Download presentation
Presentation is loading. Please wait.
Published byCarmel Bryan Modified over 9 years ago
1
1 Web Server Administration Chapter 1 The Basics of Server and Web Server Administration
2
2 Overview The Internet and the World Wide Web Server administration Web server administration Common tasks and services performed by administrators Networking building blocks Web server platforms
3
3 Establishing Access Control What is Access control? What is a roaming profile? What are some of the standard groups in a Windows 2003 Server environment?
4
4 Understanding the Server Environment With Windows computers, servers and users’ computers can be organized into domains in order to centralize control How do domains work in Windows?
5
5 Understanding Web server Administration Web server administrators focus on resource access via the Internet What type of services are distributed over the web?
6
6 Understanding Web server Administration What are some of the tasks of a Web Administrator? Web page development Database design Programming E-mail administration Security
7
7 Selecting Programs and Databases Web server administrators need to install programming languages Name three programming languages Active Server Pages (ASP) Original language from Microsoft ASP.Net A newer environment that includes many languages Java Server Pages (JSP)
8
8 Selecting Programs and Databases Examples of popular Non-Microsoft languages… Perl – one of the first and still popular PHP – easy to use Java Server Pages (JSP) Macromedia ColdFusion
9
9 Dynamic content What is dynamic content and what do you need to produce it?
10
10 Selecting Programs and Databases A database management system (DBMS) is used to store data used with Web pages Microsoft Access is appropriate for small sites Microsoft SQL Server, Oracle 9i, and MySQL are sophisticated DBMSs for larger sites Standard Query Language (SQL) is the language used to communicate with the DBMS
11
11 Applications you need to understand Email Firewall FTP DNS
12
12 TCP/IP Model Layer Name Common Components OSI Reference ApplicationHTTP, SMTP, POP3 FTP, DNS Application Presentation Session TransportTCP, UDPTransport NetworkIP, ICMPNetwork PhysicalEthernet, FDDIData Link Physical
13
13 TCP/IP Protocols Hypertext Transfer Protocol (HTTP) Web servers implement this protocol Simple Mail Transfer Protocol (SMTP) Used by e-mail servers (and sometimes Web servers) to send e-mail Post Office Protocol Version 3 (POP3) Used to retrieve e-mail
14
14 TCP/IP Protocols File Transfer Protocol (FTP) Transfers files to and from server Domain Name Service (DNS) Translates host names to IP addresses and IP addresses to host names Transmission Control Protocol (TCP) Creates a reliable connection between two computers
15
15 TCP/IP Protocols User Datagram Protocol (UDP) Does not establish a connection, just sends messages Internet Protocol (IP) Provides addressing scheme Internet Control Message Protocol (ICMP) Provides error messages
16
16 Common Carrier Connections What are some of the common connection types to ISPs? What are the speeds? How do WAN speeds compare to LAN speeds?
17
17 Ways to Connect to the Internet T Lines (T1, T3) Integrated services digital network (ISDN) Dial-up access Basic Rate Interface (BRI) up to 128 Kbps Primary Rate Interface (PRI) up to 1.544 Mbps Digital Subscriber Line (DSL) Often differing speeds for uploads and downloads Depending on type, up to 6.1 Mbps for downloads and 1.544 Mbps for uploads Cable Modem Shared access cable provided by cable TV company
18
18 So? Why does the speed of your connection to the ISP matter? What factors determine your bandwidth needs?
19
19 Web Hosting Solutions Standard hosting Dedicated server Co-location What’s the difference?
20
20 Web Server Platforms- Microsoft Name two
21
21 True/False Indicate whether the sentence or statement is true or false. The Internet is centrally controlled.
22
22 True/False Indicate whether the sentence or statement is true or false. Peering agreements are always free.
23
23 True/False Indicate whether the sentence or statement is true or false. A backbone is used for high- speed user connections.
24
24 True/False Indicate whether the sentence or statement is true or false. A roaming profile resides on each user’s computer.
25
25 True/False Indicate whether the sentence or statement is true or false. Web server administrators need to be good programmers.
26
26 True/False Indicate whether the sentence or statement is true or false. XML allows developers to create text files containing tags that define information.
27
27 True/False Indicate whether the sentence or statement is true or false. Microsoft Access is a more complex DBMS than SQL Server 2000.
28
28 True/False Indicate whether the sentence or statement is true or false. One of the advantages of e-mail servers is that they are very secure and prevent anything harmful from entering the system.
29
29 True/False Indicate whether the sentence or statement is true or false. Software patches and enhancements have been known to cause problems.
30
30 True/False Indicate whether the sentence or statement is true or false. In a LAN environment, the most common network technology in use today is Ethernet.
31
31 True/False Indicate whether the sentence or statement is true or false. T-Carrier connections offer the most growth potential.
32
32 True/False Indicate whether the sentence or statement is true or false. Cable modems do not share access with other users in the same area.
33
33 True/False Indicate whether the sentence or statement is true or false. In standard hosting, your site resides on the same computer with many other sites.
34
34 True/False Indicate whether the sentence or statement is true or false. You cannot run a Web server on a Windows client operating system, such as Windows 2000 Professional or Windows XP.
35
35 Modified True/False Indicate whether the sentence or statement is true or false. If false, change the identified word or phrase to make the sentence or statement true. Active Server Pages are compiled.
36
36 True/False Indicate whether the sentence or statement is true or false. You cannot use Microsoft Exchange on a Microsoft client product, such as Windows 2000 Professional or Windows XP.
37
37 True/False Indicate whether the sentence or statement is true or false. Bandwidth is expressed in bytes per second.
38
38 True/False Indicate whether the sentence or statement is true or false. DSL connections can have differing upload and download speeds.
39
39 True/False Indicate whether the sentence or statement is true or false. ISDN is a dial-up service.
40
40 Web Server Administration Chapter 2 Preparing For Server Installation
41
41 Overview Identify server categories Evaluate server components Plan for system disasters and reduce their effects Evaluate network components Set up IP addressing
42
42 Identifying Server Categories-File Servers and Application Servers There is a difference between a file server and an application server
43
43 Evaluating Server Components- Intel Processors ProcessorRAML2 cacheBus speed Pentium 4Dual Channel RDRAM; PC 133 SDRAM; DDR 200/266 SDRAM 512 K>400 MHz Pentium III Xeon Dual Channel DDR; SDRAM up to 2 MBup to 400 MHz CeleronSDRAM128 K or 256 K up to 100 MHz
44
44 Evaluating Server Components- UltraSPARC Processors ProcessorRelative speedMaximum L2 cache Maximum number of processors Bus speed UltraSPARC III CuFastest8 MBover 1000150 MHz UltraSPARC IIAbout 50% of III Cu8 MB6466 MHz UltraSPARC IIiAbout 50% of III Cu2 MB466 MHz UltraSPARC IIeAbout 50% of III Cu256 KB466 MHz
45
45 Evaluating Server Components- Selecting a Hard Drive Interface IDE drives SCSI
46
46 Evaluating Server Components- Selecting a NIC NIC TypeSpeedMediaUse Standard Ethernet 10 MbpsTwisted pair (sometimes fiber) Workstations Fast Ethernet 100 MbpsTwisted pair (sometimes fiber) Workstations and small to medium servers Gigabit Ethernet 1,000 MbpsFiber (sometimes twisted pair) High-end servers 10-Gigabit Ethernet 10,000 MbpsFiberBackbone connections ATM25 Mbps – 622+ Mbps FiberWorkstations and servers (rare)
47
47 Disk Redundancy through RAID RAID 1 (mirroring) RAID 5 (most common)
48
48 Setting Up Backup Systems Full – all data is backed up Differential – backs up all files that are new or changed since last full backup Incremental – backs up all files that are new or changed since the last incremental backup
49
49 Evaluating Network Components Hubs should be avoided in a server environment - Why? Switches can come close to the appearance of a dedicated circuit between servers Routers connect one network to another
50
50 Setting Up IP Addressing IP addresses are divided into the network portion and the host portion The subnet mask distinguishes the two portions
51
51 Common IP Classes ClassFirst numberSubnet maskNumber of networks Number of hosts Class A1 – 127255.0.0.0126>16,000,000 Class B128 – 191255.255.0.0> 16,000>65,000 Class C192 – 223255.255.255.0> 2,000,000254
52
52 Network Address Translation (NAT) NAT allows an IP address from one network to be translated into another address on an internal network You can also use NAT to translate a single IP address valid on the Internet into multiple internal addresses Useful if your ISP gives you a single IP address, yet you have multiple servers and users on the internal network
53
53 Web Server Administration Chapter 3 Installing the Server
54
54 The Installation Process- Partitioning the Hard Disk A partition is a logical division of the hard disk A system boots from the primary partition You can create an extended partition Gives you more logical drives in Windows Gives you more Linux partitions It is best to isolate the operating system from applications If the application partition fills and the operating system is on the same partition, the OS stops
55
55 The Installation Process- Selecting a File System A file system determines how files are stored on a hard disk Windows has two file systems FAT is based on the original DOS file system and has no security NTFS has security which is critical for a server The default user file system in Red Hat Linux 8 is ext3, which offers some performance improvements over ext2
56
56 Configuring TCP/IP in Windows To determine TCP/IP configuration, type ipconfig at a command prompt
57
57 To Change the IP Address in Windows From the Local Area Status dialog box, click Properties Select Internet Protocol (TCP/IP), then click Properties Now you can change the IP address The Advanced button allows you to add multiple IP addresses for a single NIC
58
58 Web Server Administration Chapter 4 Name Resolution
59
59 Understanding the DNS What is DNS?
60
60 Domain Namespaces The root level domain is ? Top-level domains include ? Second-level domains are often owned by companies and individuals. Examples? What is a subdomain is a further division of a second-level domain? Where are they commonly used today?
61
61 How DNS Works
62
62 DNS Components Name server Name resolver (client)
63
63 Caching and Forwarding Servers
64
64 Zones What is a DNS zone?
65
65 Zones Zones must be contiguous admin.devry.edu can be combined with devry.edu admin.devry.edu cannot be combined with student.devry.edu There must be one primary DNS server in each zone (plus a secondary server) Each zone can have multiple secondary DNS servers
66
66 Zone File Configuration Forward Lookup These zones contain entries that map names to IP addresses Reverse Lookup These zones contain entries that map IP addresses to names
67
67 Common DNS Records DNS recordFunction Address (A)Associates a host to an IP address. Canonical name (CNAME) Creates an alias for a specified host. Internet (IN)Identifies Internet records; precedes most DNS record entries. Mail Exchanger (MX) Identifies a server used for processing and delivering e-mail for the domain. Name server (NS)Identifies DNS servers for the DNS domain. Pointer (PTR)Performs reverse DNS lookups. Resolves an IP address to a host name. Start of Authority (SOA) Identifies the DNS server with the most current information for the DNS domain.
68
68 Finished DNS Configuration in Windows
69
69 Troubleshooting DNS ping ping displays name resolution even if the computer cannot be contacted
70
70 Troubleshooting DNS nslookup nslookup can display information from the DNS server
71
71 Web Server Administration Chapter 5 Managing a Server
72
72 Microsoft LAN Networking Models- Workgroup Peer to peer Client – Server What’s the difference?
73
73 Microsoft LAN Networking Models- Workgroup (Peer to Peer0 How many users max? Disadvantages Most users do not want to administer resources on their computer Need user names and passwords of users who need resources Difficult to keep track of changing passwords
74
74 Microsoft LAN Networking Models- Domain One or more servers centralize control Computers are part of a domain Single, centralized logon Single point of control Users can be given access to resources anywhere in the domain
75
75 Client/Server Networking Model Client represents a program such as a browser or an e-mail client Server has a corresponding program that communicates with the client
76
76 Authenticating Users Process of determining a user's true identity Three basic methods What you know – user name and passwords What you have – entry card Who you are – biometrics
77
77 Implementing an Authentication System NTLM Kerberos
78
78 Managing Users and Groups Users need accounts to access resources on a server. On a Web server there is a restricted account that is used on behalf of Internet users What is that account? In a LAN, users with common resource needs are put in a group, and the group is given access to the resource
79
79 Managing Users and Groups in Windows Windows has an account called system It represents the operating system and it has many of the same privileges of the administrator Often needed by server programs
80
80 Users and Groups in Windows Local accounts exist on a single computer and can be used to control resources only on that computer Domain accounts can be used to control resources on all the computers that are part of the domain Active Directory (AD) allows domains to be grouped into a forest Microsoft Exchange requires AD
81
81 Groups in Windows Domain local groups have members from the same domain Assign permissions to resources in the same domain Global groups have members from the same domain Can be used to assign permissions to resources in any domain Universal groups can have members from any domain Can be used to assign permissions to resources in any domain
82
82 Users and Groups in Linux Properties of user accounts ItemDescription User nameLogon name of the user Full nameThe full name of the user or any comment PasswordThe password must be at least six characters Home directoryThe default is /home/username GroupThe default is to create a group with the same name as the user Login shellThe default is /bin/bash, which determines the characteristic of the shell environment
83
83 File System Permissions Permission allow you to control access to the resources on a computer such as a Web page, a document, or a program In Windows, the NTFS file system is required in order to assign permissions All Linux file systems incorporate permissions
84
84 File System Permissions in Windows PermissionDescription Full ControlFull Control includes all other permissions and allows you to take ownership of the file or folder and change the attributes of a file ModifyAllows read, write, and delete ReadWith this permission, you can read files but cannot execute them WriteWhen set on a file, this permission allows you to write to files; when set on a folder, you can write to the folder Read & ExecuteRead files and run programs List Folder ContentsThis permission allows you to view the contents of a folder Special Permissions (Windows 2003 only) This is not a specific permission; under the list of permissions for users, when this permission is checked, it means that this user has one or more of the 14 individual permissions set
85
85 Sharing Resources in a Windows Network Shared folders require permissions When comparing share permissions and NTFS permissions, the most restrictive permission takes precedence PermissionDescription Full ControlAllow files to be added, deleted, changed, and read ChangeAllow existing files to be written to ReadCan only read files
86
86 Enforcing Network Policies You can control a number of policies in both Windows and Linux Windows has many more policies but the majority are appropriate for LANs A common policy involves passwords Number of days before change allowed Number of days before change required
87
87 Web Server Administration Chapter 6 Configuring a Web Server
88
88 How a Web Server Works HTTP (Hypertext Transfer Protocol) defines how information is passed between a browser and a Web server The two most popular Web servers are? Almost two-thirds of all Web servers use Apache
89
89 How a Web Server Works As is true with other servers such as DNS, Web servers listen for communication at a port The default port is 80 You can also create Web servers at port numbers greater than 1023 Each Web server has a root, which is where you store the HTML documents
90
90 Features in IIS 5.0 Web Distributed Authoring and Versioning (WebDAV) Allows a server to share Web-based files Named virtual hosting Multiple Web sites can share a single IP address Per Web site bandwidth throttling Control bandwidth by Web site Kerberos authentication Secure Sockets Layer 3.0 Encrypted communication
91
91 Features in IIS 6.0 Increased security Default permits only HTML documents Expanded language support Can use XML and SOAP Support for IPv6 Increased dependability Kernel-mode HTTP service Self-healing mechanism
92
92 Components in IIS File Transfer Protocol (FTP) server To transfer files between user and server FrontPage 2000 Server Extensions Used by programs to transfer files to and from a Web site NNTP Service Used to create user forums SMTP Service World Wide Web Server
93
93 Default Web Site Properties in IIS
94
94 Hosting Multiple Web Sites by Port Number Associate each new Web site with a port above 1023 To retrieve a Web page from a site at port 8080 www.technowidgets.com:8080/prod.htm Because it requires a user to add the port number, it is not a popular method
95
95 Hosting Multiple Web Sites by IP Address You can create multiple IP addresses on a single NIC Referred to as virtual IP addresses Useful for flexibility because if each domain has its own unique IP address, you can easily move the domain to a different Web server It is getting more expensive to get multiple IP addresses from an ISP
96
96 Hosting Multiple Web Sites by Host Name Multiple host names can be associated with a single IP address Getting a single IP address from your ISP is relatively inexpensive You can host an almost unlimited number of domains with a single IP address It is the most common method of hosting
97
97 Web Server Administration Chapter 7 Installing and Testing a Programming Environment
98
98 The Need for Programming Languages What is a static web page? Pages that contain programming statements allow changes and they are called dynamic pages Programming languages can also be used to update databases and communicate with other systems
99
99 Database Management Systems (DBMSs) The purpose of a DBMS is to store data in an organized manner for further processing Structured Query Language (SQL) is the language used to define and manipulate the data Most databases are relational and organize data into tables
100
100 Web-based Programming Environment What is a Cookie? Text that a Web site stores on your disk
101
101 Web Server Administration Chapter 8 Providing E-mail Services
102
102 Understanding the E-mail Environment E-mail evolved from a variety of proprietary systems In the 1980s and 1990s, people often had e- mail addresses on a number of systems Even as late as 1997, Exchange 5.5 was not designed to take advantage of Internet e-mail An add-on gave Exchange the ability to send and receive e-mail over the Internet
103
103 Exchange 2000 Goes Beyond E-mail Basics Instant messaging Unified messaging platform Single inbox for e-mail, voicemail, fax Chat service URL addressing Use a single URL to access stored data Audio and video conferencing
104
104 Role of DNS in E-mail Systems A domain name, such as technowidgets.com, needs to be associated with two IP addresses. Explain. To associate a domain name, or any other host name, with the IP address of an e-mail server, you need an ____ record?
105
105 E-mail System Terminology MTA (Mail Transfer Agent) Accepts e-mail from clients and sends e-mail to another MTA for storage Exchange 2000, sendmail MUA (Mail User Agent) E-mail client Outlook, KMail MDA (Mail Delivery Agent) Delivers e-mail from server to MUA Exchange 2000, imap-2001
106
106 E-mail Protocols SMTP (Simple Mail Transfer Protocol) To send e-mail messages POP3 (Post Office Protocol) To retrieve e-mail Typically, all messages are downloaded to a client IMAP4 (Internet Mail Access Protocol) To retrieve e-mail E-mail stays on the server You can create folders on server to store e-mail
107
107 Installing Microsoft Exchange 2000 SMTP is part of IIS, not Exchange, and needs to be installed NNTP (Network News Transport Protocol) needs to be installed before Exchange and is also part of IIS Active Directory is required for Exchange Once the above are installed, the Exchange wizard guides you through a simple installation To use Exchange 2000 on Windows Server 2003, Exchange 2000 Service Pack 3 is required
108
108 Good Luck!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.