Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Buffers & Spoolers J L Martin Think about it… All I/O is relatively slow. For most of us, input by typing is painfully slow. From the CPUs point.
Computer networks Fundamentals of Information Technology Session 6.
Sterling Heights Public Library Agenda n We’ll learn how to “clean up” the computers n We’ll review how SLC’s mail system works n We’ll review SpamLion.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Basics. 2 Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services –Acquiring an account.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
Implementing ISA Server Caching. Caching Overview ISA Server supports caching as a way to improve the speed of retrieving information from the Internet.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
Computer Networks IGCSE ICT Section 4.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Common Services in a network Server : provide services Type of Services (= type of servers) –file servers –print servers –application servers –domain servers.
Proxy servers By Akshit Y10. What is a proxy server O A proxy server is a computer that offers a computer network service to allow clients to make indirect.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
Introduction to Networks Networking Concepts IST-200 VWCC 1.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
Overview Print and Document Services Print Management console Printer properties Troubleshooting.
Chapter 7: Using Windows Servers to Share Information.
Describe the following features of LAN’s, WAN’s, and the internet: transmission media, bandwidth, geographical spread and functions. Description of a.
Open up Evernote, mini whiteboards.  2 minutes – write down as many as you can think of.
G046 Lecture 05 Task E Briefing Notes Mr C Johnston ICT Teacher
Module 14: Configuring Print Resources and Printing Pools.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
MEAP Applications.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
NETWORK SERVERS Oliver Topping (with a little help from my Mum)
A beginner’s guide to Webmail. What do you need? A computer, or a smartphone An internet connection An account with an service provider.
Client – Server Architecture. Client Server Architecture A network architecture in which each computer or process on the network is either a client or.
Introduction to ICT Chemical Engineering Duncan McLachlan and Nam Ly – ICT Support.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
XP Browser and Basics COM111 Introduction to Computer Applications.
Implementing ISA Server Caching
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
NetTech Solutions Protecting the Computer Lesson 10.
Communications & Networks National 4 & 5 Computing Science.
Communications & Networks National 4 & 5 Computing Science.
CAIU Technology Essentials All Staff Day, 2016 Instructor: Stefan Moyer.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Client – Server Architecture A Basic Introduction 1.
LO2 Understand the key components used in networking.
Introduction to Networking. What is a Network? Discuss in groups.
Chapter 3.  The advantages and disadvantages of: ◦ Client-Server Networks & ◦ Peer-to-Peer Networks.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
 Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives,
2 nd lecture Presented by Dr. Sarah Mustafa Eljack.
Windows Vista Configuration MCTS : Productivity Applications.
Chapter 7: Using Windows Servers
3.1 Types of Servers.
3.1 Types of Servers.
3.1 Types of Servers.
TYPES OF SERVER. TYPES OF SERVER What is a server.
Technology ICT Option: .
راهنمای سیستم الکترونیکی دانشگاه تبریز
Chapter 27: System Security
Design Unit 26 Design a small or home office network
Getting Started.
Configuring Internet-related services
Getting Started.
Networking and Security
Communications & Computer Networks Resource Notes - Introduction
GCSE OCR 3 A451 Computing Client-server and peer-to-peer networks
Online software and backups
Technology ICT Option: .
LO3 – Understand Business IT Systems
Client/Server and Peer to Peer
Objectives Explain the role of computers in client-server and peer-to-peer networks Explain the advantages and disadvantages of client- server and peer-to-peer.
Presentation transcript:

Chapter 3

 Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦ Proxy Server ◦ Print Server ◦ Backup Server

 Stores user data files.  Network Operating System (NOS) allows accounts to be set up.  Requires username and password.  Can only access your own files.

 Stores applications for use across networks.  The application server can be used in two ways: ◦ For storing installation files which can easily be deployed across client machines.  Low network traffic but increase in required processing power at client side. ◦ Allows applications that are installed on the server to be run by client from the server side.  High network traffic but less demand on processing at client side.

 Manages mail in and out of a network. ◦ Checks income s for viruses ◦ Filters out SPAM s ◦ Provides central address book for the organisation ◦ Sets and inbox sizes  Useful for both internal and external .

 Used to cache web pages.  When a request is made to a web server, a web page is downloaded and displayed on the client’s computer. It is also stored or ‘cached’ on the proxy server.  Requests for the same page are then downloaded from a proxy server which is much quicker than downloading from the internet.

 Also act as a security buffer.  Clients make a request for a file on a file server.  The proxy intercepts the request and checks the client’s authenticity. ◦ Checks validity of user and they have authorisation to receive a file.  Proxy then requests the file from the file server and forwards it back to the client.  The client never has direct access to the file server.

 Allows access to a shared printer.  Usually come with spooler software. ◦ Spoolers collect jobs that have been sent to a printer, puts them in a queue, and then forwards the print queue to the printer.  Printers work much slower than a computer. This is why we use a spool. ◦ Computers would slow down if each file was sent to a printer as the computer would have to wait for the printer to catch up with it.

 The backup server backs up all data on the network.  If all users save data on the server, the server can automatically back-up files over night.  This means that if data is lost it can be recovered. ◦ It may not be the most up to date version but it is better than having to start again.  It will usually make use of tape drives.