You are on page 1of 18

NATIONAL TEXTILE UNIVERSITY

DEPARTMENT OF TEXTILE TECHNOLOGY

Department: Textile Technology (A)


Semester: 5TH
Assignment Topic:
COMPUTER SERVER MANAGEMENT AND SECURITY SETTING
Submitted By:
FAUZ UL KABEER
(21-NTU-TT-1064)
Submitted To:
MA'AM .MAHAM SALEEM
Question 1: Server Types and Usage
Define and differentiate between the following types of servers:
Web server
A web server is a computer program that delivers content, such as web pages and other files, to users over the
internet. Think of it like a waiter in a restaurant - just as a waiter takes orders from customers and brings them
their food, a web server receives requests from internet users and sends them the content they are looking for.

Web servers are an essential component of the World Wide Web (WWW), which allows people all over the
world to access information online. When you type in a website address or click on a link, your browser sends a
request to the appropriate web server, which then responds by sending back the requested content?

There are many different types of web servers available today, each with its own set of features and capabilities.
Some popular examples include Apache HTTP Server, Microsoft IIS (Internet Information Services), Nginx,
and Google Web Server.

File server
A file server is a computer that stores and manages files for other computers to access. It acts as a central hub
where users can store, share, and retrieve data such as documents, images or videos. Think of it like a large
filing cabinet in an office building where employees can go to find important documents they need to do their
job. The file server makes it easier for multiple users on different devices to collaborate and work together on
the same project by providing them with access to the same set of files. This type of system is commonly used
in businesses or organizations that require shared access to critical data across many devices and locations.

Database server
A database server is a computer program that stores and manages data in a centralized location. It allows
multiple users to access the same information at the same time, while ensuring that the data remains consistent
and secure. Think of it as a digital filing cabinet where all your important files are stored, but instead of just one
person having access to it, multiple people can view or edit its contents simultaneously. This makes it an
essential tool for businesses and organizations that require efficient management of large amounts of data on a
daily basis. Without a database server, managing such vast quantities of information would be difficult and
time-consuming.

Application server
An application server is a type of software that provides a platform for running and managing business
applications. Think of it as the middleman between your computer or mobile device and the application you are
using. It ensures that all requests made by users are properly processed, manages data storage, and handles
communication between different systems.

For example, when you use an online shopping app to make a purchase, the application server processes your
request to buy an item, communicates with the payment gateway to process your payment information securely,
and updates inventory levels in real-time.

Overall, an application server plays a critical role in ensuring that business applications run smoothly and
efficiently.

2. Explain the specific use cases for each type of server and provide real-world
examples.
Use a hypothetical global retail company called "GlobalMart" to explain the specific usage of file servers, web
servers, application servers, and database servers in a worldwide context.

File Server:
GlobalMart uses file servers to store and manage various types of files and documents required for day-to-day
operations. These files include product images, marketing materials, employee documents, and more. The file
server allows employees from different parts of the world to access and share these files efficiently. For
example, when the marketing team in the United States needs access to the latest promotional materials, they
can retrieve these files from the centralized file server, ensuring consistency and easy collaboration across the
globe.

Web Server:
GlobalMart employs web servers to host its e-commerce website, where customers from all over the world can
browse, search for products, and make purchases online. The web server handles incoming web requests from
users' browsers, retrieves data from the database server (described later), and presents web pages to customers.
For instance, a customer in India can access the GlobalMart website hosted on the web server to buy products
and view their order history.

Application Server:
The application server at GlobalMart serves as the backbone of its e-commerce platform. It is responsible for
executing business logic and handling application-specific tasks. For instance, when a customer adds items to
their shopping cart, the application server processes the request, validates inventory, calculates the total cost,
and updates the cart accordingly. This server ensures that the website functions smoothly and that the customer
experience is consistent worldwide. Whether a user is in Canada or Australia, the application server handles
their requests consistently.
Database Server:
The database server stores and manages critical data for GlobalMart, such as product information, customer
profiles, inventory levels, order history, and more. It stores this data in a structured manner, making it accessible
for various parts of the business. When a customer in the United Kingdom places an order, the web server
communicates with the application server to validate the order and then interacts with the database server to
update the inventory and record the transaction. This ensures that accurate, up-to-date information is maintained
globally and can be accessed by different parts of the business

Question 2: Server Operating Systems

1. Research and list three popular server operating systems.


.A server operating system is a type of software that manages the resources and services of a computer network.
It allows multiple users to access shared files, applications, and data from different devices.

Some examples of popular server operating systems include Microsoft Windows Server, Linux Ubuntu Server,
and Apple macOS Server. Each one has its own features and benefits depending on the needs of the user.

 Microsoft Windows Server is widely used in corporate environments because it offers easy integration
with existing Windows-based systems. It also provides advanced security features and centralized
management tools for IT administrators.

 Linux Ubuntu Server is an open-source platform that can be customized to fit specific requirements. It
has a large community of developers who contribute to its development, making it highly flexible and
adaptable.
 Apple macOS Server is designed for small businesses or home offices using Mac computers. It
includes built-in collaboration tools such as file sharing, email hosting, calendar syncing, and remote
access capabilities.

2. Compare and contrast the features, advantages, and disadvantages of these


operating systems.
To compare and contrast these operating systems means to examine their similarities and differences in terms of
features (what they offer), advantages (benefits), and disadvantages (limitations).

For example, one feature that all three operating systems have is a graphical user interface or GUI. This means
that users can interact with their computer using icons, menus, windows, etc., rather than typing commands into
a command-line interface.

Microsoft window
Microsoft Windows, the widely used operating system, has both advantages and disadvantages. Here's an
overview of some of them:

Advantages:
1. User-Friendly Interface: Windows is known for its user-friendly graphical user interface (GUI),
making it accessible to a broad range of users, including those with limited technical knowledge.

2. Wide Software Compatibility: Windows has a vast library of software and applications, including
games, productivity tools, and specialized software for various tasks. This compatibility is essential for
many users.

3. Multitasking: Windows provides efficient multitasking capabilities, allowing users to run multiple
applications simultaneously.

4. Hardware Support: Windows supports a wide range of hardware components and peripherals, making
it compatible with a broad spectrum of devices.
5. Regular Updates: Microsoft releases regular updates and security patches, enhancing the operating
system's stability and security.

Disadvantages:
1. Cost: Windows can be expensive, especially for the professional and enterprise editions, which may
require additional licensing fees.

2. Vulnerability to Malware: Windows is a common target for malware and viruses due to its widespread
use. Users must regularly update and use security software to mitigate this risk.

3. Resource Intensive: Depending on the version, Windows can be resource-intensive, which may require
more powerful hardware for optimal performance.

4. Privacy Concerns: Some users are concerned about privacy issues with Windows, such as data
collection and telemetry.

5. Occasional Instability: While Windows has improved in terms of stability over the years, it can still
encounter occasional crashes and errors.

Advantages:
1. User-Friendly Interface: macos is known for its sleek and user-friendly graphical user interface (GUI),
providing an aesthetically pleasing and intuitive user experience.

2. Hardware and Software Integration: Apple controls both the hardware and software aspects of Macs,
ensuring a high level of integration and optimization, which often leads to better overall performance.

3. Stability and Reliability: macOS is generally considered stable and reliable, with fewer crashes and
errors compared to some other operating systems.

4. Security: macOS benefits from a robust security model that includes Gatekeeper, XProtect, and regular
security updates, making it less vulnerable to malware and viruses compared to some other operating
systems.

5. App Ecosystem: The Mac App Store offers a wide range of applications, including many optimized for
the macOS environment, which can enhance productivity and creativity.

Disadvantages:
1. High Cost: Macs tend to be more expensive than many Windows-based PCs, making them less
affordable for some users.

2. Limited Gaming Support: macOS has a smaller library of games compared to Windows, and some
popular game titles may not be available for macOS.
3. Limited Hardware Customization: Mac hardware is less customizable than Windows-based PCs,
which can be a drawback for users who prefer to build or upgrade their computers.

4. Software Compatibility: Some specialized software or legacy applications are not available for
macOS, which can be an issue for certain professionals or businesses.

5. Closed Ecosystem: The Apple ecosystem can be restrictive for users who prefer more open and
customizable systems. Customization options are more limited on macOS.

Advantages:
1. Free and Open Source: Ubuntu is free to download, use, and modify. It is open-source, which means
that users have access to the source code and can customize it to their needs.

2. Ease of Use: Ubuntu is known for its user-friendly interface, making it accessible to both beginners and
experienced users. Its desktop environment (typically GNOME) is intuitive and straightforward.

3. Large Software Repository: Ubuntu offers a vast repository of software through its package manager,
making it easy to install and update applications. Most common software needs are met within the
official repositories.

4. Community Support: Ubuntu has a large and active user community, which provides support through
forums, blogs, and other online resources. This can be very helpful for troubleshooting and learning.

5. Security: Ubuntu has a strong focus on security, and security updates are regularly provided to keep the
system safe from vulnerabilities.

Disadvantages:
1. Software Compatibility: While Ubuntu has a broad range of software available, it may not support all
Windows or macOS software, which can be a limitation for users who rely on specific applications.

2. Learning Curve: Although Ubuntu is user-friendly, it may still have a learning curve for those new to
Linux or who are accustomed to other operating systems.

3. Hardware Driver Support: While Ubuntu provides many hardware drivers out of the box, support for
some specialized hardware components may be limited, requiring extra effort to set up.

4. Less Commercial Software Support: Proprietary commercial software vendors often prioritize
Windows and macOS, so Ubuntu may not have access to some commercial applications.

5. Occasional Stability Issues: While Ubuntu is generally stable, occasional issues or bugs may arise,
especially after major updates.

3. Provide a recommendation for a specific server operating system and justify your
choice.
A server operating system is software that manages a computer's resources and provides services to other
devices or computers connected to it.

Choosing an appropriate server operating system depends on various factors such as security, reliability,
scalability, compatibility with applications, cost-effectiveness, and ease of management. For instance, Windows
Server OS may be suitable for businesses that rely heavily on Microsoft products while Linux-based systems
like Ubuntu Server may work well for web servers.

To justify our recommendation for a specific server operating system, we need to consider the needs of our
organization or business carefully. we should also take into account any potential growth in operations or
changes in technology requirements.

Question 3: Server Hardware


Describe the essential hardware components of a server.
Servers are specialized computers designed to perform specific tasks or serve resources to other computers,
devices, or users in a network. The essential hardware components of a server typically include:

1. Central Processing Unit (CPU): The CPU is the server's brain, responsible for executing instructions
and processing data. Servers often have multi-core CPUs with high processing power to handle multiple
tasks simultaneously.

2. Memory (RAM): Servers typically have a substantial amount of RAM to efficiently store and access
data during operations. More RAM allows for better performance and multitasking capabilities.

3. Storage Devices: Servers require one or more storage devices to store data and operating system files.
This may include hard disk drives (HDDs) or solid-state drives (SSDs) for local storage. Servers might
also utilize storage area networks (SANs) for centralized and scalable storage solutions.

4. Network Interface Cards (NICs): Servers have multiple NICs to connect to the network. They may
support various networking protocols, including Ethernet and fiber optics, to ensure network
connectivity and redundancy.
5. Power Supply Unit (PSU): Servers often use redundant power supplies to minimize the risk of
downtime due to power failures. Redundant PSUs provide a backup power source in case one fails.

6. Motherboard: The motherboard connects all the components in the server and provides interfaces for
CPU, RAM, storage, and network connections. Server motherboards are designed for stability and may
include features like multiple CPU sockets and ECC memory support.

7. Cooling System: Servers generate a significant amount of heat, so they have advanced cooling systems,
including multiple fans and heatsinks, to maintain a stable operating temperature and prevent
overheating.

8. Redundant Components: Servers are designed for high availability. Redundant components, such as
NICs, power supplies, and fans, help minimize the risk of hardware failure causing downtime.

9. Remote Management Interfaces: Many servers include dedicated management interfaces (e.g.,
Integrated Lights-Out, or iLO for HP servers) to allow remote monitoring, management, and
troubleshooting even when the server is offline.

10. RAID Controllers: To ensure data redundancy and improve performance, servers often use RAID
(Redundant Array of Independent Disks) controllers. These controllers manage multiple drives and can
configure them for mirroring, striping, or other RAID levels.

11. Expansion Slots: Servers typically have multiple PCIe slots for adding additional hardware components
such as network adapters, RAID controllers, or specialized hardware for specific tasks.
12. Security Hardware: Some servers may include hardware security modules (HSMs) or Trusted Platform
Modules (TPMs) to enhance data security and cryptographic operations.

13. Form Factor: Servers come in various form factors, including rack-mounted servers, tower servers, and
blade servers. The form factor can vary depending on the server's intended use and the physical space
available.

14. Environmental Monitoring Sensors: Servers often include environmental sensors to monitor
temperature, humidity, and other conditions to prevent overheating and ensure optimal operating
conditions.

15. Backup Power (UPS): Uninterruptible Power Supplies (UPS) can provide temporary power in case of a
sudden power outage, allowing servers to shut down gracefully to prevent data loss or corruption.

2. Explain how server hardware differs from typical personal computer hardware.
Server hardware is different from the typical personal computer hardware in several ways. Firstly, servers are
designed to handle heavy workloads and run continuously without interruption, unlike personal computers that
are used for individual tasks and may be turned off when not in use. This means that server hardware
components such as processors, memory, storage devices, and power supplies must be more robust and durable
than those found in regular PCs.

Additionally, servers often have multiple processors or CPUs (Central Processing Units) which allow them to
perform complex calculations simultaneously. They also have larger amounts of RAM (Random Access
Memory) to support running multiple applications at once.

Another key difference between server hardware and typical PC hardware is their storage capacity. Servers
require large amounts of storage space due to the vast amount of data they need to store compared to a standard
PC user's needs. Therefore, they typically have multiple hard drives or solid-state drives configured in RAID
arrays for redundancy purposes.

Finally, server hardware usually has better cooling systems than regular desktop computers because it generates
more heat during operation due to its high-performance capabilities.

3. Discuss the factors to consider when selecting server hardware for a specific
business or organization.
When choosing server hardware for a business or organization, there are several important factors to consider.
These include:

 The size and complexity of the organization

 The amount of data that needs to be stored and processed

 As well as any specific requirements or regulations that need to be met.


For example, a small business with only a few employees may not require a high-end server with advanced
features. Instead, they may opt for a more affordable option that can still meet their basic needs.

On the other hand, larger organizations with multiple departments and complex operations will likely require
more powerful servers with greater processing capacity and storage capabilities. They may also need additional
features such as redundancy or failover options to ensure maximum uptime in case of hardware failure.

In addition to these technical considerations, businesses should also take into account their budget constraints
and long-term goals when selecting server hardware. Investing in high-quality servers upfront can pay off in
terms of improved performance and reliability over time.

Overall, selecting the right server hardware is an important decision that requires careful consideration of
various factors relating to both technical specs and organizational needs.

Question 4: Server Security


1. Outline the common security threats to computer servers.
Computer servers are powerful computers that store and manage data, applications, and services for multiple
users or devices. These servers can be vulnerable to various security threats such as:

Malware:
This refers to any malicious software designed to harm a computer system or steal sensitive information.
Malware can infect a server through email attachments, downloads from untrusted websites, or even by
plugging in infected external storage devices.

Hacking:
Hackers use various techniques to gain unauthorized access to a server's network and steal confidential
information, install malware or cause damage.

Phishing attacks:
In this type of attack, hackers trick users into revealing their login credentials by posing as legitimate sources
like banks or social media sites.

Denial-of-service (DoS) attacks:


These attacks aim at overwhelming the server with traffic so that it becomes unavailable for legitimate requests.

Insider threats:
Employees with authorized access to the server may intentionally or unintentionally cause security breaches by
stealing sensitive data, misusing privileges or introducing malware.
To protect against these threats, businesses must implement strong security measures such as firewalls, antivirus
software and regular updates/patches on all systems connected to the server network; conduct regular employee
training on cybersecurity awareness; limit user permissions based on job roles; perform regular backups of
important data; and monitor network activity closely for unusual behavior.

2. Describe the best practices for securing a server, including user authentication,
access control, and data encryption.
When it comes to securing a server, there are several best practices that you should follow. These include user:

Authentication
Authentication is the process of verifying the identity of someone who wants to access your server. This can be
done through various methods such as passwords or biometric identification like fingerprints. By requiring
users to authenticate themselves before accessing your server, you can prevent unauthorized individuals from
gaining entry.

Access control
Access control refers to limiting who has access to what on your server. You can do this by creating different
levels of permissions for different users or groups of users. For example, you might give certain employees full
administrative privileges while others only have read-only access.

Data encryption
Data encryption involves scrambling sensitive information so that it cannot be easily read by unauthorized
parties. There are many ways to encrypt data including using secure protocols like HTTPS or SSL/TLS
certificates. Encrypting your data helps ensure its confidentiality and integrity in case someone tries to intercept
it during transmission.

3. Explain the importance of applying security patches and updates to server


operating systems and software.
Keeping your computer systems up to date is crucial for maintaining their security. Security patches and
updates are essential for server operating systems and software because they fix vulnerabilities that could be
exploited by hackers or malware.

Think of it like this: when you buy a house, you install locks on the doors and windows to keep burglars out.
But just like how new lock-picking techniques are developed over time, cybercriminals also find new ways to
break into computer systems. This is why software companies release security patches and updates - it's like
installing stronger locks on your digital "house" to keep intruders out.

If you don't apply these updates regularly, your system becomes more vulnerable as time goes on. Hackers can
exploit known weaknesses in outdated software to gain access to sensitive data or even take control of your
entire system.
By applying security patches and updates promptly, you can protect yourself from these threats and ensure that
your servers remain secure against potential attacks. It's important not only for individuals but also for
businesses since a single breach could have devastating consequences such as loss of data or financial damages.

Question 5: Server Backup and Disaster Recovery

1. Define server backup and disaster recovery.


Server backup
Server backup refers to the process of creating a copy or duplicate of important data and files stored on a server.
This is done in case the original files are lost, damaged, or corrupted due to various reasons such as hardware
failure, cyber-attacks, human error, or natural disasters.

Disaster recovery
Disaster recovery is a plan that outlines how an organization will respond to unforeseen events that may cause
interruptions in their operations. It involves restoring IT infrastructure and critical systems after an event has
occurred, with the goal of minimizing downtime and ensuring business continuity.

2. Explain the importance of regular data backup for server systems.


Regular data backup for server systems is crucial to ensure the safety and security of important information.
Essentially, a backup is an extra copy of all your files that can be used to restore lost or damaged data in case
something goes wrong with your primary system.

Without regular backups, if there is a hardware failure, cyber attack, natural disaster or any other catastrophic
event that results in loss of data on the server system, it could result in irreparable damage to your business
operations. This can lead to significant financial losses and may even put you out of business.

By regularly backing up your data, you are protecting yourself against these types of risks by creating multiple
copies that allow you to recover from any type of disaster scenario quickly and efficiently. You will have access
to all necessary files so that you can continue working as usual without experiencing major disruptions.

In addition, having regular backups also provides peace-of-mind knowing that critical information such as
customer records or financial transactions are safe and secure no matter what happens. It's important not only
for businesses but also for individuals who store valuable personal content like photos or documents on their
servers.

Overall, regular data backup should be considered an essential part of any server system maintenance plan
because it ensures continuity in case anything unexpected occurs while providing peace-of-mind knowing
everything is backed up safely and securely.

3.Describe a server disaster recovery plan and the steps involved in recovering from
a server failure or data loss.
A server disaster recovery plan is a set of procedures that an organization follows to recover from a server
failure or data loss. When something goes wrong with the server, it can lead to significant damage and
disruption for the business. That's why having a disaster recovery plan in place is essential.

The steps involved in recovering from a server failure or data loss include:

1. Identifying the cause of the problem: The first step involves identifying what caused the issue so that you
can take appropriate action.

2. Assessing the damage: Next, you need to assess how much damage has been done and determine what data
has been lost.

3. Restoring backups: If you have backups of your data, then restoring them is often the best course of action.
This will help get your systems back up and running quickly.

4. Rebuilding servers: In some cases, it may be necessary to rebuild servers completely if they are damaged
beyond repair.

5. Testing systems: Once everything has been restored or rebuilt, it's important to test all systems thoroughly
before bringing them back online for normal use.
Overall, having a solid disaster recovery plan in place can help minimize downtime and protect against potential
losses due to server failures or data loss incidents.

Question 6: Server Virtualization

1. What is server virtualization, and how does it work?


Server virtualization is a technology that allows multiple servers to function on one physical server. It works by
dividing the resources of a single server into smaller, independent virtual machines (VMs) that can run different
operating systems and applications. Each VM operates as if it were a separate physical machine with its own
CPU, memory, storage, and network interface.

The main advantage of server virtualization is that it maximizes resource utilization while reducing hardware
costs and energy consumption. By consolidating multiple servers onto one physical machine, organizations can
save space in their data centers and reduce the amount of power needed to cool them.

In addition to cost savings, server virtualization also provides greater flexibility and scalability for IT
environments. Administrators can easily create new VMs or allocate more resources to existing ones without
having to purchase additional hardware.

Overall, server virtualization is an important technology for modern businesses looking to optimize their IT
infrastructure and improve efficiency.

2. Discuss the benefits and use cases of server virtualization.


Server virtualization offers several benefits in the realm of IT infrastructure and management, including:

1. Resource Optimization: Virtualization allows you to run multiple virtual machines (VMs) on a single
physical server, effectively utilizing the available resources to their fullest extent. This leads to better
CPU, memory, and storage utilization, reducing the need for additional hardware.
1. Cost Savings: By consolidating multiple servers onto a single physical machine, organizations can save
on hardware costs, power consumption, and data center space. This results in lower capital and
operational expenses.

2. Improved Hardware Utilization: Virtualization enables the efficient use of server hardware, extending
the lifespan of existing equipment and postponing the need for frequent hardware upgrades.

3. Enhanced Scalability: Scaling virtualized servers is more flexible and cost-effective. Adding or
removing VMs as needed is easier and faster compared to traditional physical servers.

4. Server Isolation: VMs are isolated from each other, which means that issues on one VM (e.g.,
application crashes or security breaches) are less likely to impact other VMs running on the same host.

5. Disaster Recovery: Virtualization makes it easier to create and manage backups and snapshots of VMs.
This facilitates faster disaster recovery and minimizes downtime in case of hardware failures or data
corruption.

6. Resource Allocation and Management: Virtualization platforms provide tools to allocate resources to
VMs dynamically. This allows for resource prioritization, load balancing, and better management of
CPU, memory, and storage resources.

7. Testing and Development: VMs can be used for creating isolated environments for software testing and
development, reducing the need for physical test beds and speeding up development cycles.

8. Improved Security: Virtualization can enhance security by isolating workloads and applications from
each other. Security features like network segmentation and isolation are easier to implement in a
virtualized environment.

9. Green IT: Reducing the number of physical servers through virtualization leads to lower power
consumption and a smaller carbon footprint, contributing to environmental sustainability.

10. High Availability: Virtualization platforms often offer features like live migration, which enables VMs
to be moved between physical servers with minimal downtime, ensuring high availability and
minimizing service interruptions.

Use cases for server virtualization include hosting websites and web-based services such as email or e-
commerce platforms; creating development environments for software developers; running test environments
for quality assurance teams; and supporting disaster recovery efforts by replicating data across multiple
locations.
Overall, server virtualization provides numerous benefits including cost savings through consolidation of
hardware resources, improved management capabilities with better resource allocation and provisioning options
available at any given moment while improving overall business continuity with high-availability features built-
in should something go wrong within an environment being used extensively today!

3. Explain how virtualization can enhance server resource management and


scalability.
Virtualization is a technology that allows one physical server to host multiple virtual servers, also known as
virtual machines. This means that instead of having one server for each application or task, you can have several
virtual servers running on the same physical machine.

One of the main advantages of virtualization is enhanced server resource management. By consolidating
multiple applications onto fewer physical servers, you can reduce hardware costs and make more efficient use
of your existing resources.

Another benefit is increased scalability. With traditional physical servers, adding new applications or increasing
capacity often requires purchasing and installing additional hardware. But with virtualization, you can quickly
create new virtual machines and allocate resources as needed without having to purchase new equipment.

For example, imagine a company has three separate applications running on three different physical servers:
email, accounting software, and customer relationship management (CRM) software. Each application may be
using only a fraction of its respective server's processing power at any given time.

By implementing virtualization technology on these three servers instead, the company could run all three
applications on a single powerful server while still providing sufficient resources for each application to operate
smoothly. And if they need to add more capacity later on – say because their business grows – they can simply
create additional virtual machines within that same server rather than buying entirely new hardware.

THANK YOU SO MUCH

You might also like