summaryrefslogtreecommitdiffstats
path: root/Bachelor/CCNA4/en_CCNA4_v30/ch6/6_1_8/content.html
blob: 8a5b98a24f1d0204663021f52f55bb92b16764e4 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
<html>



<head>

<meta http-equiv="Content-Language" content="en-us">

<meta http-equiv="Content-Type" content="text/html; charset=windows-1252">

<title>Content</title>

<base target="_self">

</head>



<body background="../../images/bg.gif" topmargin="0" leftmargin="0" marginheight="0" marginwidth="0" onLoad="window.focus();" link="#808080" vlink="#808080" alink="#808080">



<table border="0" cellpadding="0" cellspacing="0" width="100%">

  <tr>

    <td bgcolor="#336666" width="18" valign="top">

    <img border="0" src="../../images/content_lines.gif" width="16" height="25">

    <img border="0" src="../../images/transdot.gif" width="2" height="1"></td>

    <td bgcolor="#336666"><b><font face="Arial" size="2" color="#FFFFFF">6.1</b></font></td>

    <td bgcolor="#336666"><img border="0" src="../../images/transdot.gif" width="10" height="1"></td>

    <td bgcolor="#336666" width="100%"><b><font face="Arial" size="2" color="#FFFFFF">

    Workstations and Servers</font></b></td>

    <td width="9" bgcolor="#336666">&nbsp;</td>

  </tr>

  <tr>

    <td bgcolor="#669999" height="25" width="18">&nbsp;</td>

    <td bgcolor="#669999" height="25"><b>

    <font face="Arial" size="2" color="#FFFFFF">6.1.8</font></b></td> 

    <td bgcolor="#669999"><img border="0" src="../../images/transdot.gif" width="10" height="1"></td>

    <td bgcolor="#669999" height="25" width="100%"><strong>

    <font face="Arial" size="2" color="#FFFFFF">Concept of service on servers</font></strong></td>

    <td bgcolor="#669999" height="25" width="9">&nbsp;	</td>

  </tr></table>



<table border="0" cellpadding="0" cellspacing="0" width="95%" bordercolor="#111111">

      <tr>

        <td width="15"></td>

        <td>



          <font face="Arial" size="2">Networking operating systems (NOSs) are 

          designed to provide network processes to clients. Network 

          services include the World Wide Web (WWW), file sharing, mail 

          exchange, directory services, remote management, and print services. 

          Remote management is a powerful service that allows administrators to 

          configure networked systems that are miles apart. It is important to 

          understand that these network processes are referred to as services in 

          Windows 2000 and daemons in UNIX and Linux. Network 

          processes all provide the same functions, but the way  

          processes are loaded and interact with the NOS are different in each 

          operating system. 

          <img border="0" src="../../images/1.gif" align="absmiddle" width="12" height="12">

          <img border="0" src="../../images/2.gif" align="absmiddle" width="12" height="12">

          <img border="0" src="../../images/3.gif" align="absmiddle" width="12" height="12"></font><p>

          <font face="Arial" size="2">Depending on the NOS, some of these key 

          network processes may be enabled during a default installation. Most 

          popular network processes rely on the TCP/IP suite of protocols. 

          Because TCP/IP is an open, well-known set of protocols, TCP/IP-based 

          services are vulnerable to unauthorized scans and malicious 

          attacks. Denial of service (DoS) attacks, computer viruses, and 

          fast-spreading Internet worms have forced NOS designers to reconsider 

          which network services are started automatically.</font></p>

          <p><font face="Arial" size="2">Recent versions of popular NOSs, such 

          as Windows 2000 and Red Hat Linux 7, restrict the number of network 

          services that are on by default. When deploying a NOS, key network 

          services will need to be enabled manually.</font></p>

          <p><font face="Arial" size="2">When a user decides to print in a 

          networked printing environment, the job is sent to the appropriate 

          queue for the selected printer. Print queues stack the incoming print 

          jobs and services them using a first-in, first-out (FIFO) order. When a job is added to the queue, it is placed at the end of the 

          waiting list and printed last. The printing wait time can sometimes be long, 

          depending on the size of the print jobs at the head of the queue. A network print service will provide system administrators with the 

          necessary tools to manage the large number of print jobs being routed 

          throughout the network. This includes the ability to prioritize, 

          pause, and even delete print jobs that are waiting to be printed.</font></p>

          <p><font face="Arial" size="2"><b>File sharing </b><br>

          The ability to share files over a network is an important network 

          service. There are many file sharing protocols and applications in use 

          today. Within a corporate or home network, files are typically shared 

          using Windows File Sharing or the Network File Sharing (NFS) protocol. 

          In such environments, an end user may not even know if a given file is 

          on a local hard disk or on a remote server. Windows File Sharing and 

          NFS allow users to easily move, create, and delete files in remote 

          directories.</font></p>

          <p><font face="Arial" size="2"><b>File Transfer Protocol (FTP)</b><br>

          Many organizations make files available to remote employees, to 

          customers, and to the general public using FTP. FTP services are 

          made available to the public in conjunction with web services. For 

          example, a user may browse a website, read about a software update on 

          a web page, and then download the update using FTP. Smaller companies 

          may use a single server to provide FTP and HTTP services, while larger 

          companies may choose to use dedicated FTP servers. </font></p>

          <p><font face="Arial" size="2">Although FTP clients must logon, many 

          FTP servers are configured to allow anonymous access. When users 

          access a server anonymously, they do not need to have a user account 

          on the system. The FTP protocol also allows users to upload, rename, 

          and delete files, so administrators must be careful to configure an 

          FTP server to control levels of access.</font></p>

          <p><font face="Arial" size="2">FTP is a session-oriented protocol. 

          Clients must open an application layer session with the server, 

          authenticate, and then perform an action, such as download or upload. 

          If the client session is inactive for a certain length of time, the 

          server disconnects the client. This inactive length of time is called 

          an idle timeout. The length of an FTP idle timeout varies depending on 

          the software.</font></p>

          <p><font face="Arial" size="2"><b>Web services</b><br>

          The World Wide Web is now the most visible network service. In less 

          than a decade, the World Wide Web has become a global network of 

          information, commerce, education, and entertainment. Millions of 

          companies, organizations, and individuals maintain websites on the 

          Internet. Websites are collections of web pages stored on a server or 

          group of servers.</font></p>

          <p><font face="Arial" size="2">The World Wide Web is based on a 

          client/server model. Clients attempt to establish TCP sessions with 

          web servers. Once a session is established, a client can request data 

          from the server. HTTP typically governs client requests and server 

          transfers. Web client software includes GUI web browsers, such as 

          Netscape Navigator and Internet Explorer.</font></p>

          <p><font face="Arial" size="2">Web pages are hosted on computers 

          running web service software. The two most common web server software 

          packages are Microsoft Internet Information Services (IIS) and Apache 

          Web Server. Microsoft IIS runs on a Windows platform and Apache Web 

          Server runs on UNIX and Linux platforms. A Web 

          service software package is available for virtually all operating systems currently in 

          production.</font></p>

          <p><font face="Arial" size="2"><b>Domain Name System (DNS) </b><br>

          The Domain Name System (DNS) protocol translates an Internet name, 

          such as www.cisco.com, into an IP address. Many applications rely on 

          the directory services provided by DNS to do this work. Web browsers, 

          e-mail programs, and file transfer programs all use the names of 

          remote systems. The DNS protocol allows these clients to make requests 

          to DNS servers in the network for the translation of names to IP 

          addresses. Applications can then use the addresses to send their 

          messages. Without this directory lookup service, the Internet would be 

          almost impossible to use.</font></p>

          <p><font face="Arial" size="2"><b>Dynamic Host Configuration Protocol 

          (DHCP)</b><br>

          The purpose of Dynamic Host Configuration Protocol (DHCP) is to enable 

          individual computers on an IP network to learn their TCP/IP 

          configurations from the DHCP server or servers.  DHCP servers 

          have no information about the individual computers until 

          information is requested. The overall purpose of this is to reduce the 

          work necessary to administer a large IP network. The most significant 

          piece of information distributed in this manner is the IP address that 

          identifies the host on the network. DHCP also allows for recovery and 

          the ability to automatically renew network IP addresses through a 

          leasing mechanism. This mechanism allocates an IP address for a 

          specific time period, releases it, and then assigns a new IP address. DHCP allows all this to be done by a DHCP server which saves the 

          system administrator considerable amount of time.</font></p>

          <p><font face="Arial" size="2">&nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp;

          </font>

        </td>

      </tr>

    </table>



</body>



</html>