Server Administration, Server Management and Networking

Download Report

Transcript Server Administration, Server Management and Networking

Server Administration, Server
Management and Networking
Alokes Chattopadhyay
Types of Servers
•
•
•
•
Application Servers
Audio/Video Servers
Chat Servers
FTP Servers
•
•
•
•
Mail Servers
Proxy Servers
Telnet Servers
Web Servers
Concept of service on servers
•Hypertext Transfer Protocol (HTTP)
•File Transfer Protocol (FTP)
•Domain Name System (DNS)
•Simple Mail Transfer Protocol (SMTP)
•Post Office Protocol 3 (POP3)
•Internet Messaging Access Protocol (IMAP)
•File sharing protocols include Sun Microsystems Network File System (NFS)
•Microsoft Server Message Block (SMB)
•Print services
•Dynamic Host Configuration Protocol (DHCP)
•Firewall: IP Tables
Client – Server Architecture
• A network architecture in which each computer or process on the
network is either a client or a server.
Components
• Clients
• Servers
• Communication Networks
Clients
• Applications that run on computers
• Rely on servers for
• Files
• Devices
• Processing power
• Example: E-mail client
• An application that enables you to send and receive e-mail
• Clients are Applications
Servers
• Computers or processes that manage network resources
• Disk drives (file servers)
• Printers (print servers)
• Network traffic (network servers)
• Example: Database Server
• A computer system that processes database queries
• Servers Manage Resources
Communication Networks
• Networks Connect Clients and Servers
Client–Server Computing
• Process takes place on the server and on the client
Servers
Store and protect data
Process requests from clients
Clients
Make requests
Format data on the desktop
Application Components
3
Data Management
2
Application Logic
1
Presentation
3 Logical Tiers
2 Client Types
Thin
Client
Fat
Client
Middleware
• Software that connects two otherwise separate applications
• Example: Middleware product linking a database system to a Web server
1.
2.
3.
Client: Requests Data via Web
Middleware Links Applications
Web Server: Presents Dynamic Pages
Popular operating systems
• Windows Server : Windows 2008, 2012
• Unix Server : HP UX, Sun Solaris, BSD, SCO, AIX
• Linux Server : Red-Hat, Ubuntu, CentOS, Debian, SuSe
OS considerations (administration and maintenance)
Security
A OS must protect the shared resources under its control. Security includes authenticating user access
to services to prevent unauthorized access to the network resources. Security also performs encryption
to protect information as it travels between clients and servers.
Scalability
Scalability is the ability of a OS to grow without degradation in performance. The OS must be capable of
sustaining performance as new users join the network and new servers are added to support them.
Robustness/fault tolerance
A measure of robustness is the ability to deliver services consistently under heavy load and to sustain
its services if components or processes fail. Using redundant disk devices and balancing the workload
across multiple servers can improve OS robustness.
Server applications, protocols and remote
management :
1. Remote management allows administrators to configure networked systems that are
miles apart
2. Network processes are referred to as
•services in Windows Servers
•daemons in UNIX and Linux
Present day concept : Server Consolidation
Server consolidation is an approach to the efficient usage of computer
server resources in order to reduce the total number of servers or
server locations that an organization requires. The practice developed
in response to the problem of server sprawl, a situation in which
multiple, under-utilized servers take up more space and consume more
resources than can be justified by their workload.
Server Consolidation
Server Consolidation – concept of virtualization
• Type-1 Virtualization
Server consolidation – concept of virtualization
• Type-2 Virtualization
Server consolidation – concept of virtualization
• Container Virtualization
TCP/IP based services
1. Most popular network processes rely on the TCP/IP suite of protocols
2. TCP/IP are vulnerable to unauthorized scans and malicious attacks.
• Denial of service (DoS) attacks
• computer viruses
• fast-spreading Internet worms
3. Recent versions of popular OSs restrict the default network services.
Network Management
• Network management id the process of controlling a complex data
network to maximize its efficiency and productivity
Network Management standards
Internet approach: Simple Network Management Protocol (SNMP, secure SNMP, SNMP v2)
OSI approach: CMIP – common management information protocol
CMIS – common management information service
SNMP is beyond the simple protocol with adequate monitoring and change capabilities
SNMP V2 greatly enhances SNMP feature set
CMIS/CMIP approaches the advanced tool, but implementation issues have limited in use
Over View of IP Schema
VC System
at Shimla
Internet
NKN
BSNL
MCU at NIC Delhi
Core Switching & Routing
Desktop VC
Private
IP Address Range
Allotted by NKN
Own Private
IP
Address Range
Distribution & Access Network
Own Public IP
Address Range
Private
IP Address
Garuda Grid
IIT Kharagpur Campus
Network Security Architecture
VPN Client
National
Knowledge
Network
DMZ 1:
Mail Exchangers &
Web Servers
Internet
PE
2 X 1Gbps
Leased Ckt.
Over EOS
BSNL
L2 Switch
2 X STM1
NKN Internet
CE
L2 Switch
DMZ 6: Off Campus Zone
KOL
Extn.
BBSR
Extn.
L2 Switch
Existing
ASA 5540
ASA
8 Mbps
Leased Ckt
over EOS
For NKN User
L2 Switch
L3 Switch
DMZ 3:
Proxy Servers &
Load Balancers
L3 Switch
Server Farm
Switch
Existing
PIX
L2 Switch
L3 Switch
DMZ 5: ERP Zone
DMZ 4:
L2 Switch
Mail
Servers
Telnet, FTP, SSH,
Computational, Video
Conferencing Servers
Network Over View
Internet
NKN
BSNL
BBSR
Extn.
Centre
10 Gbps Ethernet
Campus Backbone Network
Reliance
Kolkata
Extn.
Centre
Hostel
Area Network
Academic
Area Network
Wi-Fi Network
Residential
Area Network
Thank You