusively use a “switched fabric” technology: A switched fabric refers to the way that physical ports within a switch are linked, allowing the ports to communicate and transfer data amongst themselves Fibre Channel, a switching fabric implementation, is particularly associated with System Area Networks

39 Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice Hall Chapter Eight 39 In summary Servers play a critical role in the enterprise Important server components typically include: case, memory, processors, drive interface, and Network Interface Cards Common types of servers include: file, application, database, Web, e-mail, FTP, DNS, and DCHP Server clustering allows the grouping of multiple physical servers into a single logical group System Area Networks are one way in which server clusters are being implemented


Download ppt "Business Data Communications, by Allen Dooley, (c) 2005 Pearson Prentice HallChapter Eight 1 Business Data Communications Chapter Eight Servers in the."

Similar presentations


Ads by Google