12 hours 9 minutes
this is less than 13.5. Network service is properties and purposes of network service is.
And this lesson we're gonna talk about roles and network rolls and Service's server, Rose and other service is provided in the network that she should be aware of as a technician, and also that you should be aware for the county A plus. So let's go and get started,
which we have here is the data center, and you've probably seen a lot of data centers around pictures of data centers or even actually visit data centers. Generally, data centers are pretty much laid out the same. There's rows and rows of server racks with different servers. In those racks,
there's different cooling cabling, specialized cabling either under the floor or different
cabling coming from the ceiling
inside of these service Rex, like I mentioned, there are a lot of different servers, and they provide a lot of different functions. We're going to kind of step through some of the functions that thes servers provide
Web Server. You'll find a lot of Web servers in a data center. A Web service responsibility is basically to respond to browser request, whether those those browsers on websites have built out of HTML or HTML five. What pages and sites are stored on and hosted on that Web surfer. So there
they're actually hosted right there in that server.
These pages are either static or dynamic, so as a client or anyone out on the Internet, whether it be from a mobile device or a desktop, their request. A webpage. They're going through the Internet to that data center wherever that website is stored on that Web server within one of those racks.
And requesting service is off of that Web server,
and that Web server is bringing up those pages from its directories. Whatever that Web page they are looking for, it brings it up on presents it to the users.
Ah, file server. This is a general common thing found throughout a lot of networks. Basically a foul service Responsibility is centralized location that stores fouls, documents, directories, videos, pictures and other media and information to network users.
These users could be within the network or remotely outside of the network.
We'll use a standard former foul management, whether that be the Windows SMB or the apple, a f P. Apple fouling protocol Generally there is an authentication and bring permission based access to those those files, or it could be open for the public.
And again, it's main role is to provide files
access to the users, whether those users are on the network or remotely
print server. Ah prints ever connects printers to the network. For users to be able to access that resource, print service could be on the form of a software that's installed on a computer or could be a physical nick car that's in the printer on the network provides. Printing service is for all devices and users on the network.
Like I said, could be software start on the computer. Or it could be built right into like a network interface,
standard prone protocols that you'll see what a print server is. SMB for. Silver Messaging Block
I Pee Pee for Internet Printing Protocol and L. P D. For line printer Damon
D. A. C P. Server. In larger organizations, you'll find a D. A. C P server separated in its own unit on dynamic Host Control Protocol provides automatic I P address configuration to in users on the network. The service's are available
on any router as well. But in the larger networks,
he'll be found on a separate server.
Redundant servers as well they may. You may find multiple DCP servers on a network. And Avery maybe providing different scopes. Meaning one range would be for one server providing ranges from I P address X two. Why
then another D a c p. Server Providing I p ranges on a different scale, scope and scale
A. D. N s server. A domain name system converts names, toe I p addresses and vice versa. These air very critical networks distributing naming system. We load balance across many servers throughout the Internet managed by the I. S P or the Enterprise. I T
organizations usually have multiple dean their servers as well. Like I said, D N s is a critical function.
A d. N s in the network or the enterprise organization Will will work as far as named resolution for Internet sites, other device and host on the network. So a. D. N s is a real critical key to the Internet as well as internal enterprise networks.
So therefore there would be a level of ridin. It's providing functions for Internet users.
A proxy server. A proxy servers in immediate server AH client browser makes a request through the proxy. The proxy performs the request. It returns the result to the client. So how this works is you have a client, which would be a work station or a laptop within the network. When they're requesting a server page or a Web page
outside of the organization,
their request will go to the proxy. And instead of that client going out to the Internet to retrieve that webpage, the proxy will do that job. The proxy gets the page,
pulls in Ian and returns it to the client behind the scenes. This is happening in the client never knows that they're going through a proxy one of the main reasons that an organization would want to use a proxies for access control cashing for faster browsing control. Also, you are l filtering or contents can anchor controls
the users going out to request their own webpages. That proxy will be the immediate Terry To grab those webpages, bring him in, make sure there's nothing malicious or dangerous or that can happen. Damage. That client then cashed up to the client also a pimp for faster cashing.
Sometimes when there were pages that users routinely go to and visit.
It will cash those pages to make the browsing experience faster. For the new client
mail Server manages incoming and outgoing mail sands outgoing mail from users and receive the stores. Incoming mail to the users usually managed by your I S P or your provider. And this is another critical service that requires 24 by seven support
as users are always retrieving sending e mails
authentication, server centralized management off authentication of users in the network. Larger enterprise networks manage users access to network systems. And resource is through an authentication server
enterprise, a large network service now not needed for small and home networks. There's no need for an authentication server because that's generally handled by on on a one on one basis. Authentication server would be a critical service as well, because without an authentication server,
users would not be able to get to other Resource is other parts of the network or within
getting into the network. Coming from without an authentication server will provide all those service is for the user and at user's permission or authentication will be tied to multiple Resource is. If they were a remote worker coming in remotely, it would control
access through their VP and give them access to whatever resources
they're permissions have allowed them to sew. Authentication server will be a key component in the whole setup of a network or enterprise. Some network I sim a security information event management server, logging of security events and information.
So, basically, that's what a Simms job is is to log all these security events and information that happens throughout the network,
and these may be different alarms and alerts. They will get sent to the SIM. It provides security alerts in real time, collects data for analysis after events for future reference, to go back and do forensic work to find exactly what may have happened. We'll include also advanced reporting features in the SIM,
and one key part of assume is your sis. Long Server six Logs Server is a standard for message Logging. All devices on your network has a capability of somewhat of sending sis logs, and l sit him to a cyst log server.
The System log server would log these security events in this information and the law files from these network devices centralizing logging will receive these and store this information for long periods of time. It's integrated into the SIM sometimes, and you're no gonna need a large amount of storage.
Four aces Lock server As it's getting a lot of logs
on a daily ongoing basis.
I D s and I ps
These are critical toe a network I. D. S is an intrusion detection system in alarms of on alert of potential attacks. Whereas an I P s is an intrusion prevention system. It responds to events and stop them from reaching the network and other critical devices.
Ah, you tm a unified threat management device. It's an all in one device there many features that the U TM can provide for protecting your network. Ah, you tm could be a You are your content filtering device. Ah, Long as with malware inspection
It could be a firewall in your router as well in your network and also provides Ben with shaping the U. T. M. Is a unified device. It has many different features to protect on many different fronts. Some devices will also have subscription based service is
through a provider of malware, or anti virus,
and it'll get automatic updates based on whatever things are in the wild. It will protect your network users from so the U. T. M is again the all around, all in one device. And I also has caught a new a new firewall as well
in Point Management Server, the management summer that provides centralized management functions for your network and devices, and you're in points.
So what amount of network management server is? It's like your control center your hub. It's It can configure your devices or in points for software and firmware updates. Patch management Remote troubleshooting software installs employee devices will require an agent stall to work with an in management server in Point Management server,
and it will report back to the management server
off its alarms and trips and so forth. Um, this is generally called your single pane of glass, where you can manage the entire network from one location. No longer do you have to go to each device, troubleshoot it, configure it, install software updates and so forth.
You can do it right from your in point management server
and push out all those updates to that device
legacy and embedded systems. They're gonna be times that you're gonna come across networks that have systems that are self contained in their older or embedded systems on they're not on a computer than not on operating system. Like the newer technologies, they may be a self contained system but still provided critical role to the organization.
So therefore, these devices, when you come across them, provides a great learning opportunity to learn
this old technology. Whether that's time clocks, industrial equipment, alarm systems, these sometimes are all self contained, there's no way to configure them like you would configure a router or in any other network device. In a lot of situations, they may not be on the network. They may be a standalone device,
but this technology
is something that you, the technician, would have to maintain. So again, it's a great opportunity to learn these technologies as they're critical to the and their role in the organization.
Okay, so we've covered a lot of different servers, rolls, and service is here on again. You will encounter these on your road to the A plus, as well as in a real life when you're a technician. So that is it for this lesson, and we will see you in the next lesson.