Chapter 5 Managing a Server. Overview  Server management  Examine networking models  Learn how users are authenticated  Manage users and groups 

Slides:



Advertisements
Similar presentations
Welcome to Middleware Joseph Amrithraj
Advertisements

Threads, SMP, and Microkernels
Distributed Processing, Client/Server and Clusters
An Introduction to Client/Server Architecture
Database Architectures and the Web
Chapter 7 LAN Operating Systems LAN Software Software Compatibility Network Operating System (NOP) Architecture NOP Functions NOP Trends.
Chapter One The Essence of UNIX.
Distributed Processing, Client/Server, and Clusters
Chapter 16 Client/Server Computing Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Technical Architectures
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
1 Pertemuan 13 Servers for E-Business Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Distributed Systems Architectures
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Ch 12 Distributed Systems Architectures
12 Chapter 12 Client/Server Systems Hachim Haddouti.
12 Chapter 12 Client/Server Systems Database Systems: Design, Implementation, and Management, Fifth Edition, Rob and Coronel.
The Architecture of Transaction Processing Systems
Systems Architecture, Fourth Edition1 Internet and Distributed Application Services Chapter 13.
2 Systems Architecture, Fifth Edition Chapter Goals Describe client/server and multi-tier application architecture and discuss their advantages compared.
Guide To UNIX Using Linux Third Edition
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
Chapter 5 Managing a Server. Overview  Server management  Examine networking models  Learn how users are authenticated  Manage users and groups 
Distributed Systems: Client/Server Computing
Client/Server Architecture
Introduction to client/server architecture
DATABASE MANAGEMENT SYSTEMS 2 ANGELITO I. CUNANAN JR.
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 12 Slide 1 Distributed Systems Design 1.
Lecture The Client/Server Database Environment
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Client/Server Computing. Information processing is distributed among several workstations and servers on a network, with each function being assigned.
The Client/Server Database Environment
Section 6.1 Explain the development of operating systems Differentiate between operating systems Section 6.2 Demonstrate knowledge of basic GUI components.
Web Server Administration Chapter 5 Managing a Server.
Web Servers Web server software is a product that works with the operating system The server computer can run more than one software product such as .
Stuart Cunningham - Computer Platforms COMPUTER PLATFORMS Network Operating Systems Week 9.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
The University of Akron Summit College Business Technology Dept.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
CS480 Computer Science Seminar Introduction to Microsoft Solutions Framework (MSF)
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
April 2000Dr Milan Simic1 Network Operating Systems Windows NT.
Chapter 9: SHARING FILE SYSTEM RESOURCES1 CHAPTER OVERVIEW  Create and manage file system shares and work with share permissions.  Use NTFS file system.
The Client/Server Database Environment Ployphan Sornsuwit KPRU Ref.
Database Architectures Database System Architectures Considerations – Data storage: Where do the data and DBMS reside? – Processing: Where.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Chapter 8 Configuring and Managing Shared Folder Security.
Enterprise Network Systems Client/ Server Mark Clements.
Distributed System Architectures Yonsei University 2 nd Semester, 2014 Woo-Cheol Kim.
1 Overview of Microsoft Windows 2000 Multipurpose OS Reduces total cost of ownership (TCO)
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
CSC 480 Software Engineering Lecture 17 Nov 4, 2002.
HNC COMPUTING - Network Concepts 1 Network Concepts Network Concepts Network Operating Systems Network Operating Systems.
IT 5433 LM1. Learning Objectives Understand key terms in database Explain file processing systems List parts of a database environment Explain types of.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
Chapter 16 Client/Server Computing Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
Internet and Distributed Application Services
ACTIVE DIRECTORY ADMINISTRATION
#01 Client/Server Computing
File Operations Access Permissions.
Course Name : Network Operating System Course Code: CNET 332 These slides are only meant for course delivery. For all your Exams refer to your text book.
Course Name : Network Operating System Course Code: CNET 332
The University of Akron College of Applied Science & Technology Dept
Web Servers (IIS and Apache)
#01 Client/Server Computing
Presentation transcript:

Chapter 5 Managing a Server

Overview  Server management  Examine networking models  Learn how users are authenticated  Manage users and groups  Manage file system permissions

Managing a Server  Managing a server Access to the server  Who has permission to access Access restrictions to the server and its resource  File, printer, etc. Access control schemes can be through  LAN  Internet

Network Models  Network model How the server is configured and interact with the network  Two basic network models Microsoft LAN Approach  LAN Domain  Working Group Client/Server

Microsoft LAN Networking Models- Workgroup  Treats each computer in the network as an equal or peer Also called peer-to-peer networking  Each computer can be a client and a server When you allow others to access resources on your computer, your computer is acting as a server When you access resources on another computer, your computer is acting as a client

Microsoft LAN Networking Models- Workgroup  Appropriate for networks with 10 or less computers  A number of disadvantages Need user names and passwords of users who need resources Difficult to keep track of changing passwords Most users do not want to administer resources on their computer

Microsoft LAN Networking Models- Domain  One or more centralized servers (single domain) Single, centralized logon Single point of control Users can be given access to resources anywhere in the domain

Client/Server Networking Model  Networking in Linux follows the client/server model Server provides the resource (web server) Client talks to the server (browser, program)  Server has a corresponding program that communicates with the client (runs in the background) In Windows the server program called service In Linux the server program called daemon in Linux

A Brief History: Open Platform  The good old days Octopus-like mainframes Only a few venders to choose from Farms of disks where required Applications were specific for each machine  Open platform New client/server architecture Open system allowed mix-and-match  Different application technologies could be purchased from different venders  Examples: server platform, client platform, network protocols, middleware software, etc.

What is Client/Server (C/S) Computing  It started as PCs became more powerful PCs were no longer dumb terminals  Provides an open and flexible environment  C/S is considered as a form of distributed software

Distinct characteristics of C/S Server provides the service Client is considered as the customer requesting the service The server service can be shared among a number of clients Clients must request or initiate the service The location of the server in the network is transparent to clients Transaction between C/S is message-passing based C/S architecture is scalable  horizontally (more clients can added)  Vertically (more servers can be added) The server is centrally maintained where as clients are independent of each other

Systems with C/S Architecture  File servers File sharing and file processing  Data base servers Passing file results Example: Query in DBMS server Typically one single request/reply  Transaction servers Transaction server includes DBMS and transaction monitoring Server has remote procedures run online by the client  web servers Superfat servers and thin clients Uses HTTP protocol Java was first to introduce interactive C/S forms Client Server Internet Client JAVA Client HTML Application

Client/Server Models  Where to push the application to  Fat clients The bulk of the application is running on the client The client knows how the data is organized and where it is Different clients access the same applications different ways  Fat servers The server more complicated The clients are less complex More of the code runs on the server The network interaction is minimized Server Client Application

Middleware Software  It is the (/) between client and server which glues them together Allowing the client request for a service and the server providing it  Middleware can also be between server/server  Two broad classes General  LAN servers, TCP/IP, Communication stacks, Queuing services, etc. Application specific  Used to accomplish a specific task  Groupware specific: SMTP  Internet specific: HTTP  Database specific: SQL

Two-Tier vs. Three-Tier Architecture  Same basic idea as fat-client versus fat-server  Depends on how the application is divided between the server and the client  Two-tier servers Examples: file servers and database server In this case the process (application logic) is buried within the client or server (or both)  Three-tier servers Examples: Web and distributed objects In this case the process is run on the middle-tier – separated from the user and data interface They can integrate the data from multiple sources More robust and more scalable

Client/Server Building Blocks  Purpose How to divide the application between the client and server What are different functionalities of client and server  Basic client server model Fits various applications  Small office  Small business  Enterprise  Global Client Server ClientServer Middle ware Single Machine ClientServer Middle ware Client Middle ware C/S Middle ware C/S

Server Scalability PC Server  Asymmetric Multi- processing  Superserver symmetric Multi- processing  Superserver Multiservers

Server Scalability  Superserver A very powerful server Single-server or multiserver Each server can have a single processor or multiprocessor Multiprocessing can be Asymmetric or Symmetric  Multiprocessing  Asymmetric: each processor is dedicated to a specific task  Fully symmetric (SMP): applications are divided into threads and threads are sent to available processors Examples: 32-bit NT, Unix, NetWare Requires 3 basic functionalities:  Global scheduling  I/O sharing structure  OS access sharing  Multiservers Pool of servers, providing more processing power (also called a cluster) They divide the task between different servers  Server lite As opposed to full blown servers Provides a background process on the client machine that can accept unsolicited networks request (refreshing database, synchronizing time, etc.)

Authenticating Users  Process of determining a user's true identity  Three basic methods What you know – user name and passwords What you have – entry card Who you are – biometrics

Implementing an Authentication System  If a Windows network has older computers running NT, 95, or 98, the server must use NTLM  It is not as secure as Kerberos, which is the default for Windows 2000, 2003, and XP Authentication system developed by MIT Allows two parties exchange private information Uses the ticket (key) mechanism

Managing Users and Groups  Users need accounts to access resources on a server On a Web server there is a restricted account that is used on behalf of Internet users  In a LAN, users with common resource needs are put in a group and the group is given access to the resource

Domain Users and Groups in Windows  Local accounts exist on a single computer and can be used to control resources only on that computer  Domain accounts can be used to control resources on all the computers that are part of the domain  Active Directory (AD) allows domains to be grouped into a forest Microsoft Exchange requires AD Local Acc. Forest

Groups in Windows  Domain local groups have members from the same domain Assign permissions to resources in the same domain  Global groups have members from the same domain Can be used to assign permissions to resources in any domain  Universal groups can have members from any domain Can be used to assign permissions to resources in any domain

File System Permissions  Permission allow you to control access to the resources on a computer such as a Web page, a document, or a program  In Windows, the NTFS file system is required in order to assign permissions  All Linux file systems incorporate permissions

File System Permissions in Windows PermissionDescription Full ControlFull Control includes all other permissions and allows you to take ownership of the file or folder and change the attributes of a file ModifyAllows read, write, and delete ReadWith this permission, you can read files but cannot execute them WriteWhen set on a file, this permission allows you to write to files; when set on a folder, you can write to the folder Read & ExecuteRead files and run programs List Folder ContentsThis permission allows you to view the contents of a folder

File System Permissions in Linux Permission type When used with filesWhen used with directories ReadRead a file or copy a fileList the contents of a directory WriteWrite to the file, including deleting the file Create files ExecuteExecute programs and shell scripts, which are text files containing Linux commands Modify the file permissions

Linux Permissions  Permissions are set for user, group, and others  Each permission is set with a single digit from 0 to 7 based on the combination of permissions read = 4 write = 2 execute = 1

Using chmod to Set Permissions CommandPermissions OwnerGroupOther chmod 755 myfile rwxr-x chmod 540 myfile r-xr----- chmod 744 myfile rwxr--

Do the following labs  Project 5-5 to 5-8 using Linux Giving control to groups