Server Administration, Server Management and Networking Alokes Chattopadhyay.

Slides:



Advertisements
Similar presentations
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Advertisements

Chapter 7 LAN Operating Systems LAN Software Software Compatibility Network Operating System (NOP) Architecture NOP Functions NOP Trends.
What to expect.  Linux  Windows Server (2008 or 2012)
IS Network and Telecommunications Risks
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Lesson 18-Internet Architecture. Overview Internet services. Develop a communications architecture. Design a demilitarized zone. Understand network address.
Web Server Administration
Layer 7- Application Layer
Lesson 20 – OTHER WINDOWS 2000 SERVER SERVICES. DHCP server DNS RAS and RRAS Internet Information Server Cluster services Windows terminal services OVERVIEW.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
INTRODUCTION TO COMPUTER NETWORKS Navpreet Singh Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA (Ph : ,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
 Distributed Software Chapter 18 - Distributed Software1.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Client – Server Architecture A Basic Introduction Kathleen R. Murray, Ph.D. May 2002.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Network LANscape Servers & Equipment Found In a Typical Local Area Network (LAN) By George Squillace New Horizons of MichiganGeorge Squillace MCT, MCSE,
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Chapter 7: Using Windows Servers to Share Information.
CHAPTER Protocols and IEEE Standards. Chapter Objectives Discuss different protocols pertaining to communications and networking.
Internal NetworkExternal Network. Hub Internal NetworkExternal Network WS.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
思科网络技术学院理事会. 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Chapter 9: Novell NetWare
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
Application Layer CHAPTER 2. Announcements and Outline  Administrative Items  Questions? Recap 1.Introduction to Networks 1.Network Type 2.N etwork.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Networks QUME 185 Introduction to Computer Applications.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols Network Fundamentals.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
1 Version 3.0 Module 11 TCP Application and Transport.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Client – Server Architecture. Client Server Architecture A network architecture in which each computer or process on the network is either a client or.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Chapter 3: Services of Network Operating Systems Maysoon AlDuwais.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
Client – Server Architecture A Basic Introduction 1.
Guide to Parallel Operating Systems with Windows 7 and Linux Chapter 11 Networking.
TCP/IP Protocol Suite ©Richard L. Goldman September 25, 2002.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Chapter 7: Using Windows Servers
CompTIA Security+ Study Guide (SY0-401)
Application Layer Functionality and Protocols
3.1 Types of Servers.
Affinity Depending on the application and client requirements of your Network Load Balancing cluster, you can be required to select an Affinity setting.
CONNECTING TO THE INTERNET
3.1 Types of Servers.
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
CHAPTER 2 Application Layer.
Data Networking Fundamentals
CompTIA Security+ Study Guide (SY0-401)
Goals Introduce the Windows Server 2003 family of operating systems
Internet Protocols IP: Internet Protocol
APACHE WEB SERVER.
Presentation transcript:

Server Administration, Server Management and Networking Alokes Chattopadhyay

Application Servers Audio/Video Servers Chat Servers FTP Servers Mail Servers Proxy Servers Telnet Servers Web Servers Types of Servers

Concept of service on servers Hypertext Transfer Protocol (HTTP) File Transfer Protocol (FTP) Domain Name System (DNS) Simple Mail Transfer Protocol (SMTP) Post Office Protocol 3 (POP3) Internet Messaging Access Protocol (IMAP) File sharing protocols include Sun Microsystems Network File System (NFS) Microsoft Server Message Block (SMB) Print services Dynamic Host Configuration Protocol (DHCP) Firewall: IP Tables

Client – Server Architecture A network architecture in which each computer or process on the network is either a client or a server. Components Clients Servers Communication Networks

Clients Applications that run on computers Rely on servers for Files Devices Processing power Example: client An application that enables you to send and receive Clients are Applications

Servers Computers or processes that manage network resources Disk drives (file servers) Printers (print servers) Network traffic (network servers) Example: Database Server A computer system that processes database queries Servers Manage Resources

Communication Networks Networks Connect Clients and Servers Client–Server Computing Process takes place on the server and on the client Servers Store and protect data Process requests from clients Clients Make requests Format data on the desktop

Application Components Data Management Application Logic Presentation 3 Logical Tiers Thin Client Fat Client 2 Client Types

Middleware Software that connects two otherwise separate applications Example: Middleware product linking a database system to a Web server 1.Client: Requests Data via Web 2.Middleware Links Applications 3.Web Server: Presents Dynamic Pages

Popular operating systems Windows Server : Windows 2008, 2012 Unix Server : HP UX, Sun Solaris, BSD, SCO, AIX Linux Server : Red-Hat, Ubuntu, CentOS, Debian, SuSe

OS considerations (administration and maintenance) Security A OS must protect the shared resources under its control. Security includes authenticating user access to services to prevent unauthorized access to the network resources. Security also performs encryption to protect information as it travels between clients and servers. Scalability Scalability is the ability of a OS to grow without degradation in performance. The OS must be capable of sustaining performance as new users join the network and new servers are added to support them. Robustness/fault tolerance A measure of robustness is the ability to deliver services consistently under heavy load and to sustain its services if components or processes fail. Using redundant disk devices and balancing the workload across multiple servers can improve OS robustness.

Server applications, protocols and remote management : 1. Remote management allows administrators to configure networked systems that are miles apart 2. Network processes are referred to as services in Windows Servers daemons in UNIX and Linux

Present day concept : Server Consolidation Server consolidation is an approach to the efficient usage of computer server resources in order to reduce the total number of servers or server locations that an organization requires. The practice developed in response to the problem of server sprawl, a situation in which multiple, under-utilized servers take up more space and consume more resources than can be justified by their workload.

Server Consolidation

Server Consolidation – concept of virtualization Type-1 Virtualization

Server consolidation – concept of virtualization Type-2 Virtualization

Server consolidation – concept of virtualization Container Virtualization

TCP/IP based services 1.Most popular network processes rely on the TCP/IP suite of protocols 2. TCP/IP are vulnerable to unauthorized scans and malicious attacks. Denial of service (DoS) attacks computer viruses fast-spreading Internet worms 3. Recent versions of popular OSs restrict the default network services.

Network Management Network management id the process of controlling a complex data network to maximize its efficiency and productivity Network Management standards Internet approach: Simple Network Management Protocol (SNMP, secure SNMP, SNMP v2) OSI approach: CMIP – common management information protocol CMIS – common management information service SNMP is beyond the simple protocol with adequate monitoring and change capabilities SNMP V2 greatly enhances SNMP feature set CMIS/CMIP approaches the advanced tool, but implementation issues have limited in use

Over View of IP Schema Private IP Address Range Allotted by NKN Own Public IP Address Range Core Switching & Routing Internet NKN BSNL Own Private IP Address Range Distribution & Access Network BSNL Internet NKN Internet NKN Private IP NKN Garuda Grid Private IP Address Garuda Grid Desktop VC MCU at NIC Delhi VC System at Shimla

IIT Kharagpur Campus

Internet PE CE BSNL Server Farm Switch KOL Extn. BBSR Extn. 8 Mbps Leased Ckt over EOS 2 X STM1 National Knowledge Network 2 X 1Gbps Leased Ckt. Over EOS NKN VLAN NKN Internet GARUDA VLAN L2 Switch DMZ 1: Mail Exchangers & Web Servers L2 Switch DMZ 3: Proxy Servers & Load Balancers L2 Switch L3 Switch DMZ 4: Telnet, FTP, SSH, Computational, Video Conferencing Servers L2 Switch Existing ASA 5540 Existing PIX Mail Servers ASA VPN Client L2 Switch For NKN User L3 Switch DMZ 5: ERP Zone L3 Switch DMZ 6: Off Campus Zone L2 Switch Network Security Architecture

Academic Area Network Hostel Area Network Wi-Fi Network Residential Area Network 10 Gbps Ethernet Campus Backbone Network Internet NKN BSNL Reliance BBSR Extn. Centre Kolkata Extn. Centre Network Over View

Thank You