SlideShare a Scribd company logo
1 of 16
IT INFRASTRUCTURE
BY AAKASH PANCHAL
TOPICS WE COVER
• SERVERS
• COMPONENTS OF SERVERS
• SERVER STORAGE
• SERVER SECURITY
SERVERS
• a server is a computer program or a device that
provides functionality for other programs or
devices, called "clients".
• Type of servers:-
• database servers,
• file servers,
• mail servers,
• print servers,
• web servers,
• game servers,
• and application servers.
COMPONENTS OF A SERVER
• MOTHERBOARD
The motherboard is the computer’s main electronic circuit board to which all the other components of your
computer are connected.
The major components on the motherboard include the processor (or CPU), supporting circuitry called
the chipset, memory, expansion slots, a standard IDE hard drive controller, and input/output (I/O) ports for
devices such as keyboards, mice, and printers.
• PROCESSOR
The processor, or CPU, is the brain of the computer.
Each motherboard is designed to support a particular type of processor. CPUs come in two basic mounting styles:
slot or socket.
Example :-
• Itanium 2
• Xeon
• Pentium D
• Pentium 4
ROCK SOLID (COMPONENENTS………..)
Rock Solid's web/email servers are not only dependable, they're fast and secure.
RAID
RAID stands for Redundant Array of Inexpensive (Independent) Disks.
RAID is a way of grouping individual physical drives together to form one bigger drive called a RAID set.
Types:-
• RAID 0
• RAID 1
• RAID 5
• RAID 10 (also known as RAID 1+0)
REDUNDANT POWER SUPPLY
The redundant power supply is important for servers and other highly important
computers, to minimize the chance of a complete computer shutdown or
failure.
ECC RAM
ECC is a method of detecting and then correcting single-bit memory errors. A single-bit memory error is a
data error in server output or production, and the presence of errors can have a big impact on server
performance.
Type:-
Hard errors are caused by physical factors, such as excessive temperature variation, voltage stress, or
physical stress brought upon the memory bits.
Soft errors occur when data is written or read differently than originally intended, such as variations in
voltage on the motherboard, to cosmic rays or radioactive decay that can cause bits in the memory to flip.
SERVER STORAGE
• DAS (Direct Attached Storage ) is a block device from a disk which is physically [directly] attached to the
host machine. You must place a filesystem upon it before it can be used.
Advantages of DAS: Direct Attached Storage.
• Simpler to setup and configure over NAS / SAN
• Cheaper than NAS / SAN in terms of raw storage
• Networks not necessary, doesn’t use IP addresses
• Faster, more performant and better latency over SAN / NAS
• Easier to deal with overall considering all things
Disadvantages of DAS: Direct Attached Storage
• Dedicated resource to a single computer
• No economies of scale in sharing the storage
• Can’t manage DAS via a network
• Requires a special hardware connection
• NAS ( Network Attached Storage) is a filesystem delivered over the network.
• It is ready to mount and use.
• Technologies to do this include NFS, CIFS, AFS, etc.
Advantages of NAS: Network Attached Storage.
• Economical way to provide large storage to many persons or computers
• Several times easier to setup and configure versus SAN
• Easy way to provide RAID redundancy to mass amount of users
• Allows users permissions, folder privileges, restricted access to documents, etc
• Higher utilization of storage resources
Disadvantages of NAS: Network Attached Storage
• Requires IP Address(es) and takes up network space
• Slower latency and potentially maximum data-transfer issues
• Performance can be affected by network status
• SAN ( Storage Attached Network) is a block device which is delivered over the network.
• Like DAS you must still place a filesystem upon it before it can used.
• Technologies to do this include FibreChannel, iSCSI, FoE, etc.
Combining the best of DAS and NAS.
Remember what DAS is good at? Speed. Speed. SPEED.
Remember what NAS is good at? Sharing. High Utilization. Flexibility.
Advantages of SAN: Storage Area Network
• Higher hardware utilization, similar to that of NAS
• Speed similar or comparable to DAS
• Allows virtual environments, cloud computing, etc.
Disadvantages of SAN: Storage Area Network
• Performance limited by network if configured incorrectly
• Requires multiple static IP Addresses
• Generally consumes more IP addresses than NAS devices
• Complex networking planning is necessary
• May want to implement virtual networks / different subnets
• Physical network wiring may affect performance
• Generally more expensive than NAS or DAS
SERVER SECURITY
Firewalls
A firewall is a piece of software (or hardware) that controls what services are exposed to the network. This
means blocking or restricting access to every port except for those that should be publicly available.
BENEFITS OF FIREWALL SECURITY?
• Monitors Traffic
• Blocks Trojans
• Stops Hackers
• Stops Keyloggers
• Prevent fromDDoS Attack (Distributed Denial of Service.)
VPNS AND PRIVATE NETWORKING
Private networks are networks that are only available to certain servers or users. For instance, in
DigitalOcean, private networking is available in some regions as a data-center wide network.
VPN BENEFITS
• Security
• Privacy protection
• Access to restricted resources
DATA LOSS PREVENTION (DLP)
• Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive
or critical information outside the corporate network. The term is also used to describe
software products that help a network administrator control what data end users can
transfer.
• DLP tools can also be used to filter data streams on the corporate network and protect data
in motion.
REFERENCES
• https://www.computerhope.com/jargon/r/redunpow.htm
• http://www.thegeekstuff.com/2010/08/raid-levels-tutorial
• https://serverfault.com/questions/81723/what-is-the-difference-between-
san-nas-and-das
THANK YOU

More Related Content

What's hot

05. performance-concepts
05. performance-concepts05. performance-concepts
05. performance-conceptsMuhammad Ahad
 
01. 02. introduction (13 slides)
01.   02. introduction (13 slides)01.   02. introduction (13 slides)
01. 02. introduction (13 slides)Muhammad Ahad
 
04. availability-concepts
04. availability-concepts04. availability-concepts
04. availability-conceptsMuhammad Ahad
 
11. operating-systems-part-2
11. operating-systems-part-211. operating-systems-part-2
11. operating-systems-part-2Muhammad Ahad
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMvwchu
 
Backup and recovery
Backup and recoveryBackup and recovery
Backup and recoverydhawal mehta
 
Understanding das-nas-san
Understanding das-nas-sanUnderstanding das-nas-san
Understanding das-nas-sanAshwin Pawar
 
Introduction to Storage technologies
Introduction to Storage technologiesIntroduction to Storage technologies
Introduction to Storage technologiesKaivalya Shah
 
Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)Ravindra Dastikop
 
Troubleshooting complex layer 2 issues ppt 16 bsit098
Troubleshooting complex  layer 2 issues ppt 16 bsit098Troubleshooting complex  layer 2 issues ppt 16 bsit098
Troubleshooting complex layer 2 issues ppt 16 bsit098Quratulain baloch
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring toolsQaswarBosan
 
Importance of data centers
Importance of data centersImportance of data centers
Importance of data centersTyrone Systems
 

What's hot (20)

05. performance-concepts
05. performance-concepts05. performance-concepts
05. performance-concepts
 
01. 02. introduction (13 slides)
01.   02. introduction (13 slides)01.   02. introduction (13 slides)
01. 02. introduction (13 slides)
 
04. availability-concepts
04. availability-concepts04. availability-concepts
04. availability-concepts
 
11. operating-systems-part-2
11. operating-systems-part-211. operating-systems-part-2
11. operating-systems-part-2
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
 
Backup and recovery
Backup and recoveryBackup and recovery
Backup and recovery
 
08. networking
08. networking08. networking
08. networking
 
Understanding das-nas-san
Understanding das-nas-sanUnderstanding das-nas-san
Understanding das-nas-san
 
Nfs
NfsNfs
Nfs
 
Introduction to Storage technologies
Introduction to Storage technologiesIntroduction to Storage technologies
Introduction to Storage technologies
 
Windows server
Windows serverWindows server
Windows server
 
Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)
 
Storage Basics
Storage BasicsStorage Basics
Storage Basics
 
Virtualization
Virtualization Virtualization
Virtualization
 
Troubleshooting complex layer 2 issues ppt 16 bsit098
Troubleshooting complex  layer 2 issues ppt 16 bsit098Troubleshooting complex  layer 2 issues ppt 16 bsit098
Troubleshooting complex layer 2 issues ppt 16 bsit098
 
Data center
Data centerData center
Data center
 
DATA CENTER
DATA CENTER DATA CENTER
DATA CENTER
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
Importance of data centers
Importance of data centersImportance of data centers
Importance of data centers
 
Data center
Data centerData center
Data center
 

Similar to Fundamentals of Servers, server storage and server security.

Network Attached Storage (NAS)
Network Attached Storage (NAS) Network Attached Storage (NAS)
Network Attached Storage (NAS) Kshitij Shete
 
Care for Network and Computer Hardware L-2 (3).pptx
Care for Network and Computer Hardware     L-2 (3).pptxCare for Network and Computer Hardware     L-2 (3).pptx
Care for Network and Computer Hardware L-2 (3).pptxaytenewbelay1
 
SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?Saroj Sahu
 
construct a network
construct a networkconstruct a network
construct a networkAbeera Naeem
 
Cisco --introduction-to-storage-area-networking-technologies
Cisco --introduction-to-storage-area-networking-technologiesCisco --introduction-to-storage-area-networking-technologies
Cisco --introduction-to-storage-area-networking-technologiesssuser79fc19
 
windows server installation procedure or
windows server installation procedure orwindows server installation procedure or
windows server installation procedure orYogeshKumar187055
 
Direct Attached Storage - Information Storage and Management.pptx
Direct Attached Storage - Information Storage and Management.pptxDirect Attached Storage - Information Storage and Management.pptx
Direct Attached Storage - Information Storage and Management.pptxMithun B N
 
04 connector and components
04 connector and components04 connector and components
04 connector and componentsAshik Iqbal
 
The Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged EnvironmentsThe Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged EnvironmentsTony Pearson
 
Dc lec- (network models)
Dc lec- (network models)Dc lec- (network models)
Dc lec- (network models)diaryinc
 
Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2Nuno Alves
 
Developing a Ceph Appliance for Secure Environments
Developing a Ceph Appliance for Secure EnvironmentsDeveloping a Ceph Appliance for Secure Environments
Developing a Ceph Appliance for Secure EnvironmentsCeph Community
 
Lecture 3 more on servers and services
Lecture 3   more on servers and servicesLecture 3   more on servers and services
Lecture 3 more on servers and servicesWiliam Ferraciolli
 
Parts of computer (Hardware)
Parts of computer (Hardware)Parts of computer (Hardware)
Parts of computer (Hardware)Mac Mac
 
BITM3730 11-22.pptx
BITM3730 11-22.pptxBITM3730 11-22.pptx
BITM3730 11-22.pptxMattMarino13
 

Similar to Fundamentals of Servers, server storage and server security. (20)

Network Attached Storage (NAS)
Network Attached Storage (NAS) Network Attached Storage (NAS)
Network Attached Storage (NAS)
 
Cloud storage infrastructures
Cloud storage infrastructuresCloud storage infrastructures
Cloud storage infrastructures
 
Challenges in Managing IT Infrastructure
Challenges in Managing IT InfrastructureChallenges in Managing IT Infrastructure
Challenges in Managing IT Infrastructure
 
Care for Network and Computer Hardware L-2 (3).pptx
Care for Network and Computer Hardware     L-2 (3).pptxCare for Network and Computer Hardware     L-2 (3).pptx
Care for Network and Computer Hardware L-2 (3).pptx
 
Server training
Server trainingServer training
Server training
 
SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?SAN BASICS..Why we will go for SAN?
SAN BASICS..Why we will go for SAN?
 
construct a network
construct a networkconstruct a network
construct a network
 
Cisco --introduction-to-storage-area-networking-technologies
Cisco --introduction-to-storage-area-networking-technologiesCisco --introduction-to-storage-area-networking-technologies
Cisco --introduction-to-storage-area-networking-technologies
 
windows server installation procedure or
windows server installation procedure orwindows server installation procedure or
windows server installation procedure or
 
Direct Attached Storage - Information Storage and Management.pptx
Direct Attached Storage - Information Storage and Management.pptxDirect Attached Storage - Information Storage and Management.pptx
Direct Attached Storage - Information Storage and Management.pptx
 
04 connector and components
04 connector and components04 connector and components
04 connector and components
 
The Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged EnvironmentsThe Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged Environments
 
Dc lec- (network models)
Dc lec- (network models)Dc lec- (network models)
Dc lec- (network models)
 
Nas Ashok1
Nas Ashok1Nas Ashok1
Nas Ashok1
 
Storage area network
Storage area networkStorage area network
Storage area network
 
Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2Provisioning server high_availability_considerations2
Provisioning server high_availability_considerations2
 
Developing a Ceph Appliance for Secure Environments
Developing a Ceph Appliance for Secure EnvironmentsDeveloping a Ceph Appliance for Secure Environments
Developing a Ceph Appliance for Secure Environments
 
Lecture 3 more on servers and services
Lecture 3   more on servers and servicesLecture 3   more on servers and services
Lecture 3 more on servers and services
 
Parts of computer (Hardware)
Parts of computer (Hardware)Parts of computer (Hardware)
Parts of computer (Hardware)
 
BITM3730 11-22.pptx
BITM3730 11-22.pptxBITM3730 11-22.pptx
BITM3730 11-22.pptx
 

Recently uploaded

Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 

Recently uploaded (20)

Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Fundamentals of Servers, server storage and server security.

  • 2. TOPICS WE COVER • SERVERS • COMPONENTS OF SERVERS • SERVER STORAGE • SERVER SECURITY
  • 3. SERVERS • a server is a computer program or a device that provides functionality for other programs or devices, called "clients". • Type of servers:- • database servers, • file servers, • mail servers, • print servers, • web servers, • game servers, • and application servers.
  • 4. COMPONENTS OF A SERVER • MOTHERBOARD The motherboard is the computer’s main electronic circuit board to which all the other components of your computer are connected. The major components on the motherboard include the processor (or CPU), supporting circuitry called the chipset, memory, expansion slots, a standard IDE hard drive controller, and input/output (I/O) ports for devices such as keyboards, mice, and printers. • PROCESSOR The processor, or CPU, is the brain of the computer. Each motherboard is designed to support a particular type of processor. CPUs come in two basic mounting styles: slot or socket. Example :- • Itanium 2 • Xeon • Pentium D • Pentium 4
  • 5. ROCK SOLID (COMPONENENTS………..) Rock Solid's web/email servers are not only dependable, they're fast and secure. RAID RAID stands for Redundant Array of Inexpensive (Independent) Disks. RAID is a way of grouping individual physical drives together to form one bigger drive called a RAID set. Types:- • RAID 0 • RAID 1 • RAID 5 • RAID 10 (also known as RAID 1+0)
  • 6. REDUNDANT POWER SUPPLY The redundant power supply is important for servers and other highly important computers, to minimize the chance of a complete computer shutdown or failure. ECC RAM ECC is a method of detecting and then correcting single-bit memory errors. A single-bit memory error is a data error in server output or production, and the presence of errors can have a big impact on server performance. Type:- Hard errors are caused by physical factors, such as excessive temperature variation, voltage stress, or physical stress brought upon the memory bits. Soft errors occur when data is written or read differently than originally intended, such as variations in voltage on the motherboard, to cosmic rays or radioactive decay that can cause bits in the memory to flip.
  • 7. SERVER STORAGE • DAS (Direct Attached Storage ) is a block device from a disk which is physically [directly] attached to the host machine. You must place a filesystem upon it before it can be used. Advantages of DAS: Direct Attached Storage. • Simpler to setup and configure over NAS / SAN • Cheaper than NAS / SAN in terms of raw storage • Networks not necessary, doesn’t use IP addresses • Faster, more performant and better latency over SAN / NAS • Easier to deal with overall considering all things Disadvantages of DAS: Direct Attached Storage • Dedicated resource to a single computer • No economies of scale in sharing the storage • Can’t manage DAS via a network • Requires a special hardware connection
  • 8. • NAS ( Network Attached Storage) is a filesystem delivered over the network. • It is ready to mount and use. • Technologies to do this include NFS, CIFS, AFS, etc. Advantages of NAS: Network Attached Storage. • Economical way to provide large storage to many persons or computers • Several times easier to setup and configure versus SAN • Easy way to provide RAID redundancy to mass amount of users • Allows users permissions, folder privileges, restricted access to documents, etc • Higher utilization of storage resources Disadvantages of NAS: Network Attached Storage • Requires IP Address(es) and takes up network space • Slower latency and potentially maximum data-transfer issues • Performance can be affected by network status
  • 9. • SAN ( Storage Attached Network) is a block device which is delivered over the network. • Like DAS you must still place a filesystem upon it before it can used. • Technologies to do this include FibreChannel, iSCSI, FoE, etc. Combining the best of DAS and NAS. Remember what DAS is good at? Speed. Speed. SPEED. Remember what NAS is good at? Sharing. High Utilization. Flexibility. Advantages of SAN: Storage Area Network • Higher hardware utilization, similar to that of NAS • Speed similar or comparable to DAS • Allows virtual environments, cloud computing, etc. Disadvantages of SAN: Storage Area Network • Performance limited by network if configured incorrectly • Requires multiple static IP Addresses • Generally consumes more IP addresses than NAS devices • Complex networking planning is necessary • May want to implement virtual networks / different subnets • Physical network wiring may affect performance • Generally more expensive than NAS or DAS
  • 10. SERVER SECURITY Firewalls A firewall is a piece of software (or hardware) that controls what services are exposed to the network. This means blocking or restricting access to every port except for those that should be publicly available.
  • 11. BENEFITS OF FIREWALL SECURITY? • Monitors Traffic • Blocks Trojans • Stops Hackers • Stops Keyloggers • Prevent fromDDoS Attack (Distributed Denial of Service.)
  • 12. VPNS AND PRIVATE NETWORKING Private networks are networks that are only available to certain servers or users. For instance, in DigitalOcean, private networking is available in some regions as a data-center wide network.
  • 13. VPN BENEFITS • Security • Privacy protection • Access to restricted resources
  • 14. DATA LOSS PREVENTION (DLP) • Data loss prevention (DLP) is a strategy for making sure that end users do not send sensitive or critical information outside the corporate network. The term is also used to describe software products that help a network administrator control what data end users can transfer. • DLP tools can also be used to filter data streams on the corporate network and protect data in motion.
  • 15. REFERENCES • https://www.computerhope.com/jargon/r/redunpow.htm • http://www.thegeekstuff.com/2010/08/raid-levels-tutorial • https://serverfault.com/questions/81723/what-is-the-difference-between- san-nas-and-das