1/50
Lessons 4 - 5
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Server
is a computer or system that provides resources, data, services, or programs to other computers, known as clients, over a network.
Web Server, File Server, Database Server, Mail Server, Application Server, Game Server
Types of Server
Web server
is a type of server that stores, processes, and delivers web pages to clients (usually web browsers) over the Internet using the HTTP or HTTPS protocol.
File Server
is a computer or device that stores and manages files so other computers on the same network can access, share, and save files centrally.
Database Server
is a computer system or software that stores, manages, and provides access to databases. It handles requests from client devices or applications that want to read, write, or update data in a structured way.
Mail Server
(also called an email server) is a system that sends, received, and stores email messages. It works behind the scenes to ensure hat emails reach the correct destinations across the internet od within a network.
Application Server
is a software framework or environment that host and runs applications, especially web-based or enterprise-applications. It acts as the middle layer between the user’s devices (client) and the back-end databases or system.
Game Server
is a server which is the authoritative source of events in a multiplayer video game. The server transfer enough data about its internal state to allow its connected clients to maintain their own accurate version of the game world for display to players. They also receive and process each player's input..
Extensibility
the quality of being designed to allow the addition of new capabilities or functionality.
More CPU Performance
Servers often have multiple CPUs and advanced hardware features such as pre-fetch, multi-stage processor checking, and the ability to dynamically allocate resources among CPUs.
High Performance I/O
The quantity of I/O is often proportional to the number of clients, which justifies a faster I/O subsystem.
Upgrade Options
Servers are often upgraded, rather than simply replaced; they are designed for growth.
Rack mountable
Servers are often upgraded, rather than simply re- placed; they are designed for growth. Servers generally have the ability to add CPUs or replace individual CPUs with faster ones, without requiring additional hardware changes.
No side-access needs
A rack mounted host is easier to repair or perform maintenance on if tasks can be done while it remains in the rack.
High-availability options
Many servers include various high-availability options, such as dual power supplies, multiple network connections, and hot-swap components.
Maintenance contracts
vendors offer server hardware service contracts that generally include guaranteed turnaround times on replacement parts.
Management Options
servers should have some capability for remote management, such as serial port access, that can be used to diagnose and fix problems to restore a machine that is down to active service.
KVM switch
is a device that lets many machines share a single keyboard, video screen, and mouse (KVM).
boot disk
disk with the operating system, is often the most difficult one to replace if it gets damaged, so we need special precautions to make recovery faster.
Redundant Power Supplies
a redundant power supply does not simply mean that two such devices are in the chassis.
N +1 Redundancy
the base level of resources required for the system functionality — plus a single backup.
Hot -swap
refers to the ability to remove and replace a component while the system is running.
SERVICES
Deliverables from IT and system administration to users and the business.
Technical Services
The foundational infrastructure (e.g., networks, servers).
Business Services
The value-added functions users see (e.g., email, business apps).
CUSTOMER REQUIREMENTS
Before any service can be designed or implemented, it's essential to understand the customer's requirements.
Functional
These define what the service does. They are the specific actions, behaviors, or data a service must provide.
Non-Functional
These define how the service performs. They are the quality attributes that describe how the service should operate.
OPERATIONAL REQUIREMENTS
While customer requirements define what a service needs to do, operational requirements define what IT administrators need to do to keep the service running smoothly.
Uptime
The service must be available as expected.
Scalability
It must grow with the business.
Security
It must be protected from threats.
Vendor Relation
In many IT environments, vendors play a crucial role in delivering services.
Contracts
These legal agreements define the terms of the relationship, including the scope of the service, costs, and responsibilities.
Service Level Agreements (SLAs)
are often part of a contract and specify the minimum level of service a vendor must provide, such as guaranteed uptime, response times for support tickets, and performance metrics.
Licensing
This ensures the organization has the legal right to use the software and services provided by the vendor.
Support
A good vendor relationship includes access to reliable technical support for troubleshooting and maintenance.
MACHINE INDEPENDENCE
Also known as platform neutrality, it is a critical principle for modern IT services.
Virtualization
allows multiple operating systems to run on a single physical machine, creating a layer of abstraction from the underlying hardware.
Containerization
goes a step further by packaging an application and its dependencies into a single, isolated unit that can run consistently across any environment.
RESTRICTED ACCESS
The principle of Least Privilege (POLP) is a fundamental security concept in IT, stating that a user or process should only be granted the minimum necessary permissions to perform its function.
Role-Based Access Control
This assigns permissions to roles rather than individual users.
Multi-Factor Authentication
This requires users to provide two or more verification factors to gain access, such as a password and a code from a mobile app.
CENTRALIZATION AND STANDARDS
The efficient management of IT services requires centralization.
PERFORMANCE
Measure how a service works using throughput, latency, and availability.
Load Balancing
Distributing network traffic across multiple servers to prevent any single server from becoming overwhelmed.
Caching
Storing frequently accessed data in a temporary location to speed up retrieval.
Resource Allocation
Dynamically assigning computing resources (CPU, RAM, storage) to services as needed.
MONITORING
Monitoring is the continuous process of observing and assessing the health, performance, and security of IT services.
Proactive
This involves using tools to predict potential issues before they cause service disruptions.
Reactive
This is about responding to incidents and failures as they occur.