This document discusses different types of computer networks according to security and roles of computers in a network. It describes peer-to-peer networks as having no central server and being less secure, while server-based networks have a central server for administration and are more secure. The document then discusses advantages and disadvantages of peer-to-peer and server-based networks. It also defines different types of servers such as file, print, proxy, web, database, video, storage, time, access, and fax servers. Finally, it discusses network topologies including bus topology and its advantages of requiring less cabling but disadvantages of being difficult to add devices and isolate faults.
it is all about types of server. And in this file defines all the types of servers and detail of all type. And after this you will be able to know about all server types and details of these servers.
Hardware IBM Servers Information in one PPT.
Definition of Server
Different Types of Server their Application and Benefits .
Client – Server Model
Hardware Components of Server
Types of RAID and their Concept
Server Processor Diagnostics
Created By:. Mitesh Vartak mvmiteshvartak133@gmail.com
it is all about types of server. And in this file defines all the types of servers and detail of all type. And after this you will be able to know about all server types and details of these servers.
Hardware IBM Servers Information in one PPT.
Definition of Server
Different Types of Server their Application and Benefits .
Client – Server Model
Hardware Components of Server
Types of RAID and their Concept
Server Processor Diagnostics
Created By:. Mitesh Vartak mvmiteshvartak133@gmail.com
Whatever your development plans are, your server has to meet your requirements. At 1&1, we understand this. Our servers guarantee performance, flexibility and security. We offer a flexible range of servers for every demand, with the latest generation of hardware and unlimited traffic.
This presentation provides an overview of 1&1 Virtual Servers, 1&1 Dynamic Cloud Servers, 1&1 Dedicated Servers, and 1&1 Managed Servers. Each section gives an overview of the product and its features, as well as benefits and possible alternatives.
We also provide a glossary of commonly used technical terms and acronyms. Plus, we explain the difference between Linux, Windows, and Managed operating system.
Hi fellas,
Here is a ppt which helps you to have some basic idea on Web servers, Application servers, Shared and Dedicated Hosting, Back up server and SSL concepts...
Technology pool is amazingly very vast.
This is a drop of it.
This presentation is based on web server. It is just an overview about web server and its types. It gives an idea about need of server management organization.
Safex provides Third-party server hardware support services that are beyond the limits of the OEM maintenance solutions with Post-warranty support, Extended warranty support, End of life support, End of service life support to extend the life of your server equipment with 30-70% of cost-saving. Safex server maintenance service covers onsite and remote monitoring and maintenance for both x86 and UNIX servers from all Industry-leading OEMs. We install, upgrade, troubleshoot, maintain, migrate and monitor your datacentre server with effective server support service contracts. We monitor your server hardware and software 24/7, audit, secure, and provide preventive maintenance for your server to ensure your server run continuously.
Whatever your development plans are, your server has to meet your requirements. At 1&1, we understand this. Our servers guarantee performance, flexibility and security. We offer a flexible range of servers for every demand, with the latest generation of hardware and unlimited traffic.
This presentation provides an overview of 1&1 Virtual Servers, 1&1 Dynamic Cloud Servers, 1&1 Dedicated Servers, and 1&1 Managed Servers. Each section gives an overview of the product and its features, as well as benefits and possible alternatives.
We also provide a glossary of commonly used technical terms and acronyms. Plus, we explain the difference between Linux, Windows, and Managed operating system.
Hi fellas,
Here is a ppt which helps you to have some basic idea on Web servers, Application servers, Shared and Dedicated Hosting, Back up server and SSL concepts...
Technology pool is amazingly very vast.
This is a drop of it.
This presentation is based on web server. It is just an overview about web server and its types. It gives an idea about need of server management organization.
Safex provides Third-party server hardware support services that are beyond the limits of the OEM maintenance solutions with Post-warranty support, Extended warranty support, End of life support, End of service life support to extend the life of your server equipment with 30-70% of cost-saving. Safex server maintenance service covers onsite and remote monitoring and maintenance for both x86 and UNIX servers from all Industry-leading OEMs. We install, upgrade, troubleshoot, maintain, migrate and monitor your datacentre server with effective server support service contracts. We monitor your server hardware and software 24/7, audit, secure, and provide preventive maintenance for your server to ensure your server run continuously.
A Project Report on Linux Server AdministrationAvinash Kumar
This is a Project Report on Linux Server Admin. It contains key network features which are installed on Linux. This project was conducted on RedHat Enterprise Linux 7.2.
All the files reside on the server machine. File Server provides clients access to records within files from the server machine. File Servers are useful for sharing files across a network among the different client
Running head: SERVERS 1
Running head: SERVERS 1
Debbie Utter
Colorado Technical University
Unit 3 IP
Introduction to Operating Systems and Client/Servers Environment
IT140-1503B-01
Dr. Stephan Reynolds
September 11, 2015
Peer-to-peer networks and client-server networks are both distinct networking architectures, each model being suitable for different types of organizations. The main difference between these two architectures is that in Client-server networks, there is a dedicated central computer (known as a server) and the other reliable computers (clients) dependent on the server’s resources. On the other hand, in a peer-to-peer network, each computer can act as the server and client to the others. In simpler terms, if each computer in the network can fully carry out its functions independently, then it is in a peer-to-peer network. If one computer is the go-to computer for services such as file storage or the one given the capability to grant or deny access of services to the other computers, then those computers are in a client-server network.
Peer-to-peer and client-server networks can both be differentiated using the various aspects as follows:
(a) Performance
A peer-to-peer network is only suitable for as much as 10 computers, past which performance problems will arise. An organization with more than 10 computers is best suited for a client-server network. This is because of the presence of a server that does most of the management and control duties. Also, an issue with one computer won’t necessarily interfere with the network since it’s not required to share its computing power.
(b) Cost
Client-server networks are basically more expensive than peer-to-peer networks, both in installation and maintenance. The server in client-server networks needs to have great computing power, and therefore you need have dedicated software to manage the network. An example of this software that does this job excellently is the Windows Server. Such programs are complicated to run, and so more costs may arise due to the need to have experts that fix any arising problems.
(c) Security
Client-server networks are more secure than peer-to-peer networks. The server has a function in it that can grant or reject a user’s access request to the network. This feature is important as it helps keep unwanted users, malware or malicious bots out of the network. However, it is important to note that as the more computers join the client-server network, security management becomes increasingly difficult.
(d)Geographical area
A peer-to-peer network is suitable when it is being set up in homes or small organizations. But for bigger organizations, such as hospitals, a client-server is ideal due to the need for technical functions in the organization.
Depending on the above factors, a client-server network would work best in Health Care HQ.
As earlier mentioned, Windows Server is one of the most efficient operating systems that manages client-server ne.
Food hygiene is more than cleanliness ......
Protecting food from risk of contamination, including harmful bacteria, poison and other foreign bodies.
Preventing any bacteria present multiplying to an extent which would result in the illness of consumers or the early spoilage of the food.
Destroying any harmful bacteria in the food by thorough cooking
or processing.
Discarding unfit or contaminated food.
T-Cell Activation
• Concept of immune response
• T cell-mediated immune response
• B cell-mediated immune response
I. Concept of immune response
• A collective and coordinated response to the introduction of foreign substances in an individual mediated by the cells and molecules in the immune system.
II. T cell-mediated immune response
• Cell-mediated immunity is the arm of the adaptive immune response whose role is to combat infection of intracellular pathogens, such as intracellular bacteria (mycobacteria, listeria monocytogens), viruses, protozoa, etc.
Major Histocompatibility Complex
MHC:
• Major Histocompatibility Complex
– Cluster of genes found in all mammals
– Its products play role in discriminating self/non-self
– Participant in both humoral and cell-mediated immunity
• MHC Act As Antigen Presenting Structures
• In Human MHC Is Found On Chromosome 6
– Referred to as HLA complex
• In Mice MHC Is Found On Chromosome 17
– Referred to as H-2 complex
• Genes Of MHC Organized In 3 Classes
– Class I MHC genes
• Glycoproteins expressed on all nucleated cells
• Major function to present processed Ags to TC
– Class II MHC genes
• Glycoproteins expressed on macrophages, B-cells, DCs
• Major function to present processed Ags to TH
– Class III MHC genes
• Products that include secreted proteins that have immune functions. Ex. Complement system, inflammatory molecules
Antigen Processing and Presentation MID
Antigens and “foreignness”
• Antigens (or, more properly, immunogens) have a series of features which confer immunogenicity.
• One of these features is “foreignness.”
• So, we can infer that – most often – antigens – ultimately – originate externally.
• (There are exceptions, of course. Some cells become transformed by disease [e. g., cancer] or by aging. In such instances, the antigens have an internal origin.)
Extinction of a particular animal or plant species occurs when there are no more individuals of that species alive anywhere in the world - the species has died out. This is a natural part of evolution. But sometimes extinctions happen at a much faster rate than usual. Natural Causes of Extinction.
Difference between In-Situ and Ex-Situ conservation
Conservation of biodiversity and genetic resources helps protect, maintain and recover endangered animal and plant species. There are mainly two strategies for the conservation of wildlife: In-situ conservation and Ex-situ conservation. Although, both the strategies aim to maintain and recover endangered species, they are different from each other. Let us see how they differ from each other!
Evolution Of Bacteria
Bacteria have existed from very early in the history of life on Earth. Bacteria fossils discovered in rocks date from at least the Devonian Period (419.2 million to 358.9 million years ago), and there are convincing arguments that bacteria have been present since early Precambrian time, about 3.5 billion years ago. Bacteria were widespread on Earth at least since the latter part of the Paleoproterozoic, roughly 1.8 billion years ago, when oxygen appeared in the atmosphere as a result of the action of the cyanobacteria. Bacteria have thus had plenty of time to adapt to their environments and to have given rise to numerous descendant forms.
Impact of Environment on Loss of Genetic Diversity and Speciation
Genetic variation describes naturally occurring genetic differences among individuals of the same species. This variation permits flexibility and survival of a population in the face of changing environmental circumstances. Consequently, genetic variation is often considered an advantage, as it is a form of preparation for the unexpected. But how does genetic variation increase or decrease? And what effect do fluctuations in genetic variation have on populations over time?
GENE ENVIRONMENT INTERACTION
Subtle differences in one person’s genes can cause them to respond differently to the same environmental exposure as another person. As a result, some people may develop a disease after being exposed to something in the environment while others may not.
As scientists learn more about the connection between genes and the environment, they pursue new approaches for preventing and treating disease that consider individual genetic codes.
How to store food in hot
The Good News
To maximize benefit of preservation, keep your food as fresh as possible for as long as possible. You can do this, even in the heat, by creating a “cooler” made from two basic terra cotta pots, one larger than the other. Put the smaller pot in the larger one, fill the gap with sand, and saturate the sand with water. Then cover it with a cloth. To add additional insulation from the heat, bury the pot up to its rim. The evaporation of moisture from the wet sand will cool the air around the food and help keep it fresh.
What is IUPAC naming?
In order to give compounds a name, certain rules must be followed. When naming organic compounds, the IUPAC (International Union of Pure and Applied Chemistry) nomenclature (naming scheme) is used. This is to give consistency to the names. It also enables every compound to have a unique name, which is not possible with the common names used (for example in industry). We will first look at some of the steps that need to be followed when naming a compound, and then try to apply these rules to some specific examples.
IUPAC Nomenclature
IUPAC nomenclature uses the longest continuous chain of carbon atoms to determine the basic root name of the compound. The root name is then modified due to the presence of different functional groups which replace hydrogen or carbon atoms in the parent structure.
Hybridization describes the bonding atoms from an atom's point of view. For a tetrahedral coordinated carbon (e.g. methane CH4), the carbon should have 4 orbitals with the correct symmetry to bond to the 4 hydrogen atoms.
INTRODUCTION:
Hybrid Orbitals
Developed by Linus Pauling, the concept of hybrid orbitals was a theory created to explain the structures of molecules in space. The theory consists of combining atomic orbitals (ex: s,p,d,f) into new hybrid orbitals (ex: sp, sp2, sp3).
1. Why Firefly give light during night?
2. Why atomic mass and Atomic numbers are given to elements ?
3. Why elements have been characterized and classified into different groups?
4. What is the transition of elements and what they play their role in elements stability?
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
Types of networks according to security
1. Amjad Khan Afridi 11th
October ,2017
Types of networks according to security
Peer to Peer Network
Is that type of network which doesn’t have central server to control and provide
administration to the client computers? It is simple to make, have no security and used in
less secure and small organizations.
Server based network
Is that type of network which has a central server called domain controller to manage and
provide central administration to the whole network. It is expensive, secure and used in
large organizations.
Role ofcomputer in a network:
Server: It is a computer which provides services and administration to the rest of computers in a
network called clients.
Client: A computer which use services provided by the server
Peer: A computer which is itself a server as well as client.
The advantages and disadvantages ofa peer-to-peer network are as follows:
Advantages:
It is easy to install.
Configuration of computers is easy.
Users can control their shared resources.
The cost and operation of this network is less.
It is ideal for small businesses having ten or fewer computers.
It needs an operating system and a few cables to get connected.
A full time network administrator is not required.
Disadvantages:
A computer can be accessed anytime.
Network security has to be applied to each computer separately.
Backup has to be performed on each computer separately.
No centralized server is available to manage and control the access of data.
Users have to use separate passwords on each computer in the network.
Server Based Network:
Whenever the number of computers in networks becomes more than fifteen you should use a
serverbased environment because it becomes almost impossible for peer-to-peer networks to
handle such computing. In the centralized or server-based system the clients connect to the
central computer for one or more services. Almost all processing is done on the server. This
helps in the synchronizing the data as everyone accesses and manipulates the data that is stored
2. Amjad Khan Afridi 11th
October ,2017
in a centralized location. Maintaining security in a server based networks much easier than that
in a peer-to-peer network as the only system whose security matters is the server. You only need
to maintain the security of the data and other resources of the server. In a server-based
environment accounts for different users are created and maintained on the server and only those
users are granted the access whose details match the details specified in the corresponding
account. Different rights are assigned to different users such as whether this particular user has
the right to print the data, whether some user has the right to open some particular file etc. The
management of such types of rights is easy in centralized networks because the whole
administration revolves around the server. It also reduces the overall cost of the system because
most of the cost as you has to spend on one system that needs more resources and also need
administration and on the other hand the client systems can be dump terminal or they can have
very low processing power. This makes the server based network cost efficient.
Advantages of server based networks.
1. In sever based networks users can share equipment like laser printers.
2. Management of users becomes very easy in server based network because you can manage all
users from a single computer (server).
3. All the data stored on central storage device so it becomes easier to backup data.
4. Security is one of the main issues when we talk about server based networks. In server based
network (environment) security is very easy to manage because one server has to make policies
and it
applies on all the users in network.
5. Backup of all the data is very easy to perform in server based networks as you just have to make
schedule and server automatically makes backup according to the schedule.
6. A server based network has the power of managing thousands of users. You cannot do this thing
in
peer to peer networks. Actually if there are ten computers and some of them are clients and some
are.
7. If you central data storage fails then you can restore by using backup.
Disadvantages ofserver based network:
1. It is expensive .
2. Needs network administrator
3. Whole network goes down if central server is not working
4. Difficult to manage and create
Types of Servers:
What is a server?
1.
A server such as an email server is a computer or device on a network that manages
network.
resources, such as printers, database, files, web site, application, and many other
resources that users need to access in a common way.
3. Amjad Khan Afridi 11th
October ,2017
2. Servers are minicomputers that offer better performance, and larger in size than
workstation. However the cost of a server is more than a workstation. Normally servers
are designed to support multiple users at a time.
3. Servers possess larger storage capacities and have a higher processing power than
workstation. They support faster peripheral devices, such as high speed printers that can
print hundreds of lines per minute.
FILE SERVER:
A file server is a dedicated computer in a network that is used to store the files such as
word processing documents, spreadsheets, financial data and other useful information. Typically
a file server has a large memory and additional hard disks. Server itself and all the client
computers stores data on the file server and access it again when required. Additionally, file
server software such as Windows 2000 Server, Windows 2003 Server also acts as the logon
server and process the logon requests of the client computers.
PRINT SERVER:
A print server is a network computer or a specifically designed device to which print devices or
printers are attached. A network print server is used to serve the client‟s printing requests from
all over the network. A Windows 2000 or Windows 2003 computer can serve as a print server.
The client computers connect with the print server by using Microsoft Network Printing
Protocol.
PROXY SERVER:
A network proxy server is an intermediate computer between the client computers in
a network and the internet. A proxy server forwards the client‟s requests for the specific web
pages to the web server. A proxy server when receive the response from the web server (in the
form of web pages) it stores a copy of every web page in its cache. So that if next time another
client request for the same web page it won‟t go to web server for this page, instead it will return
the web request from its own cache. A proxy server is software program and when installed on a
computer, the computer acts as a proxy server. The most commonly used proxy server programs
are WinGate, Win Proxy, and Microsoft ISA Server etc.
WEB SERVER:
A web server is a computer that is used to respond the client‟s HTTP requests (usually web
browsers) and return the response in the form of the web pages, images, voice files, graphics,
video clips and others. A single web server is capable to host many websites. Web servers also
host shared web based applications and a large number of clients access them simultaneously.
Some applications on the web server require some authentication methods such as login name
and password. Some dynamics content and applications host on the web server used some related
interfaces such as JSP, ASP, PHP, CGI and .NET. HTTPS is used to establish a secure
connection between the client and the web server and it is normally used during the credit cards
4. Amjad Khan Afridi 11th
October ,2017
transactions, online shopping where high security is required. A web server is also known as a
virtual host when it hosts a large number of the websites on the same IP address.
DATABASE SERVER:
There are many database server programs such as Oracle, MySql, and Microsoft Sql 2000. A
database server program is used to process the database services. In a client/server networking
model, the server component of the database servers (Oracle, MYSQL, and SQL2000) is
installed on the server computer and client component of the database program is installed on the
client computers in a network. Network distributed applications use database at the backend,
which is usually installed on the server computer. In network computing, a database computer
should be configured separately and in the enterprise network a large number of the database
computers are used, which synchronized with each other.
VIDEO SERVER:
A Video server is an online storage computer that is used to provide the video and voice access
to the network clients. A video server is used in the broadcast industry, entertainment and
in news. A video server also provides online course and lectures to the registered users from all
over the world.
STORAGE SERVER:
A storage server is high quality and high speed storage device or a computer that
is used to store the data of the network applications that are running on the other computers in a
network.
TIME SERVER:
A time server is a multipurpose, dedicated network computer that is used to compare the time
from the atomic clocks and distribute the time among the other network computers. A file server
can become a time server by using the NTP (Network time protocol). A NTP is used to
synchronizing and distributing the time in a network.
ACCESS SERVER:
Access server or Remote Access server is a network device or a computer that is
used to access the network by a larger number of the network users. ISP mostly has RAS servers
configured and access by a large number of the users.
FAX SERVER:
A fax server is software program and when it is installed on a file server, it acts as a Fax
server. A fax server is usually a dedicated server attached with a dedicated fax device, fax
modem and a telephone line. The fax software receives the fax and converts in the fax form. In
the big networks, a fax server can be used as a dedicated computer. There are many only fax
services providers like efax.com and upon subscribing to them you can send fax all over the
world with a low cost fees
5. Amjad Khan Afridi 11th
October ,2017
What is Network Topology?
What are different network topologies in use? Write their advantages and disadvantages with the
help ofdiagrams.
Network Topology:Topology refers to arrangement of the nodes in the network. Topology is the
geometrical representation of linking devices (usually called nodes) to each other in LAN.
Possible topologies which are being used are mesh, bus, star, tree and ring. It is the physical
layout of computers in a network.
Bus Topology: In such type of topology, long backbone cable is used to link all the devices in
the network. Drop lines and taps are used to connect node to this backbone. A drop line is a
connection between the node and the Backbone. A tap is the connector.
Advantages:
Requires less cabling compared to mesh, star and tree topologies.
Easy to install.
Disadvantages:
It's Difficult to add new devices.
Difficult reconfiguration and fault isolation.
A fault in Backbone stops all transmission, even between devices on the same side of the
problem because of noise
generated by faulty point.