Server Basics
Server Basics
1
1.0—Server Basics
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2 Chapter
. . . . .1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.0—Server
. . . . . . .Basics
3
. . .
Introduction
The Server+ Exam Objective 1.3 states that the test taker should know the
basic purpose and function of various types of servers. This chapter discuss-
es server types and their functions:
➤ Servers used as gateways, routers, and bridges
➤ Firewall servers
➤ Proxy servers
➤ Database servers
➤ Client servers
➤ Application servers
➤ Fax servers
➤ Web servers
The test taker should also be able to describe the hardware types (blade
servers, tower servers, and rack-mount servers), including their module clas-
sifications, basic specifications, limitations, and requirements (especially with
regard to power and cooling). Each of these types is also discussed in this
chapter.
01_0789733684_CH01.qxd 10/18/05 11:31 AM Page 4
4 Chapter
. . . . .1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Server Cases
Servers are housed in one of two different case types: rack-mounts (rack-
mount chassis) or pedestals. The most popular is the rack-mount chassis
because rack-mount components can be slid in and out of the cabinet easily
for inspection and maintenance.
The Unit, simply designated as U, is a common unit of measurement in rack
systems. Rack-mount cases typically come in 1U, 2U, 4U, or 5U sizes. One
U is 1.75 inches high and is the smallest unit that can be placed into a rack.
A full rack is 42 Us in height. The server case may be any size, but is meas-
ured in multiples of the U size designation.
Know how to calculate the space that will be taken up by a server rack component of
multiple Us in height.
Rack-Mount Systems
Differences between servers and desktops include the concept of rack-
mounted components. These racks allow service personnel easy access to
troubleshoot, repair, or replace server components. Pullout rails and easy
access panels facilitate maintenance procedures. They serve in business
client/server environments to limit or eliminate downtime due to mainte-
nance or component replacement.
Most racks have wheels on the bottom for ease of movement, but they are
not designed to be moved with components in them. Be sure to move the
01_0789733684_CH01.qxd 10/18/05 11:31 AM Page 5
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.0—Server
. . . . . . .Basics
5
. . .
rack empty and then install (or reinstall) the components later. This prevents
damage to the rack components.
6 Chapter
. . . . .1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Know the difference between improving the fault tolerance of a server, and improv-
ing the capability of a server.
Know the advantages of the various specialty features associated with a server rack.
Pedestal-Mount Systems
The pedestal design is similar in appearance to an extra-wide full-tower
desktop case. However, the inside of the case is designed to incorporate typ-
ical server functions. Pedestal cases are used in smaller networks because
they tend to be less expensive.
Pedestal servers feature integrated Ethernet controllers, redundant hot-swap
power supplies, hot-swap Small Computer System Interface (SCSI) drive
bays, Peripheral Component Interconnect (PCI) hot-plug support, and re-
dundant hot-swap fans. A pedestal server’s durability and availability is
01_0789733684_CH01.qxd 10/18/05 11:31 AM Page 7
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.0—Server
. . . . . . .Basics
7
. . .
8 Chapter
. . . . .1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Know what purpose each environment blade server is best suited for.
Server Types
Although all servers perform the basic functions we’ve described so far, in
practice they tend to vary significantly in their physical appearance and
purpose. Servers can be divided into three major types: general-purpose,
appliance, and multi-tier, and defined by the primary applications they are
designed to perform.
Ensure that you understand each server type and its general application.
General-Purpose Servers
General-purpose servers are intended to provide a wide variety of services, such
as handling departmental email or providing file, print, and web services that
run on an industry-standard network operating system (NOS).
As the most common server products in use today, general-purpose servers
are typically configured with multiple processors.
They are employed in most small businesses because they can be used for
multiple purposes and are designed to do many functions fairly well. In small
businesses, the server must have redundancy to keep its resources available
without undue cost. Redundancy is the practice of devoting extra hardware
to maintain network resources and is the primary form of fault tolerance
01_0789733684_CH01.qxd 10/18/05 11:31 AM Page 9
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.0—Server
. . . . . . .Basics
9
. . .
used in server systems. It is created inside a server chassis with backup power
supplies, hard drives, and network cards, and on a system-wide basis by
adding more servers to the network.
Typical redundant items used in general-purpose servers include multiple
hot-swap power supplies, multiple hot-swappable hard drives, and special-
ized hot-swap PCI slots.
Although these items do not individually prevent the server from failing,
they allow components to be exchanged with the system still running.
Combined with the use of redundant components, the effects of hardware
failures are minimized or eliminated entirely.
Powerful processors are selected for use in general-purpose servers to per-
form multiple functions. Such servers utilize two or more Pentium III, Xeon,
Pentium 4, or Itanium processors from the Intel group.
The amount of installed RAM in a general-purpose server is medium to
high, depending on the server’s intended use. Hard drive configuration
depends on whether the client will use it as a file server or not. If so, it will
usually include a RAID 5 array for redundancy, speed, and capacity.
Appliance Servers
Appliance servers provide a single service, such as web serving, or multi-
services such as providing Internet caching and firewall protection. This
server is usually treated as a Field-Replaceable Unit (FRU), so that when it
crashes, it is simply replaced by a comparable unit as quickly as possible. No
attempt is made to repair the unit while it is still connected to the network.
When a company installs an appliance server, two of them will normally be
placed in the network together. If one server fails, the other will guarantee
that network resources remain up and running.
Appliance servers tend to employ middle-level processors and various other
hardware. If the appliance server was intended to provide web services, large
quantities of RAM would be required to enable the caching of whole web
pages into memory. For use as a file server, it would include an advanced
RAID controller to provide improved disk access times, and the amount of
installed RAM wouldn’t be a critical consideration. Appliance servers come
as specifically preconfigured units and are simply connected to the network
and turned on to perform the prescribed function.
Appliance servers are generally in the middle range in terms of cost, and tend
to be less expensive than general-purpose servers. They are typically found
in medium-sized businesses, where using specialized servers to provide spe-
cific functions can be justified.
01_0789733684_CH01.qxd 10/18/05 11:31 AM Page 10
10 Chapter
. . . . .1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
➤ Firewall servers
➤ Proxy servers
➤ Management services
➤ Messaging services
➤ Collaboration services
➤ News servers
➤ Web servers
➤ Database servers
01_0789733684_CH01.qxd 10/18/05 11:31 AM Page 11
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.0—Server
. . . . . . .Basics
11
. . .
➤ Terminal servers
The following list describes the ways in which flow performances are
improved when application servers are used to deliver information:
➤ Security algorithms are applied to both the data and all user traffic.
Mail Servers
Mail servers send and receive email. These application servers receive and
store electronic mail messages in private mailboxes. seen as folders on the
network mail server. When a user invokes his or her mail client software, the
main mail folder is queried, and the mail server sorts through the account
folders retrieving the mail messages that belong exclusively to the user. The
mailbox processing is performed on the server side, and the results are then
passed to the client.
Mail server applications are actually two distinct services, receiving incoming
email and distributing outgoing email. The normal protocols used are Post
Office Protocol (POP3) for receiving incoming email, and Simple Mail
Transfer Protocol (SMTP) for sending outgoing email.
Firewall Servers
Firewall servers control the connections between two networks, commonly
acting as gateways to the Internet. They protect the network by implement-
ing access control to block unwanted traffic, while allowing acceptable com-
munications. Firewall servers come in both the hardware and software variety.
Hardware firewalls are suitable for co-location duties and for use with parti-
tioned networking environments using demilitarized zones (DMZs). When
a hardware firewall is said to be performing co-location duties, this means
that the firewall resides in a rack belonging to a service provider that may
house other firewalls or equipment used by other companies. A DMZ is a
useful safety feature when hosting a server, in order to separate the corporate
Local Area Network (LAN) from any simultaneous public server activity. It
permits the separation of the administrative and main website traffic.
Although software firewall products may be provided for various server
platforms, some are designed to protect mission-critical applications and
data hosted on Windows servers. They employ intrusion prevention
01_0789733684_CH01.qxd 10/18/05 11:31 AM Page 12
12 Chapter
. . . . .1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
systems capable of stopping active and/or date-oriented attacks, and also use
application-hardening techniques. They are designed to be easily deployed,
and to integrate seamlessly into various network infrastructures.
Proxy Servers
Proxy servers are similar to firewalls, and they act as an intermediary between
a client’s workstation and the Internet. Over time, they cache frequently
visited websites. This saves Internet bandwidth and increases access speeds
by allowing the internal network to access these sites from the proxy server.
This type of arrangement works well only for Internet downloading chores.
When both uploading and downloading activities are required, a firewall
server will be used.
Anonymous proxy servers conceal the Internet Protocol (IP) addresses of users
on the network side of the Internet connection. This shields clients from
having their personal IP addresses recorded by hackers trying to gain unau-
thorized Internet access to their computers. Client IP addresses are secure,
as are their browsing interests. Anonymous proxy servers don’t reveal that
clients are using them to browse the Internet, and are commonly used for
web-based email, web chat rooms, and FTP transfers.
Websites can gather personal information about visitors through their
unique IP addresses. This activity is actually a form of spying, and can reveal
personal reading interests. Revealed personal information can make that per-
son a target for marketing and advertising agencies, through the use of
unwanted email or spam. Although proxy servers can help to prevent this,
they can also be used by employers to filter outgoing web requests, or to pre-
vent company employees from accessing a specific set of websites.
Remember that a proxy server is capable of two types of cache requests:
➤ Reverse proxy cache—The cache is configured to act as the original server
from which the client requests the data.
➤ Forward proxy cache—The client requests the Internet data and this
request is forwarded through the cache on the way to the original server.
If the cache does not currently contain the requested information, the proxy
server requests the information from the original server, and stores a copy in
its cache for any future requests. If the cache already contains the requested
data, it is sent to the client without contacting the original server.
Management Services
Management services are special tools and protocols used for remote system
management. The Simple Network Management Protocol (SNMP) is the
01_0789733684_CH01.qxd 10/18/05 11:31 AM Page 13
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.0—Server
. . . . . . .Basics
13
. . .
Messaging Services
Messaging services provide the capability to send instant messages throughout
the network and are usually included in the operating system. The Windows,
Unix, and Linux operating systems include their own messaging service
utilities.
Collaboration Services
Collaboration services allow multiple users to communicate using text, graph-
ics, video, or voice. Whiteboard applications allow the client to communicate
in a text chat box, and draw diagrams to clarify subjects discussed.
Email messages are sent and received through what is commonly referred to
as a client device. Client devices can include personal computers, company
workstations, mobile phones, and Pocket PCs. Centralized computer systems
are made up of servers or mainframe computers, where the enterprise email-
boxes are stored as part of the business network. The email client typically
connects to a network of centralized email servers, which in turn connects to
both the Internet, and any number of private networks. What makes a col-
laboration tool so useful is its family of protective controls that make sending
and receiving electronic information a secure experience for company-wide
operations.
News Servers
A news server is a computer with software installed to receive, store, and dis-
tribute news articles to and from newsgroups on a specific network, or on the
Internet. The most recognizable example of a news server is USENET, an
Internet-based network using the Network News Transfer Protocol (NNTP).
USENET consists of numerous global bulletin boards divided into a variety
of discussion group categories, called newsgroups.
01_0789733684_CH01.qxd 10/18/05 11:31 AM Page 14
14 Chapter
. . . . .1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Web Servers
A web server hosts web pages for intranet and/or Internet access, and can host
more than one site depending on its underlying operating system. Web
servers are used to share information and often replace old-fashioned file and
print servers. Today we access websites using browser software, including
Microsoft Internet Explorer and Netscape Communicator.
When configuring a web server with Microsoft Windows 2000, security can
be applied by using
➤ User authentication—The ability to control who can access data on a
website, by forcing a user logon.
➤ Data encryption—The scrambling of data so that it will not transfer
across the network in a readable format.
➤ Web permissions—The granting of access to resources by assigning specif-
ic permission levels to the data, or the folders in which the data resides.
During a browse, the web application server links a database server with the
client. The application server determines if the required information is
already in the database. If so, it is quickly located and transferred to the client
in much less time than it would take to reload the specified web page from
scratch.
Database Servers
Database servers store and sort through data in response to client queries.
Servers of this type are necessary for organizations that must manage large
quantities of data. All data processing is performed on the server using serv-
er-side application software. The client’s software defines the query and is
called the client-side application.
Terminal Servers
Terminal servers are special-purpose computers fitted with multi-ported asyn-
chronous modem connections, and a number of LAN ports. A terminal
server allows serial line devices to connect to the network, with basic
arrangements permitting access only to dumb terminals via modems and
01_0789733684_CH01.qxd 10/18/05 11:31 AM Page 15
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.0—Server
. . . . . . .Basics
15
. . .
telephone lines. The terminal server answers modem-based phone calls and
completes the connections to the appropriate node(s). Sophisticated termi-
nal servers permit intelligent terminals such as PCs to connect to the net-
work using higher-level protocols such as Point-to-Point Protocol (PPP). If
network connections are solely obtained through the use of modems, the ter-
minal server is referred to as a modem server.
At a minimum, the terminal server serves these functions:
➤ A remote control solution for remote users
16 Chapter
. . . . .1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
People deal better with alphanumeric names than they do with numbered
sequences. Conversely, to a digital computer, everything is a number.
TCP/IP networks, such as the Internet, can use human-readable host names
corresponding to unique numbers called IP addresses that have been
assigned to computers. The IP addresses being resolved are usually of the
static variety. For residential Internet users, websites are reached using
modem, DSL, or cable connections through dynamic IP addressing. The
local Internet Service Provider (ISP) temporarily assigns the client an IP
address used only for the duration of that specific connection. A different IP
address will be assigned for the next Internet connection. DSL or cable
Internet services allow the use of a static IP address. A dynamic IP operation
does not affect the typical Internet user because the flow of information is all
incoming. It does present a problem for any client hosting a personal web-
site. A web server using a dynamic IP will be impossible to link to, because
there is no direct relationship between it and its domain name!
Dynamic DNS (DDNS) solves this dilemma through the use of special
DDNS service providers. DDNS is a method of keeping a domain name
linked to a changing, or dynamic, IP address. It allows dynamic IP Internet
addresses to be able to use applications that require static IP addresses by
mapping a third-level domain name to the client’s DDNS IP address. When
the client’s ISP-assigned IP address changes, the DDNS client program will
forward the new IP address to the DDNS.
Know what types of servers are capable of caching and forwarding requests.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.0—Server
. . . . . . .Basics
17
. . .
LAN LAN
Email Gateway
[Link]
Email Server Firewall [Link] Firewall Email Server
[Link] [Link]
18 Chapter
. . . . .1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
FTP Servers
An FTP server transfers files across the Internet, an extranet, or an intranet.
To access an FTP server, the client computer must have an FTP client pro-
gram installed. Modern web browsers include a minimal FTP client that
allows files to be sent and received using the FTP protocol.
Many companies utilize an FTP server for software downloads, such as free,
beta, or demo versions, or patches and upgrades. By segregating software
download operations from a company’s web server, the overall level of net-
work traffic is reduced.
FTP is also a viable alternative to using email for transferring extremely large
files. Experienced email users know that large files included as attachments
take considerably longer to send or download with an email server than when
transferred to or from an FTP server.
Most users think about FTP from the perspective of uploading or down-
loading operations, rather than the way in which an FTP server is set up.
FTP software programs are intended to reside on the FTP server itself, and
permit the site operator to control settings that dictate how the FTP server
will operate. FTP server software is used to set limitations on transfer speeds
and maximum users allowed. In addition, specific security measures can be
adjusted, for blocking bounce attacks, hammering, and FXP (server-to-
server copying, or FXP mode, which is built into FTP).
01_0789733684_CH01.qxd 10/18/05 11:31 AM Page 19
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.0—Server
. . . . . . .Basics
19
. . .
In a bounce attack, the hacker misuses the PORT command on an FTP server to
indirectly access arbitrary ports on other machines, or systems, not directly
accessible by other means. When the hacker is connected, he or she is free
to bypass any access controls that would otherwise apply.
Hammering is the repeated attempt to connect with an unavailable FTP
server without permitting a normal delay time between attempts. FTP
servers cannot process an unlimited number of requests, and when running
at full capacity, they deny further access until capacity is freed. Hammering
causes a server that is already working at capacity to send a busy response to
any device trying to connect every time a connection is attempted, further
depleting server resources. FTP sites normally require their clients to set
retry times at specific intervals, commonly at least 120 seconds between each
attempt. They also monitor for hammering devices, banning access to
offending IP addresses temporarily, or permanently.
Properly used, FXP is a useful function. However, hackers with bad inten-
tions can also misuse it. An FTP client connects to two servers at the same
time, with one server directed to receive an incoming file, and the other
instructed to send it. The sending and receiving servers connect to each
other, and transfer the requested file without it first being copied to the orig-
inating FTP client. Because this function can cause great damage if improp-
erly used (bounce attacks), it is normally disabled on most FTP servers. FTP
administrators usually enable FXP functions for specific reasons, at specific
times, for specific customers.
SNA Servers
SNA was developed in 1970 as a proprietary protocol for telecommunica-
tions networks, primarily because large corporations demanded more
throughput and better security from their existing networks.
An SNA server allows client access to mainframe (IBM) and mid-range data
facilities, and also permits print facilities to be located on the host computer.
SNA server load-balanced configurations work well with high-priority situ-
ations because the failure of any one server is transparent to a connected
client machine. When one server fails, the client is automatically switched to
the next available server.
Microsoft SNA Server was developed in order to share IBM data in the PC
environment, resulting in seamless mainframe-to-desktop file transfers.
Further refinements in this type of system interoperability resulted in the
introduction of Host Integration Server (HIS) 2000, which has succeeded
SNA Server.
01_0789733684_CH01.qxd 10/18/05 11:31 AM Page 20
20 Chapter
. . . . .1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
NAS Servers
Because of slowdowns and service interruptions that commonly occur in
conventional file servers, Network-Attached Storage (NAS) is one alterna-
tive. NAS servers effectively move storage out from behind the file server, and
put it directly on the transport network. Whereas file servers normally use
SCSI and LAN adapters, an NAS appliance uses an NIC to transmit both
LAN and storage communications. Because NAS servers operate independ-
ently from the file server, any client with access rights, anywhere on the net-
work, can directly access stored NAS data.
NAS servers are also optimized for faster processing of I/O storage transac-
tions, avoiding inherent delays from file server hardware or operating
systems.
NAS server arrays can be housed within a 3U rack-mount chassis, equipped
with a redundant power supply featuring an audible alarm. They often use
Serial ATA (SATA) hard drives specifically designed for enterprise operations
featuring 100% duty cycles. NAS server rack-mounts can be fitted with PCI
RAID cards, with each running on its own dedicated PCI bus. Each unit
includes two 2.8GHz CPUs and 4GB of RAM. A dedicated internal hard
drive keeps the operating system separated from the RAID operating system.
Each chassis also comes with an internal CD-ROM drive. These arrays can
be centralized within racks to form systems that are considerably more
robust, as shown in Figure 1.2.
Common rack-mount features include improved manageability, high-end
performance at low acquisition cost, and up to 56TB of data storage per cab-
inet. Easy-to-use GUI or command-line interfaces provide for rapid system
deployment and maintenance. Cross-platform file support is also provided
for any combination of Linux, Unix, Windows, or MacOS environments,
and compatibility exists for leading data backup and replication software.
When a rack-mount system is connected to smart UPS battery backup
equipment, a controlled automatic shutdown can be performed during any
power failure.
To process requests from networks running multiple types of operating sys-
tems, NAS servers and appliances use a common file server access protocol.
The physical complexity associated with using parallel SCSI buses to connect
storage disks to file servers is alleviated.
The main disadvantage of an NAS server is that it shifts storage transactions
from parallel SCSI connections to the production network, forcing the local
area network to handle its normal end-user traffic plus storage disk opera-
tions, including backup. Although file server backups have always resulted in
01_0789733684_CH01.qxd 10/18/05 11:31 AM Page 21
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.0—Server
. . . . . . .Basics
21
. . .
large bandwidth consumption, NAS does not resolve this issue by using the
production network for backup and recovery. However, an alternate file-han-
dling strategy called a SAN does remove backup traffic from the LAN.
SAN Servers
A SAN is a network designed to attach such computer storage devices as disk
array controllers and tape libraries to servers. SAN servers are common in
enterprise storage, which focuses not only on storage, but also on data pro-
tection and retrieval within large-scale environments.
SAN servers access their data using low-level block storage methods, as
opposed to the file storage access method, similar to the way in which data is
identified on ATA and SCSI internal disk drives. To access network data,
most SANs use the SCSI communications protocol, without the lower-level
01_0789733684_CH01.qxd 10/18/05 11:31 AM Page 22
22 Chapter
. . . . .1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
RAS Servers
A Remote Access Service (RAS) allows the client to dial in to a computer
from a remote site. Therefore, an RAS server is devoted to taking care of
these clients, even though they are not connected to the LAN but do require
remote access to it. If a home-based office PC is connected to the main office
LAN via an RAS server’s modem port, the RAS server enables this client to
access files and/or printer services on the targeted LAN. It provides connec-
tivity into a private or corporate network for the remote modem user, neces-
sitating the running of the TCP/IP network protocol encapsulated inside
PPP. The remote machine has access to the targeted network as though it
were directly plugged into it.
For example, when a client dials into the office network from his or her
home PC, the analog modem will dial into an RAS server at the office, and
the client will then be authenticated and granted access. Following this iden-
tification process, printers and shared drives can be accessed just as if the
client were actually at the office and connected directly to the network. In
addition, the server could be configured to only allow access during certain
periods for a particular group of users.
Remember that an RAS server can also be attacked in a similar fashion as
described with FTP servers.
When a suitable RAS server becomes the target, there are techniques hackers
can use to try to break in, such as using common usernames and passwords
like “Administrator” or “root.” To secure the server from this type of attack,
a callback system can be implemented, where even if a would-be hacker is
armed with the correct username and password, the callback goes only to an
authorized client.
For sales or technical personnel out on the road, preventing a hack becomes
harder. In these cases, a token-based security system can be implemented,
where clients log in by using a PIN and a digital “token.”
01_0789733684_CH01.qxd 10/18/05 11:31 AM Page 23
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.0—Server
. . . . . . .Basics
23
. . .
Because the token changes at least once every minute, only the token gener-
ator and the server will know what it is.
Callback systems are also implemented for the purpose of reverse charging,
so that the commercial site picks up the employee’s connection charges.
Fax Servers
Fax servers help to reduce the amount of telephone infrastructure, while pro-
viding the ability to quickly transport required documents. The authenticity
of printed faxes as legal and official documents, as well as their use for infor-
mation exchange and data confirmation within the corporate environment is
well established. Although fax servers are often standalone operations, they
are sometimes combined with email services.
01_0789733684_CH01.qxd 10/18/05 11:31 AM Page 24
24 Chapter
. . . . .1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Most fax server products are software-based, where the administrator is free
to choose the accompanying hardware, such as a network-ready server, a fax
modem, an Integrated Services Digital Network (ISDN) adapter, or a dedi-
cated fax board.
WINS Servers
The Windows Internet Naming Service (WINS) server is a Microsoft
NetBIOS name server that permits the client to search for resources by com-
puter name, instead of by IP address. It provides a distributed database for
registering and prompting for dynamic mappings of NetBIOS names over
TCP/IP for networked groups. WINS maps NetBIOS names by their actual
IP addresses, providing NetBIOS name resolution in routed environments.
NetBIOS names were used by earlier versions of Windows to locate, iden-
tify, register, and resolve names for shared or grouped network resources.
Although the NetBIOS naming protocol established networking services in
earlier Microsoft OSs, it is also used with network protocols other than
TCP/IP. WINS was designed specifically for use over TCP/IP-based net-
works in order to simplify the management of NetBIOS namespace.
The order of the events for a typical WINS operation is as follows:
1. The WINS client registers any of its local NetBIOS names with its
configured WINS server.
2. Another WINS client prompts the WINS server to locate the IP
address for the first WINS client on the network.
3. The WINS server replies with the IP address for the first WINS
client ([Link] for example).
WINS eliminates the need to use local IP broadcasts for NetBIOS name res-
olution, permitting users to locate remote systems on the network more
easily. When a client first joins the network, the WINS registrations are
done automatically and the database is automatically updated. When a
DHCP server issues a new or changed IP address to a WINS-enabled client
computer, client WINS information is updated without requiring clients or
administrators to make any manual changes.
When managing a name-to-address database, or mapping NetBIOS names
to IP addresses, a WINS server is required. Microsoft Windows 2000,
Windows XP, and Windows Server 2003 are configured with WINS server
addresses either manually, or automatically (DHCP), for name resolution.
01_0789733684_CH01.qxd 10/18/05 11:31 AM Page 25
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.0—Server
. . . . . . .Basics
25
. . .
DHCP Servers
The Dynamic Host Configuration Protocol (DHCP) temporarily assigns dynam-
ic IP addresses to network workstations and Internet clients each time they
are detected. When these units power down, or disconnect, their IP addresses
become available for reassignment to another client. A group of dynamic IP
addresses, called a scope, will be maintained at the DHCP server. The scope
must be identified during the DHCP server’s configuration procedure.
Temporarily assigned IP addresses from DHCP permit the efficient manage-
ment of the entire IP addressing scheme. Software tracks the IP addresses of
additional computers rather than requiring an administrator to manually
assign them.
Dynamic addressing provides each networked device with a different IP
address every time it connects to the network, sometimes changing them
during a connected session. DHCP also supports a mix of static and dynamic
IP addresses, and Internet Service Providers (ISPs) often reserve dynamic IP
addressing for dial-up users. When the DHCP server assigns IP addresses to
clients using DHCP, it automatically uses leased IP addresses. A standard
DHCP lease is the total amount of time permitted by that server for a client
to use one of its IP addresses, and the DHCP server normally permits the
network administrator to set its lease time.
➤ Mid-tier servers
➤ Back-end servers
26 Chapter
. . . . .1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Front-End Servers
Front-end servers function similarly to appliance servers. They can be config-
ured to perform one function, or a multiple of related functions, and are
treated as field-replaceable units. Typical front-end servers are used for
➤ Mail servers
➤ Proxy servers
➤ Firewall servers
➤ Web services
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.0—Server
. . . . . . .Basics
27
. . .
Mid-Tier Servers
Mid-tier servers are used to process and relay information between front-end
and back-end servers. Using hardware very similar to that described for
general-purpose servers, most mid-tier servers are designed to perform more
than one function. They may act as both a file server and as a mail server, or
designed to act as a back-end or a front-end server. A mid-tier server is nor-
mally too powerful to be used simply as a front-end server, and not powerful
enough to perform as a reliable back-end server.
In larger companies, the mid-tier is usually made up of network servers. In
very large organizations, the middle tier may include database and web
servers that pull data from back-end servers Fault tolerance is provided by
including redundant components inside the chassis, and using redundant
machines throughout the tier.
Mid-tier machines are more expensive than front-end servers, and the pur-
chase of offline backup machines is not cost-effective. Instead, larger com-
panies often install a second machine to perform the identical function. If
one mid-tier machine fails, the redundancy from the online backup guards
against losing the resource. By adding the second machine online, the over-
all performance of the middle tier for that function is increased.
Back-End Servers
Back-end servers typically are large, expensive units used to store vast volumes
of data in archive and data farms. A typical back-end server used in a data
warehouse operation may have 30 or more disk drives connected to it.
Because they hold the data required by working mid-tier and front-end
servers, back-end servers are usually required to be up and running 99.99%
of the time.
An archive server holds all of the data that has previously been backed up and
archived. This differs from a traditional backup where data is transferred to
some type and then stored in a secure area. Retrieving traditional data back-
ups requires physically going to the secure area and inserting the media into
the backup server. An archive server will store all the data to some type of
01_0789733684_CH01.qxd 10/18/05 11:31 AM Page 28
28 Chapter
. . . . .1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
media, and will allow the archived data to be accessed without manual inter-
vention. For tape backups, the server would access the specific tape contain-
ing the required data using a mechanical arm to retrieve and insert the tape
into the server.
Back-end machines are so expensive that procuring an additional standby
machine is not a cost–effective solution. Instead, a high level of redundancy
is built into the chassis of a back-end server, including power-on fault toler-
ance, in order to keep the system up and running even when replacing failed
components.
Large network systems often provide multiple levels of data backup. The first, and
most efficient, backup level is directly on a local hard disk drive. The second level of
archival storage is reserved for data that is not used immediately. The first level of
backup data may periodically be archived on a secondary storage device, such as a
tape drive. In large networks, the archival storage function may be performed and
controlled by a server, or a cluster of servers, referred to as archival servers.
Back-end servers do not require large amounts of RAM, but they do require
fast disk access, plenty of processing power, and high storage capacities. In
data farms, the servers may be organized into Storage Area Networks
(SANs). SANs are specialized, high-speed fiber optic networks that extract
data from the servers without using the main network’s bandwidth. They are
connected directly to the back-end servers, and pull the data up to the main
network.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1.0—Server
. . . . . . .Basics
29
. . .
As indicated earlier, the middle tier is made up of servers that act as inter-
mediates between the front-end and back-end tiers. Like the front-end tier,
the middle tier normally consists of multiple machines and redundant
machines. However, the servers in this tier also tend to include a high level
of redundancy inside the chassis itself.
The back-end tier is made up of large, expensive machines that typically rely
on redundancy inside the system to keep them available. Their high cost
tends to make using separate redundant units unrealistic. As you can see, the
reasoning behind the types of redundancy employed at each level is driven
primarily by cost.
Some mid-sized companies may skip either the back-end or front-end server
tiers depending on their current needs. Other medium-sized companies may
configure a portion of their multi-tiered servers to perform at more than one
level. For example, a company might use what would be considered mid-
tiered machines to perform front-end and mid-tier tasks, while their back-
end servers simply perform back-end functions. This arrangement, as de-
picted in Figure 1.3, would save the company money without totally com-
promising their resources. In addition, the structure could later be expanded
into a fully tiered network as the company’s needs grow.
Front-end
Tasks: Mid-tier
Tasks:
Proxy server
Mail server File server
Mail server Back-end server
Firewalls (data server)
Web services Database server
Front-end/
mid-tier
server