It What It Means To Look At The Server And Network Assessment

PAGES
4
WORDS
1139
Cite

Server Assessment Explain the main purpose of a computer server?

A computer server is a computer with massive amounts of pcu, memory and storage that is used by a network to process, send, store and retrieve data for clients on that network.

Explain the following roles played by a server?

Print and File Services: these do the bulk of the work of a network; they are coordinated with intrenets and the Internet. This is the basic processing of the network server consisting of info/data retrieval, storage, sharing, printing, etc.

Application Services: this is a program that processes applications that go from a user to a database; it usually consists of more complex transactions and is needed for high-speed work

Gateway Services: this is a server that lets users connect remotely to a desktop computer and use it just as though they were there sitting in front of it.

d. Firewall and Proxy Services: this is a security system for a network that keeps the network from being hacked or hijacked by intruders; it acts as an application that can be turned on and off or used only in specific incidences.

3. What consideration do you need to take into account when choosing network operating systems?

Answer: First, you need to consider your needs: what will you be using the OS for? Who will be using it? Then you need to examine the kind of software that you typically use and see if it is compatible with the OS you are investigating. You also want to consider whether the OS is popular or user friendly or how it will connect with others. Plus, you need to consider security -- as in, what is the most secure operating system (Linux)? This will also play into how compatible the OS is with your programming tools/needs. On top of that, you may have business needs to consider. Then, finally, there is the cost factor.

4. Explain Hot Swop hard drives in a network server.

Answer: A hot swap is when a hard drive, CD ROM or power supply is replaced within the computer while the computer is still in operation mode. This requires utilizing a rack/enclosure so that the bus believes the device is still there when in reality it is not because it is being replaced by a functioning device.

5. What are the benefits of hot swappable drives?

Answer: The benefits are typically related to the industry for example with retrievable data. For instance, if a business is backing up info on a hard drive and the original malfunctions, the backup hot swappable drive can be swapped so that there is almost zero down-time...

...

Basically, it keeps open the flow of information so that there is never any substantial blackout period for parts needing replacing which would otherwise require the computer to shut down.
6. What do you understand by mirror in a network environment?

Answer: A mirror is what is used to help cut down on network traffic. The mirror site or stash of files acts as a replica of another source and basically provides an alternative location for users to get the info, so that traffic does not become too heavy through one site or source.

7. When choosing a CPU for a server what factors would you take into account?

Answer: Decide whether to go with Intel or AMD and what the communications are like between CPU sockets. Also you might want to look at PCle. Or you might even consider the alternative of using a cloud. That way you don't need to worry about your server crashing. Nonetheless, it depends on your needs -- whether you are using large apps or small ones, if you are file sharing, running a large scale business, etc.

8. What qualities do network operating systems generally have that workstation operating systems do not?

Answer: The qualities that network operating systems have that workstation operating systems do not is that the NOS is designed to be multi-user friendly while a typical workstation OS is designed to be used by one person at a time typically. The NOS is there to give remote services to users while the OS is made to run apps. The NOS is like a grocery store, while an OS is like a pantry.

9. Know the basic purpose and function of the following types of servers:

a. Firewall Server: This is a security system for a network that acts as a gatekeeper for info/data coming in and going out, using a set of rules that the flow of traffic must follow.

b. Proxy Server: This is a server that an OS or app uses that acts like a middle man between users and outside servers

c. Database Server: This is a program that services databases on other programs/computers, following the client-server model of service

d. Client Server: This is a model that has two parts: client and server systems parts, which talk to one another over a network or within a single computer. It uses both client and server software.

e. Application Server: This is component-based within the middle-tier of the server and engages in security and maintenance functions plus data functions.

f. Mail Server: This simply accepts incoming email from users…

Cite this Document:

"It What It Means To Look At The Server And Network" (2015, October 26) Retrieved April 27, 2024, from
https://www.paperdue.com/essay/it-what-it-means-to-look-at-the-server-and-2158303

"It What It Means To Look At The Server And Network" 26 October 2015. Web.27 April. 2024. <
https://www.paperdue.com/essay/it-what-it-means-to-look-at-the-server-and-2158303>

"It What It Means To Look At The Server And Network", 26 October 2015, Accessed.27 April. 2024,
https://www.paperdue.com/essay/it-what-it-means-to-look-at-the-server-and-2158303

Related Documents
Network Design Proposal
PAGES 15 WORDS 4024

Network Design Proposal Network Requirements ABC School Stats/User Counts Having a current strength of approximately 845 students, ABC School provides education from Pre-Kindergarten to the 12th Grade. According to the requirements of The New York School District, 250 Curriculum computers along with 75 Administration computers are to be installed. The requirements for the wiring per room of layer 1 are that it should adjust a total of 25 computers, 24 of which will

Network Support Technologies Case Study Project Scope, Schedule, and Budget Type and Configuration of the Network Hardware Specifications Software Specifications User Policies and Legal Issues Life of Equipment Project Costs Providing an Online Radio Service Second Life Information is now growing at speeds never thought imaginable. Today's world of Information Technology (IT) has provided the dynamic platform in which exponentially growing information resources emerge. This complex arena of knowledge management provides tremendous advantages to modern society. It allows individuals greater

Network Security: An Issue for Business Data Communication Computer security and the protection of data has been an issue since the early 1980s when computers became standard office equipment. Company sensitive information is stored on computers. Protecting the access to and integrity of this information has been a key concern for managers and computer specialists alike. The issues in data security have not changed, however the advent of the Internet has

GFI Turn-Around IT Strategy Turn-around Information Technology Strategy for Global Finance, Inc. (GFI) GFI's Authentication Technology and Network Security Issues GFI TURN-AROUND IT STRATEGY Global Finance Inc. offers services in the finance industry. This is a sensitive area of business that requires tight security policies and strategies to be implemented on the network of such an organization. GFI has, however, not given much attention to the IT department, especially, its security and thus the

After server authorization four domains for giving and registration of addresses of clients are created. "If a physical LAN has more than one logical subnet, how can different groups of clients be allocated addresses on different subnets? One way to do this is to preconfigure each client with information about what group it belongs to. A DHCP feature designed for this is the user class option. To do this, the

Network Security
PAGES 25 WORDS 9364

networking and TCP/IP and internetworking. Also discussed are risk management, network threats, firewalls, and also more special purpose network devices. The paper will provide a better insight on the general aspects of security and also get a better understanding of how to be able to reduce and manage risk personally at the workplace and at home. In today's world, the Computer has become a common feature in any organization anywhere