3. SERVER
It is a physical computer that provide
services to all client computers
connected to it, allowing them(client
computer ) to access available
information or resources. In short, server
is a software or hardware that gives
services to other hardware and software
entity.
4. Web Servers
The internet is based on web servers
that respond to request from client
such as web browser.
TYPICAL TYPES OF SERVERS
5. Application Server
A server that provides services to
applications such as a mobile app.
TYPICAL TYPES OF SERVERS
6. Real-time Communication Servers
Formerly known as chat servers or IRC
Servers, and still sometimes reffered to as
instant messanging (IM) servers, enable
large numbers users to exchange
information near instantaneously.
TYPICAL TYPES OF SERVERS
7. FTP Server
One of the oldest of the internet services,
File Transfer Protocol makes it possible to
move one or more files while providing
file security and organization as well as
transfer control.
TYPICAL TYPES OF SERVERS
8. Name Server
Servers that look up addresses such as
mapping a domain name to an IP. This is
basic infrastructure for networks such as
the internet.
TYPICAL TYPES OF SERVERS
9. Application Programming Interface
A server that implements functionality
for other software by offering a API. APIs
just allow applications to communicate
with ome another.
TYPICAL TYPES OF SERVERS
10. Database Server
Provides access to a database. It is a
server which uses a database application
that provides database services to other
computer programs or ro computers.
TYPICAL TYPES OF SERVERS
11. Game Server
A server which is the authoritative source
of events in a multiplayer video game.
The server transmits enough data about
its internal state to allow its connected
clients to maintain their own accurate
version of the game world for display to
players.
TYPICAL TYPES OF SERVERS
14. Basic Introduction
• USER: In computer language user is one
who uses a computer.
• ACCOUNT: Collection of information
related to an individual is termed as account.
15. Definition of User Account
•A User account is an object that consists of
all the information that defines individual
user, which includes username, password,
and groups in which the user account has
membership.
16. User Account Types
• Administrator User (Provide the most control over a
computer).
•Standard Account (Used for everyday computing).
• Guest User (Intended primarily for people who need
temporary use of a computer).
17. • The Administrator account is the account you use when you use first set up file
computer. You use this account before you create an account for yourself.
• The Administrator account has full control of the server and can assign user rights
and access control permissions to users as necessary.
• This is a member of the Administrators group on the computer.
• This account can never be deleted or removed from the Administrators group, but
it can be renamed or disabled.
• Renaming or disabling this account will make it more difficukt for malicious users
to try and gain access to it.
ADMINISTRATOR ACCOUNT
18. • Standard account holders can access most of the computer, but they can’t mae any
big changes to it.
• They can’t run or install new programs, but they can run existing programs.
STANDARD ACCOUNT
19. • The Guest account is used by people who do not have an actual account on the
computer.
• The Guest account does not require a password.
• The Guest account is disabled by default, but you can enable it.
• You can set rights and permissions for the Guest account just like any user account.
• Additional rights, as well as any permissions, must be granted to the Guests group
by a member of the Administrators group.
GUEST ACCOUNT
21. Configuring network services on a server involves
setting up various components to ensure connectivity,
security, and efficient data transfer within the network.
Assigning IP Address: Start by assigning a static IP
address to your server. This can be done either through
the server's operating system or via your network's
DHCP server. Ensure the IP address is within the same
subnet as other devices in your network.
22. Configuring DNS: Set up DNS (Domain Name System) on
your server to translate domain names into IP addresses
and vice versa. You can install and configure a DNS server
software such as BIND (Berkeley Internet Name Domain) or
use a third-party DNS service.
Setting up DHCP: If your server will act as a DHCP (Dynamic
Host Configuration Protocol) server, configure DHCP
settings to assign IP addresses, subnet masks, default
gateways, and DNS server addresses to client devices
automatically.
23. Firewall Configuration: Configure a firewall on your server
to control incoming and outgoing traffic. Define firewall
rules to allow or deny traffic based on source and
destination IP addresses, ports, and protocols. Use tools
like iptables (Linux) or Windows Firewall (Windows Server)
for this purpose.
SSH (Secure Shell): If the server will be accessed remotely,
configure SSH for secure remote access. Disable password-
based authentication and use SSH keys for authentication
instead. This enhances security by preventing brute-force
24. Web Server Configuration: If your server will host websites
or web applications, install and configure a web server
software such as Apache HTTP Server or Nginx. Configure
virtual hosts to host multiple websites on the same server if
necessary.
Email Server Configuration: If your server will handle
email services, install and configure an email server
software such as Postfix (SMTP server) and Dovecot
(IMAP/POP3 server) on Linux or Microsoft Exchange Server
on Windows. Configure email accounts, domains, and mail
25. FTP (File Transfer Protocol) Server Configuration: If your
server will provide FTP services for file transfer, install and
configure an FTP server software such as vsftpd (Linux) or
FileZilla Server (Windows). Set up user accounts and
directory permissions for FTP access.
Monitoring and Management: Install and configure
monitoring tools to track the performance and health of
your server and network. Use tools like Nagios, Zabbix, or
Prometheus for monitoring, and configure SNMP for
network device monitoring.
26. Backup and Redundancy: Implement backup strategies to protect data
stored on the server. Set up regular backups to an external storage device
or cloud service. Implement RAID (Redundant Array of Independent Disks)
for disk redundancy if necessary.
Security Measures: Harden the server's security by applying security
updates regularly, configuring access controls, and implementing
intrusion detection/prevention systems (IDS/IPS) if needed. Regularly
review and update security policies to mitigate emerging threats.
Documentation: Document the server's network configuration, including
IP addresses, DNS settings, firewall rules, installed services, and their
configurations. This documentation will be helpful for troubleshooting and
future reference.