Test Review to chap 8

Download Report

Transcript Test Review to chap 8

Web Server Administration
Chapter 1
The Basics of Server and Web
Server Administration
1
Overview






The Internet and the World Wide Web
Server administration
Web server administration
Common tasks and services performed
by administrators
Networking building blocks
Web server platforms
2
Establishing Access Control



What is Access control?
What is a roaming profile?
What are some of the standard groups
in a Windows 2003 Server
environment?
3
Understanding the Server
Environment


With Windows computers, servers and
users’ computers can be organized into
domains in order to centralize control
How do domains work in Windows?
4
Understanding Web server
Administration


Web server administrators focus on
resource access via the Internet
What type of services are distributed
over the web?
5
Understanding Web server
Administration

What are some of the tasks of a Web
Administrator?





Web page development
Database design
Programming
E-mail administration
Security
6
Selecting Programs and
Databases


Web server administrators need to
install programming languages
Name three programming languages

Active Server Pages (ASP)


ASP.Net


Original language from Microsoft
A newer environment that includes many
languages
Java Server Pages (JSP)
7
Selecting Programs and
Databases

Examples of popular Non-Microsoft
languages…




Perl – one of the first and still popular
PHP – easy to use
Java Server Pages (JSP)
Macromedia ColdFusion
8
Dynamic content

What is dynamic content and what do
you need to produce it?
9
Selecting Programs and
Databases

A database management system (DBMS) is
used to store data used with Web pages



Microsoft Access is appropriate for small sites
Microsoft SQL Server, Oracle 9i, and MySQL are
sophisticated DBMSs for larger sites
Standard Query Language (SQL) is the
language used to communicate with the
DBMS
10
Applications you need to
understand




Email
Firewall
FTP
DNS
11
TCP/IP Model
Layer
Name
Common
Components
OSI
Reference
Application
HTTP, SMTP, POP3
FTP, DNS
Application
Presentation
Session
Transport
TCP, UDP
Transport
Network
IP, ICMP
Network
Physical
Ethernet, FDDI
Data Link
Physical
12
TCP/IP Protocols

Hypertext Transfer Protocol (HTTP)


Simple Mail Transfer Protocol (SMTP)


Web servers implement this protocol
Used by e-mail servers (and sometimes
Web servers) to send e-mail
Post Office Protocol Version 3 (POP3)

Used to retrieve e-mail
13
TCP/IP Protocols

File Transfer Protocol (FTP)


Domain Name Service (DNS)


Transfers files to and from server
Translates host names to IP addresses and
IP addresses to host names
Transmission Control Protocol (TCP)

Creates a reliable connection between two
computers
14
TCP/IP Protocols

User Datagram Protocol (UDP)


Internet Protocol (IP)


Does not establish a connection, just sends
messages
Provides addressing scheme
Internet Control Message Protocol
(ICMP)

Provides error messages
15
Common Carrier Connections



What are some of the common
connection types to ISPs?
What are the speeds?
How do WAN speeds compare to LAN
speeds?
16
Ways to Connect to the
Internet


T Lines (T1, T3)
Integrated services digital network (ISDN)




Digital Subscriber Line (DSL)



Dial-up access
Basic Rate Interface (BRI) up to 128 Kbps
Primary Rate Interface (PRI) up to 1.544 Mbps
Often differing speeds for uploads and downloads
Depending on type, up to 6.1 Mbps for downloads and 1.544
Mbps for uploads
Cable Modem

Shared access cable provided by cable TV company
17
So?


Why does the speed of your connection
to the ISP matter?
What factors determine your bandwidth
needs?
18
Web Hosting Solutions



Standard hosting
Dedicated server
Co-location
What’s the difference?
19
Web Server PlatformsMicrosoft
Name two
20
True/False
Indicate whether the sentence or statement is
true or false.
The Internet is centrally
controlled.
21
True/False
Indicate whether the sentence or statement is
true or false.
Peering agreements are
always free.
22
True/False
Indicate whether the sentence or statement is
true or false.
A backbone is used for highspeed user connections.
23
True/False
Indicate whether the sentence or statement is
true or false.
A roaming profile resides on
each user’s computer.
24
True/False
Indicate whether the sentence or statement is
true or false.
Web server administrators
need to be good programmers.
25
True/False
Indicate whether the sentence or statement is
true or false.
XML allows developers to
create text files containing tags
that define information.
26
True/False
Indicate whether the sentence or statement is
true or false.
Microsoft Access is a more
complex DBMS than SQL Server
2000.
27
True/False
Indicate whether the sentence or statement is
true or false.
One of the advantages of e-mail
servers is that they are very secure
and prevent anything harmful from
entering the system.
28
True/False
Indicate whether the sentence or statement is
true or false.
Software patches and
enhancements have been known
to cause problems.
29
True/False
Indicate whether the sentence or statement is
true or false.
In a LAN environment, the most
common network technology in
use today is Ethernet.
30
True/False
Indicate whether the sentence or statement is
true or false.
T-Carrier connections offer
the most growth potential.
31
True/False
Indicate whether the sentence or statement is
true or false.
Cable modems do not share
access with other users in the
same area.
32
True/False
Indicate whether the sentence or statement is
true or false.
In standard hosting, your site
resides on the same computer
with many other sites.
33
True/False
Indicate whether the sentence or statement is
true or false.
You cannot run a Web server on a
Windows client operating system, such
as Windows 2000 Professional or
Windows XP.
34
Modified True/False
Indicate whether the sentence or statement is
true or false. If false, change the identified
word or phrase to make the sentence or
statement true.
Active Server Pages are compiled.
35
True/False
Indicate whether the sentence or statement is
true or false.
You cannot use Microsoft Exchange on
a Microsoft client product, such as
Windows 2000 Professional or
Windows XP.
36
True/False
Indicate whether the sentence or statement is
true or false.
Bandwidth is expressed in bytes
per second.
37
True/False
Indicate whether the sentence or statement is
true or false.
DSL connections can have
differing upload and download
speeds.
38
True/False
Indicate whether the sentence or statement is
true or false.
ISDN is a dial-up service.
39
Web Server Administration
Chapter 2
Preparing For Server Installation
40
Overview





Identify server categories
Evaluate server components
Plan for system disasters and reduce
their effects
Evaluate network components
Set up IP addressing
41
Identifying Server Categories-File
Servers and Application Servers
There is a difference between a file server
and an application server
42
Evaluating Server ComponentsIntel Processors
Processor
RAM
L2 cache
Bus speed
Pentium 4
Dual Channel RDRAM; PC 133 SDRAM; 512 K
DDR 200/266 SDRAM
>400 MHz
Pentium III
Xeon
Dual Channel DDR;
SDRAM
up to 2 MB
up to 400
MHz
Celeron
SDRAM
128 K or 256 up to 100
K
MHz
43
Evaluating Server ComponentsUltraSPARC Processors
Processor
Relative speed
Maximum L2 Maximum
cache
number of
processors
Bus speed
UltraSPARC III Cu
Fastest
8 MB
over 1000
150 MHz
UltraSPARC II
About 50% of III Cu
8 MB
64
66 MHz
UltraSPARC IIi
About 50% of III Cu
2 MB
4
66 MHz
UltraSPARC IIe
About 50% of III Cu
256 KB
4
66 MHz
44
Evaluating Server ComponentsSelecting a Hard Drive Interface


IDE drives
SCSI
45
Evaluating Server ComponentsSelecting a NIC
NIC Type
Speed
Media
Use
Standard
Ethernet
10 Mbps
Twisted pair
(sometimes fiber)
Workstations
Fast
Ethernet
100 Mbps
Twisted pair
(sometimes fiber)
Workstations and
small to medium
servers
Gigabit
Ethernet
1,000 Mbps
Fiber (sometimes
twisted pair)
High-end servers
10-Gigabit
Ethernet
10,000 Mbps
Fiber
Backbone
connections
ATM
25 Mbps – 622+
Mbps
Fiber
Workstations and
servers (rare)
46
Disk Redundancy through
RAID


RAID 1 (mirroring)
RAID 5 (most common)
47
Setting Up Backup Systems



Full – all data is backed up
Differential – backs up all files that are new
or changed since last full backup
Incremental – backs up all files that are
new or changed since the last incremental
backup
48
Evaluating Network
Components



Hubs should be avoided in a server
environment - Why?
Switches can come close to the
appearance of a dedicated circuit
between servers
Routers connect one network to
another
49
Setting Up IP Addressing


IP addresses are
divided into the
network portion and
the host portion
The subnet mask
distinguishes the
two portions
50
Common IP Classes
Class
First number
Subnet mask
Number of
networks
Number of
hosts
Class A
1 – 127
255.0.0.0
126
>16,000,000
Class B
128 – 191
255.255.0.0
> 16,000
>65,000
Class C
192 – 223
255.255.255.0
> 2,000,000
254
51
Network Address Translation
(NAT)


NAT allows an IP address from one
network to be translated into another
address on an internal network
You can also use NAT to translate a
single IP address valid on the Internet
into multiple internal addresses

Useful if your ISP gives you a single IP
address, yet you have multiple servers and
users on the internal network
52
Web Server Administration
Chapter 3
Installing the Server
53
The Installation ProcessPartitioning the Hard Disk



A partition is a logical division of the hard disk
A system boots from the primary partition
You can create an extended partition



Gives you more logical drives in Windows
Gives you more Linux partitions
It is best to isolate the operating system from
applications

If the application partition fills and the operating system
is on the same partition, the OS stops
54
The Installation ProcessSelecting a File System


A file system determines how files are stored
on a hard disk
Windows has two file systems



FAT is based on the original DOS file system and
has no security
NTFS has security which is critical for a server
The default user file system in Red Hat Linux
8 is ext3, which offers some performance
improvements over ext2
55
Configuring TCP/IP in Windows

To determine TCP/IP configuration, type
ipconfig at a command prompt
56
To Change the IP Address in
Windows



From the Local Area Status dialog box,
click Properties
Select Internet Protocol (TCP/IP), then
click Properties
Now you can change the IP address

The Advanced button allows you to add
multiple IP addresses for a single NIC
57
Web Server Administration
Chapter 4
Name Resolution
58
Understanding the DNS
What is DNS?
59
Domain Namespaces




The root level domain is ?
Top-level domains include ?
Second-level domains are often owned by
companies and individuals. Examples?
What is a subdomain is a further division of a
second-level domain? Where are they
commonly used today?
60
How DNS Works
61
DNS Components


Name server
Name resolver (client)
62
Caching and Forwarding Servers
63
Zones
What is a DNS zone?
64
Zones

Zones must be contiguous




admin.devry.edu can be combined with devry.edu
admin.devry.edu cannot be combined with
student.devry.edu
There must be one primary DNS server in
each zone (plus a secondary server)
Each zone can have multiple secondary DNS
servers
65
Zone File Configuration

Forward Lookup


These zones contain entries that map
names to IP addresses
Reverse Lookup

These zones contain entries that map IP
addresses to names
66
Common DNS Records
DNS record
Function
Address (A)
Associates a host to an IP address.
Canonical name
(CNAME)
Creates an alias for a specified host.
Internet (IN)
Identifies Internet records; precedes most DNS record
entries.
Mail Exchanger
(MX)
Identifies a server used for processing and delivering e-mail
for the domain.
Name server (NS)
Identifies DNS servers for the DNS domain.
Pointer (PTR)
Performs reverse DNS lookups. Resolves an IP address to a
host name.
Start of Authority
(SOA)
Identifies the DNS server with the most current information for
the DNS domain.
67
Finished DNS Configuration in
Windows
68
Troubleshooting DNS
ping

ping displays name resolution even if the computer cannot be contacted
69
Troubleshooting DNS
nslookup

nslookup can display information from the DNS server
70
Web Server Administration
Chapter 5
Managing a Server
71
Microsoft LAN Networking ModelsWorkgroup


Peer to peer
Client – Server
What’s the difference?
72
Microsoft LAN Networking ModelsWorkgroup (Peer to Peer0


How many users max?
Disadvantages



Most users do not want to administer
resources on their computer
Need user names and passwords of users
who need resources
Difficult to keep track of changing
passwords
73
Microsoft LAN Networking ModelsDomain


One or more servers centralize control
Computers are part of a domain



Single, centralized logon
Single point of control
Users can be given access to resources
anywhere in the domain
74
Client/Server Networking
Model


Client represents a program such as a
browser or an e-mail client
Server has a corresponding program
that communicates with the client
75
Authenticating Users


Process of determining a user's true
identity
Three basic methods



What you know – user name and
passwords
What you have – entry card
Who you are – biometrics
76
Implementing an
Authentication System


NTLM
Kerberos
77
Managing Users and Groups


Users need accounts to access
resources on a server. On a Web server
there is a restricted account that is used
on behalf of Internet users
What is that account?
In a LAN, users with common resource
needs are put in a group, and the group
is given access to the resource
78
Managing Users and Groups in
Windows

Windows has an account called system


It represents the operating system and it
has many of the same privileges of the
administrator
Often needed by server programs
79
Users and Groups in Windows



Local accounts exist on a single computer and
can be used to control resources only on that
computer
Domain accounts can be used to control
resources on all the computers that are part
of the domain
Active Directory (AD) allows domains to be
grouped into a forest

Microsoft Exchange requires AD
80
Groups in Windows

Domain local groups have members from the
same domain


Global groups have members from the same
domain


Assign permissions to resources in the same domain
Can be used to assign permissions to resources in any
domain
Universal groups can have members from any
domain

Can be used to assign permissions to resources in any
domain
81
Users and Groups in Linux

Properties of user accounts
Item
Description
User name
Logon name of the user
Full name
The full name of the user or any comment
Password
The password must be at least six characters
Home directory
The default is /home/username
Group
The default is to create a group with the same name as the user
Login shell
The default is /bin/bash, which determines the characteristic of the
shell environment
82
File System Permissions



Permission allow you to control access
to the resources on a computer such as
a Web page, a document, or a program
In Windows, the NTFS file system is
required in order to assign permissions
All Linux file systems incorporate
permissions
83
File System Permissions in
Windows
Permission
Description
Full Control
Full Control includes all other permissions and allows you to take
ownership of the file or folder and change the attributes of a file
Modify
Allows read, write, and delete
Read
With this permission, you can read files but cannot execute them
Write
When set on a file, this permission allows you to write to files; when
set on a folder, you can write to the folder
Read & Execute
Read files and run programs
List Folder Contents
This permission allows you to view the contents of a folder
Special Permissions
(Windows 2003
only)
This is not a specific permission; under the list of permissions for
users, when this permission is checked, it means that this user
has one or more of the 14 individual permissions set
84
Sharing Resources in a
Windows Network


Shared folders require permissions
When comparing share permissions and
NTFS permissions, the most restrictive
permission takes precedence
Permission
Description
Full Control
Allow files to be added, deleted, changed, and read
Change
Allow existing files to be written to
Read
Can only read files
85
Enforcing Network Policies



You can control a number of policies in
both Windows and Linux
Windows has many more policies but
the majority are appropriate for LANs
A common policy involves passwords


Number of days before change allowed
Number of days before change required
86
Web Server Administration
Chapter 6
Configuring a Web Server
87
How a Web Server Works



HTTP (Hypertext Transfer Protocol)
defines how information is passed
between a browser and a Web server
The two most popular Web servers are?
Almost two-thirds of all Web servers use
Apache
88
How a Web Server Works

As is true with other servers such as
DNS, Web servers listen for
communication at a port



The default port is 80
You can also create Web servers at port
numbers greater than 1023
Each Web server has a root, which is
where you store the HTML documents
89
Features in IIS 5.0

Web Distributed Authoring and Versioning
(WebDAV)


Named virtual hosting



Multiple Web sites can share a single IP address
Per Web site bandwidth throttling


Allows a server to share Web-based files
Control bandwidth by Web site
Kerberos authentication
Secure Sockets Layer 3.0

Encrypted communication
90
Features in IIS 6.0

Increased security


Expanded language support



Default permits only HTML documents
Can use XML and SOAP
Support for IPv6
Increased dependability


Kernel-mode HTTP service
Self-healing mechanism
91
Components in IIS

File Transfer Protocol (FTP) server


FrontPage 2000 Server Extensions



Used by programs to transfer files to and from a
Web site
NNTP Service


To transfer files between user and server
Used to create user forums
SMTP Service
World Wide Web Server
92
Default Web Site Properties in
IIS
93
Hosting Multiple Web Sites
by Port Number


Associate each new Web site with a
port above 1023
To retrieve a Web page from a site at
port 8080


www.technowidgets.com:8080/prod.htm
Because it requires a user to add the
port number, it is not a popular method
94
Hosting Multiple Web Sites
by IP Address

You can create multiple IP addresses on a
single NIC



Referred to as virtual IP addresses
Useful for flexibility because if each domain
has its own unique IP address, you can easily
move the domain to a different Web server
It is getting more expensive to get multiple IP
addresses from an ISP
95
Hosting Multiple Web Sites
by Host Name




Multiple host names can be associated
with a single IP address
Getting a single IP address from your ISP
is relatively inexpensive
You can host an almost unlimited number
of domains with a single IP address
It is the most common method of hosting
96
Web Server Administration
Chapter 7
Installing and Testing a
Programming Environment
97
The Need for Programming
Languages



What is a static web page?
Pages that contain programming
statements allow changes and they are
called dynamic pages
Programming languages can also be
used to update databases and
communicate with other systems
98
Database Management
Systems (DBMSs)



The purpose of a DBMS is to store data
in an organized manner for further
processing
Structured Query Language (SQL) is the
language used to define and manipulate
the data
Most databases are relational and
organize data into tables
99
Web-based Programming
Environment

What is a Cookie?

Text that a Web site stores on your disk
100
Web Server Administration
Chapter 8
Providing E-mail Services
101
Understanding the E-mail
Environment



E-mail evolved from a variety of proprietary
systems
In the 1980s and 1990s, people often had email addresses on a number of systems
Even as late as 1997, Exchange 5.5 was not
designed to take advantage of Internet e-mail

An add-on gave Exchange the ability to send and
receive e-mail over the Internet
102
Exchange 2000 Goes Beyond
E-mail Basics


Instant messaging
Unified messaging platform



Chat service
URL addressing


Single inbox for e-mail, voicemail, fax
Use a single URL to access stored data
Audio and video conferencing
103
Role of DNS in E-mail Systems


A domain name, such as
technowidgets.com, needs to be
associated with two IP addresses.
Explain.
To associate a domain name, or any other
host name, with the IP address of an email server, you need an ____ record?
104
E-mail System Terminology

MTA (Mail Transfer Agent)



MUA (Mail User Agent)



Accepts e-mail from clients and sends e-mail to
another MTA for storage
Exchange 2000, sendmail
E-mail client
Outlook, KMail
MDA (Mail Delivery Agent)


Delivers e-mail from server to MUA
Exchange 2000, imap-2001
105
E-mail Protocols

SMTP (Simple Mail Transfer Protocol)


POP3 (Post Office Protocol)



To send e-mail messages
To retrieve e-mail
Typically, all messages are downloaded to a client
IMAP4 (Internet Mail Access Protocol)



To retrieve e-mail
E-mail stays on the server
You can create folders on server to store e-mail
106
Installing Microsoft Exchange
2000





SMTP is part of IIS, not Exchange, and needs
to be installed
NNTP (Network News Transport Protocol)
needs to be installed before Exchange and is
also part of IIS
Active Directory is required for Exchange
Once the above are installed, the Exchange
wizard guides you through a simple
installation
To use Exchange 2000 on Windows Server
2003, Exchange 2000 Service Pack 3 is
required
107
Good Luck!
108