Full Transcript

JTO Ph-II DNIT Server implementation (Web, FTP, Database) Chapter 2 : Server implementation (Web, FTP, Database) 2.1 Learning Objective This chapter cover the concept of server implementation of servers to host different types of services like Web...

JTO Ph-II DNIT Server implementation (Web, FTP, Database) Chapter 2 : Server implementation (Web, FTP, Database) 2.1 Learning Objective This chapter cover the concept of server implementation of servers to host different types of services like Web service, FTP service and Database service. After reading the chapter the learners will get the concept of Web (HTTP), FTP and Database servers. 2.2 What Does Server Mean? A server is a computer, a device or a program that is dedicated to managing network resources. They are called that because they “serve” another computer, device, or program called “client” to which they provide functionality. There are a number of categories of servers, including print servers, file servers, network servers and database servers. In theory, whenever computers share resources with client machines they are considered servers. However, servers are often referred to as dedicated because they carry out hardly any other tasks apart from their server tasks. The purpose of a server is to manage network resources such as hosting websites, transmitting data, sending or receiving emails, controlling accesses, etc. The server is connected to a switch or router used by all the other network computers can use to access the server‟s features and services (browsing websites, checking emails, communicating with other users, etc.). 2.3 Some of the most common types of server include: Database servers They allow other computers to access a database and retrieve or upload data from and into it.  File servers They provide users with access to files and data stored centrally.  Web servers They deliver requested web pages to multiple client web browsers.  Mail servers They are a sort of “virtual post office” that store and sort emails before they are sent to users upon request.  Application servers JTO Ph-II Week 2 Version 3.0 Aug 2021 Page 12 of 131 For Restricted Circulation JTO Ph-II DNIT Server implementation (Web, FTP, Database) They are servers that provide an environment with all the necessary requirements to run or develop an application.  Other types of server include:  Proxy servers  Cloud servers  Policy servers  Blade servers  Print servers  Domain name services Nearly all personal computers are capable of serving as network servers. However, usually software/hardware system dedicated computers have features and configurations optimized just for this task. For example, dedicated servers may have high-performance RAM, a faster processor and several high-capacity hard drives. In addition, dedicated servers may be connected to redundant power supplies, several networks and other servers. Such connection features and configurations are necessary as many client machines and client programs may depend on them to function efficiently, correctly and reliably. For example, servers must be able to stay always on to deliver their services, and they‟re set up with a certain degree of fault tolerance to reduce the risk of causing service issues. In order to operate in the unique network environment where many computers and hardware/software systems are dependent on just one or several server computers, a server often has special characteristics and capabilities, including:  The ability to update hardware and software without a restart or reboot.  Advanced backup capability for frequent backup of critical data.  Advanced networking performance.  Automatic (invisible to the user) data transfer between devices.  High security for resources, data and memory protection. Server computers often have special operating systems not usually found on personal computers. Some operating systems are available in both server and desktop versions and use similar interfaces. JTO Ph-II Week 2 Version 3.0 Aug 2021 Page 13 of 131 For Restricted Circulation JTO Ph-II DNIT Server implementation (Web, FTP, Database) However, an increase in the reliability of both server hardware and operating systems has blurred the distinctions between desktop and server operating systems. 2.4 Client/Server Architecture  What Does Client/Server Architecture Mean? Client/server architecture is a computing model in which multiple components work in strictly defined roles to communicate. The server hosts, delivers and manages most of the resources and services to be consumed by the client. This type of shared resources architecture has one or more client computers connected to a central server over a network or internet connection. Client/server architecture is also known as a networking computing model or client/server network because all the requests and services are delivered over a network. It‟s considered a form of distributed computing system because the components are doing their work independently of one another. In a client/server architecture, the server acts as the producer and the client acts as a consumer. The server houses and provides high-end, computing-intensive services to the client on demand. These services can include application access, storage, file sharing, printer access and/or direct access to the server‟s raw computing power. Client/server architecture works when the client computer sends a resource or process request to the server over the network connection, which is then processed and delivered to the client. A server computer can manage several clients simultaneously, whereas one client can be connected to several servers at a time, each providing a different set of services. The client/server model as it evolved served pretty well for what some refer to as web 2.0, where the Internet slowly became a functional virtual space for users. It provided an established and predictable model for how user sessions would go, and how providers delivered resources based on requests for data packets and other resources. Example of Client/Server Communications Here's an example of how client/server communications work. In an average use of a browser to access a server-side website, the user or client enters the URL. The DNS server looks up the web server's IP address, and gives it to the browser. The browser generates an HTTP or HTTPS request, and the server, as the producer, sends the files. The client, as the consumer, receives them, and then, typically, sends follow-up requests. Although this model technically works for any number of similar processes, it does have some drawbacks. Over time, an alternative called peer-to-peer or P2P modeling has emerged, which many feel is in some ways superior to traditional client/server models, especially in terms of handing handling specific challenges where communications are more evolved.  Issues with Client/Server Models JTO Ph-II Week 2 Version 3.0 Aug 2021 Page 14 of 131 For Restricted Circulation JTO Ph-II DNIT Server implementation (Web, FTP, Database) One of the biggest issues with a traditional client/server setup is the nature of unpredictable workloads. In defining client/server systems as systems that scale vertically and use central data stores, some analysts believe that peer-to-peer is more agile and versatile for making sure that unpredictable workloads are managed well. Experts talk about things like redundancy and availability zones and failover as a means to keep online business systems running smoothly, despite changes in demand or other problems. For example, another major issue is the utility of a distributed denial of service (DDoS) attack. In this type of attack, out-of-control client activity swamps a server. Those who are looking at the Internet of a couple of decades ago point out that it was fairly easy to swamp a site with a DDoS attack because the average client/server model wasn't set up for thresholds above a certain amount of traffic. Peer-to-peer systems can solve many of those problems, and secure systems against DDoS attacks and similar cyber attacks. Peer-to-peer is also helpful in handling some kinds of other disruptions based on a single point of failure. With the emergence of decentralized and distributed systems, for example, blockchain immutable ledger technologies, peer-to-peer systems are becoming more popular and starting to replace client/server architectures. 2.5 Two-Tier Architecture What Does Two-Tier Architecture Mean? A two-tier architecture is a software architecture in which a presentation layer or interface runs on a client, and a data layer or data structure gets stored on a server. Separating these two components into different locations represents a two-tier architecture, as opposed to a single-tier architecture. Other kinds of multi-tier architectures add additional layers in distributed software design. Experts often contrast a two-tier architecture to a three-tier architecture, where a third application or business layer is added that acts as an intermediary between the client or presentation layer and the data layer. This can increase the performance of the system and help with scalability. It can also eliminate many kinds of problems with confusion, which can be caused by multi-user access in two-tier architectures. However, the advanced complexity of three-tier architecture may mean more cost and effort. An additional note on two-tier architecture is that the word "tier" commonly refers to splitting the two software layers onto two different physical pieces of hardware. Multi-layer programs can be built on one tier, but because of operational preferences, many two-tier architectures use a computer for the first tier and a server for the second tier. JTO Ph-II Week 2 Version 3.0 Aug 2021 Page 15 of 131 For Restricted Circulation JTO Ph-II DNIT Server implementation (Web, FTP, Database) 2.6 Three-Tier Architecture A three-tier client/server is a type of multi-tier computing architecture in which an entire application is distributed across three different computing layers or tiers. It divides the presentation, application logic and data processing layers across client and server devices. It is an example of three-tier application architecture. A three-tier client/server adds an additional layer/tier to the client/server-based two-tier models. This additional layer is a server tier that acts as an intermediary or middleware appliance. In a typical implementation scenario, the client or first tier holds the application presentation/interface and broadcasts all of its application-specific requests to the middleware tier server. The middleware or second tier calls the application logic server or third tier for application logic. The distribution of the entire application logic across three tiers helps optimize the overall application access and layer/tier level development and management. 2.7 HTTP Server A web server is software and hardware that uses HTTP (Hypertext Transfer Protocol) and other protocols to respond to client requests made over the World Wide Web. The main job of a web server is to display website content through storing, processing and delivering webpages to users. Besides HTTP, web servers also support SMTP (Simple Mail Transfer Protocol) and FTP (File Transfer Protocol), used for email, file transfer and storage. Web server hardware is connected to the internet and allows data to be exchanged with other connected devices, while web server software controls how a user accesses hosted files. The web server process is an example of the client/server model. All computers that host websites must have web server software. Web servers are used in web hosting, or the hosting of data for websites and web-based applications -- or web applications. How do web servers work? Web server software is accessed through the domain names of websites and ensures the delivery of the site's content to the requesting user. The software side is also comprised of several components, with at least an HTTP server. The HTTP server is able to understand HTTP and URLs. As hardware, a web server is a computer that stores web server software and other files related to a website, such as HTML documents, images and JavaScript files. JTO Ph-II Week 2 Version 3.0 Aug 2021 Page 16 of 131 For Restricted Circulation JTO Ph-II DNIT Server implementation (Web, FTP, Database) When a web browser, like Google Chrome or Firefox, needs a file that's hosted on a web server, the browser will request the file by HTTP. When the request is received by the web server, the HTTP server will accept the request, find the content and send it back to the browser through HTTP. More specifically, when a browser requests a page from a web server, the process will follow a series of steps. First, a person will specify a URL in a web browser's address bar. The web browser will then obtain the IP address of the domain name -- either translating the URL through DNS (Domain Name System) or by searching in its cache. This will bring the browser to a web server. The browser will then request the specific file from the web server by an HTTP request. The web server will respond, sending the browser the requested page, again, through HTTP. If the requested page does not exist or if something goes wrong, the web server will respond with an error message. The browser will then be able to display the webpage. Multiple domains also can be hosted on one web server. Examples of web server uses Web servers often come as part of a larger package of internet- and intranet-related programs that are used for:  sending and receiving emails;  downloading requests for File Transfer Protocol (FTP) files; and  building and publishing webpages. Many basic web servers will also support server-side scripting, which is used to employ scripts on a web server that can customize the response to the client. Server-side scripting runs on the server machine and typically has a broad feature set, which includes database access. The server-side scripting process will also use Active Server Pages (ASP), Hypertext Preprocessor (PHP) and other scripting languages. This process also allows HTML documents to be created dynamically. JTO Ph-II Week 2 Version 3.0 Aug 2021 Page 17 of 131 For Restricted Circulation JTO Ph-II DNIT Server implementation (Web, FTP, Database) 2.8 Dynamic vs. static web servers A web server can be used to serve either static or dynamic content. Static refers to the content being shown as is, while dynamic content can be updated and changed. A static web server will consist of a computer and HTTP software. It is considered static because the sever will send hosted files as is to a browser. Dynamic web browsers will consist of a web server and other software such as an application server and database. It is considered dynamic because the application server can be used to update any hosted files before they are sent to a browser. The web server can generate content when it is requested from the database. Though this process is more flexible, it is also more complicated. 2.9 Common and top web server software on the market There are a number of common web servers available, some including:  Apache HTTP Server. Developed by Apache Software Foundation, it is a free and open source web server for Windows, Mac OS X, Unix, Linux, Solaris and other operating systems; it needs the Apache license.  Microsoft Internet Information Services (IIS). Developed by Microsoft for Microsoft platforms; it is not open sourced, but widely used.  Nginx. A popular open source web server for administrators because of its light resource utilization and scalability. It can handle many concurrent sessions due to its event-driven architecture. Nginx also can be used as a proxy server and load balancer.  Lighttpd. A free web server that comes with the FreeBSD operating system. It is seen as fast and secure, while consuming less CPU power.  Sun Java System Web Server. A free web server from Sun Microsystems that can run on Windows, Linux and Unix. It is well-equipped to handle medium to large websites. Leading web servers include Apache, Microsoft's Internet Information Services (IIS) and Nginx - - pronounced engine X. Other web servers include Novell's NetWare server, Google Web Server (GWS) and IBM's family of Domino servers. JTO Ph-II Week 2 Version 3.0 Aug 2021 Page 18 of 131 For Restricted Circulation JTO Ph-II DNIT Server implementation (Web, FTP, Database) Considerations in choosing a web server include how well it works with the operating system and other servers; its ability to handle server-side programming; security characteristics; and the publishing, search engine and site-building tools that come with it. Web servers may also have different configurations and set default values. To create high performance, a web server, high throughput and low latency will help. 2.10 Web server security practices There are plenty of security practices individuals can set around web server use that can make for a safer experience. A few example security practices can include processes like:  a reverse proxy, which is designed to hide an internal server and act as an intermediary for traffic originating on an internal server;  access restriction through processes such as limiting the web host's access to infrastructure machines or using Secure Socket Shell (SSH);  keeping web servers patched and up to date to help ensure the web server isn't susceptible to vulnerabilities;  network monitoring to make sure there isn't any or unauthorized activity; and  using a firewall and SSL as firewalls can monitor HTTP traffic while having a Secure Sockets Layer (SSL) can help keep data secure. 2.11 How to encrypt and secure a website using HTTPS The web is moving to HTTPS. Find out how to encrypt websites using HTTPS to stop eavesdroppers from snooping around sensitive and restricted web data. Encrypting web content is nothing new: It's been nearly 20 years since the publication of the specification for encrypting web content by running HTTP over the Transport Layer Security protocol. However, running a secure encrypted web server has gone from an option to a virtual necessity in recent years. Attackers continue to seek -- and find -- ways to steal information sent between users and web services, often by tapping into unencrypted content being sent over the Hypertext Transfer JTO Ph-II Week 2 Version 3.0 Aug 2021 Page 19 of 131 For Restricted Circulation JTO Ph-II DNIT Server implementation (Web, FTP, Database) Protocol. Even for mundane, untargeted web content, securing a website with encryption is crucial, as the top browsers now flag unencrypted websites as potentially dangerous. While HTTPS website encryption is a requirement for assuring data integrity between browsers and servers, it is also increasingly a prerequisite for new browser functionality. Learning how to encrypt a website by enabling HTTPS is mandatory, especially for enterprises that want to provide users with a safe and secure web experience.  What is HTTPS? HTTP transfers data as plain text between the client and server. Therefore, anyone who has access to any network segment between you and the server -- on your network, on the server's network or any place in between -- is able to view the contents of your web surfing. Use HTTPS to protect data relating to financial transactions, personally identifiable information or any other sensitive data, as well as to avoid having browsers flag your site as insecure. HTTPS enables website encryption by running HTTP over the Transport Layer Security (TLS) protocol. Even though the SSL protocol was replaced 20 years ago by TLS, these certificates are still often referred to as SSL certificates. Here's a simplified view of how it works: 1. You start your web browser and request a secure page by using the https:// prefix on the URL. 2. Your web browser contacts the web server on the HTTPS port -- TCP port 443 -- and requests a secure connection. 3. The server responds with a copy of its SSL certificate. 4. Your web browser uses the certificate to verify the identity of the remote server and extract the remote server's public key. 5. Your web browser creates a session key, encrypts it with the server's public key and sends the encrypted key to the server. 6. The server uses its private key to decrypt the session key. JTO Ph-II Week 2 Version 3.0 Aug 2021 Page 20 of 131 For Restricted Circulation JTO Ph-II DNIT Server implementation (Web, FTP, Database) 7. The client and server use the session key to encrypt all further communications. While HTTPS sessions can be reliably considered secure from eavesdropping attacks, HTTPS by itself does not protect against any other types of attack. Site administrators must still take an active role in preventing and mitigating cross-site scripting, injection and many other attacks that target application or other website vulnerabilities. Figure 6: Encryption Operation Encrypting website data relies on cryptographic algorithms and keys.  How to encrypt a website with HTTPS The keys to encrypting a website reside, literally, in the web server. To enable a web server to encrypt all content that it sends, a public key certificate must be installed. The details of installing an SSL certificate and enabling a web server to use it for HTTPS encryption vary depending on which web server software is being used. But, in almost all cases, the process broadly encompasses these steps: 1. Identify all web servers and services that need to be encrypted. Servers may be hosted in the cloud, on premises, or at an internet service provider or other service provider. A single certificate could be used on multiple servers, but doing so can be risky: If the certificate is breached on one server, the attacker would be able to exploit the certificate on any other JTO Ph-II Week 2 Version 3.0 Aug 2021 Page 21 of 131 For Restricted Circulation JTO Ph-II DNIT Server implementation (Web, FTP, Database) servers that use it. Best practice would be to get a separate certificate for each server or service. 2. Get certificates for web servers and services that need them. Certificates can be purchased from a commercial certificate authority, or they may be acquired at no cost from Let's Encrypt, a free, open source and automated CA. Some commercial CAs also offer bare-bones or trial certificates at no charge, and some hosting service providers will provide certificates for customers whose websites are hosted on shared servers. 3. Configure the web server to use HTTPS, rather than HTTP. The web server configuration process includes installing the SSL certificate, turning on support for HTTPS and configuring encryption options for HTTPS. The configuration process will vary depending on whether the server is hosted in the cloud or on premises and which web server software is in use. 4. Administer and manage certificates. Ongoing administration and quality control over encrypted websites is critical. Qualys, a cloud security provider based in Foster City, Calif., offers an SSL server test page that can help. Certificates are issued with limited lifetimes that are typically one year and never for longer than 27 months. So, system administrators should regularly test and verify that certificates are valid and flag any that are nearing their end-of- life dates. Similarly, periodic testing should also be carried out to verify that servers are responding properly to valid requests and are fully protecting all data transmissions. Installing a digital certificate and providing users with the ability to make HTTPS connections to your web server is one of the simplest ways you can add security to your website and build user confidence when conducting transactions with you over the web. It eliminates "site not secure" messages from web browsers and ensures communications are not subject to eavesdropping on the internet. 2.12 What Does FTP Server Mean? The primary purpose of an FTP server is to allow users to upload and download files. An FTP server is a computer that has a file transfer protocol (FTP) address and is dedicated to receiving an FTP connection. FTP is a protocol used to transfer files via the internet between a server (sender) and a client (receiver). An FTP server is a computer that offers files available for download via an FTP protocol, and it is a common solution used to facilitate remote data sharing between computers. JTO Ph-II Week 2 Version 3.0 Aug 2021 Page 22 of 131 For Restricted Circulation JTO Ph-II DNIT Server implementation (Web, FTP, Database) An FTP server is an important component in FTP architecture and helps in exchanging files over the internet. The files are generally uploaded to the server from a personal computer or other removable hard drives (such as a USB flash drive) and then sent from the server to a remote client via the FTP protocol. An FTP server needs a TCP/IP network to function and is dependent on the use of dedicated servers with one or more FTP clients. In order to ensure that connections can be established at all times from the clients, an FTP server is usually switched on; up and running 24/7.  An FTP server is also known as an FTP site or FTP host. Although the FTP server actually sends files over the internet, it generally acts as the midpoint between the real sender of a file and its recipient. The recipient must access the server address, which can either be a URL (e.g., ftp://exampleserver.net) or as a numeric address (usually the IP address of the server). All file transfer protocol site addresses begin with ftp://. FTP servers usually listen for client connections on port 21 since the FTP protocol generally uses this port as its principle route of communication. FTP runs on two different Transmission Control Protocol ports: 20 and 21. FTP ports 20 and 21 must both be open on the network for successful file transfers. The FTP server allows the downloading and uploading of files. The FTP server‟s administrator can restrict access for downloading different files and from different folders residing in the FTP server. Files residing in FTP servers can be retrieved by common web browsers, but they may not support protocol extensions like FTPS. With an FTP connection, it is possible to resume an interrupted download that was not successfully completed; in other words, checkpoint restart support is provided. For the client to establish a connection to the FTP server, the username and password are sent using USER and PASS commands. Once accepted by the FTP server, an acknowledgment is sent to the client and the session can start. Failure to open both ports 20 & 21 prevents the full back-and-forth transfer from being made. The FTP server can provide connection to users without login credentials; however, the FTP server can authorize these to have only limited access. FTP servers can also provide anonymous access. This access allows users to download files from the servers anonymously but prohibits uploading files to FTP servers. Beyond routine file transfer operations, FTP servers are also used for offsite backup of critical data. FTP servers are quite inexpensive solutions for both data transfer and backup operations, especially if security is not a concern. However, when simple login and authentication features are not sufficient to guarantee an adequate degree of security (such as when transferring sensitive or confidential information), two secure file transfer protocol alternatives, SFTP and FTP/S, are also available. These secure FTP server options offer additional levels of security such as data encryption. JTO Ph-II Week 2 Version 3.0 Aug 2021 Page 23 of 131 For Restricted Circulation JTO Ph-II DNIT Server implementation (Web, FTP, Database) 2.13 Secure FTP Server (SFTP Server) What Does Secure FTP Server (SFTP Server) Mean? A secure FTP server helps users with transferring files over secure file transfer protocols such as SSH File Transfer Protocol or FTP with SSL/TLS. The transfers can be achieved through server-to-server or client-to-server configurations. A secure FTP server helps enterprises in sending confidential files securely over the internet or insecure networks. A secure FTP server needs an SSH client for communication. A secure FTP server supports many actions on files such as file transfers comprised of multiple files, remote file management activities, creations of directories and deletions related to directories and directory listings. A secure FTP server also makes use of protocols to provide security features such as authentication, encryption or data integrity, password management and access control mechanisms. Certain advanced secure FTP servers such as JSCAPE MFT server often provides both SFTP and FTPS protocols along with other file transfer protocols. There are benefits associated with a secure FTP server. It can detect files which are subjected to unauthorized changes, and as such provides greater data integrity. It also capable of preventing malicious users from impersonating legitimate uses to gain access to files. A secure FTP server helps to keep the file contents secure during transmission. It maintains high access control, meaning only authorized users can access the files. It provides a data-at-rest encryption feature which helps to keep the file contents secure during storage. A secure FTP server is also capable of recording file transfer events; this helps in audits/compliance or to support troubleshooting. One of the other advantages of secure FTP server is its capability to automatically detect sensitive data like cardholder data and ePHI, and its ability to help in password management. File Transfer Protocol (FTP) Example FTP software is relatively straightforward to setup. FileZilla is a free, downloadable FTP client. Type in the address of the server you wish to access, the port, and the password for accessing the server. JTO Ph-II Week 2 Version 3.0 Aug 2021 Page 24 of 131 For Restricted Circulation JTO Ph-II DNIT Server implementation (Web, FTP, Database) Figure 7: FileZilla Once access has been granted, the user's files on their local system as well as the accessed server will be visible. The user can download files from the server to the local system, or upload files from the local system to the server. They can also, with the proper authorization, make changes to files on the server. 2.14 What is Database Server Definition – Database server refers to combination of hardware and software where they are used to run the database, as per the context. As software, a database server works as back end portion for database applications that is following old client server model. This back-end portion is known as “Instance”. Database server likes as dedicated server that helps to offer database services, and this type of server run database management software. Database server works similar to client-server network model because it delivers all information which is sought by client systems. Many large scale organizations use the database servers because they need lot of data regular basis. If those organizations implement client server architecture where all clients require process data with frequently, then database server associated with it, and they work together with more efficiently. Few companies hire file server for storing and process data, then database server is best option compare to file server. 2.15 Types of Database Server There are different types of database server, and they are also known as “Database Management System” or “Database Server Software”. Below explain each one: JTO Ph-II Week 2 Version 3.0 Aug 2021 Page 25 of 131 For Restricted Circulation JTO Ph-II DNIT Server implementation (Web, FTP, Database) Figure 8: Types of Database Server 2.16 Examples of Database Server  SAP HANA It is developed by SAP SE, and it has ability to manage SAP and non SAP data. It can support OLTP, OLAP, and SQL. It can interface with large number of other types of applications.  DB2 This is designed by IBM,m and it has NoSQL abilities. It is capable to read JSON and XML types of files. Primary objective of designing of this database system, to be used on IBM‟s iSeries server, as well as it can also support to Linux, UNIX, and Windows platforms.  SolarWinds Database Performance Analyzer This is best database management software tool because it helps to perform of SQL query performance in analysis, tuning, and monitoring. It can also support to cross platform like as UNIX, Linux, and Windows.  Oracle Oracle is most popular database that is used as object relational database management software, and it has latest version is 12c (12 Cloud Computing). It can also support to many Windows, Linux and UNIX versions.  IBM DB2 JTO Ph-II Week 2 Version 3.0 Aug 2021 Page 26 of 131 For Restricted Circulation JTO Ph-II DNIT Server implementation (Web, FTP, Database) IBM DB2 introduced in 1983 by IBM, and C, C++, and Assembly languages are used for designing it. Its installation and set up task is very easy, and data can be also accessed very easy. So it helps to save enlarge amount of data approximate up to peta bytes.  Altibase Altibase is an hybrid DBMS, relational open source database and higher performance, so it is used mostly in the high grade enterprise organizations. Till now, Altibase database has been covered approximate 700 enterprise clients along with 8 Fortune Global 500 organizations in several sectors. It offers data processing with highly intensity from memory database region, and it also contains enlarge storage capacity in disk database region.  Microsoft SQL Server This server was introduced in 1989, and its latest update was released in 2016. Several languages are used for writing it like as Assembly, C, Linux, C++. It can support of Linux and Windows operating systems. It allows various users to use same database at once.  SAP Sybase ASE ASE stands for “Adaptive Server Enterprise”, and it has latest update version is 15.7. It has ability to perform millions of transactions in second, and with using of cloud computing all mobile devices can be synchronized along with this database.  Teradata Teradata database was developed in 1979, and it supports Windows and Linux operating systems. Data expose and impose can be done very easy as well as multiple processing also can be done at once. It is comfortable for enlarge database.  ADABAS ADABAS stands for “Adaptable Database System”, and it has higher data processing speed, result of all transaction is more reliable.  MySQL MySQL is getting more popularity for different web based applications. It is available in freeware and paid version. It can be run on Linux and Windows operating system.  Features are: JTO Ph-II Week 2 Version 3.0 Aug 2021 Page 27 of 131 For Restricted Circulation JTO Ph-II DNIT Server implementation (Web, FTP, Database) Offering much functionality in free version database It has several user interfaces which can be implemented. It supports to other database systems like as DB2 and Oracle.  FileMaker FileMaker database server can work on several types of operating systems like as Windows, Linux, Unix, Mac etc. It has latest update version is 15.0.3. This database server is capable to make connection along with different platforms such as connections with SQL. Due to cloud system, its information can be shared easily.  Microsoft Access It depends only Microsoft Windows, and it has latest updated version is 16.0.4229.1024. This database management system is cost effective, so it is used for E-Commerce websites.  Informix This database management system is introduced by IBM, and it is written by C, C++, and Assembly languages. It has latest updated version is 12.10.xC7. Its hardware does not need more space and maintenance time, as well as containing data every time.  SQLite SQLite is open source database management tool, and it is written by C language. This database system is implemented for mobile devices. It can support to Mac, Windows, and Linux operating system. It is comfortable for storing small to medium size data of websites, and it needs only less space.  PostgreSQL This is advance object relational database management system, and it is also available as open- source tool. It works on Windows and Linux operating system. It has current updated version is 9.6.2. It has great data security, and fastest data retrieval process. It offers fastest data sharing through dashboards.  Amazon RDS JTO Ph-II Week 2 Version 3.0 Aug 2021 Page 28 of 131 For Restricted Circulation JTO Ph-II DNIT Server implementation (Web, FTP, Database) It is also known as “Amazon Relational Database Service”. It is more protective database system, and its configuration setup and using is very easy task. It contains backing up and recovery of data feature inbuilt.  MongoDB This database system is available in free and commercial version. It is developed for those applications, which use both structured and unstructured data. This engine can support both JSON and NoSQL documents. It has latest updated version MongoDB 3.2.  Redis Redis database system is an open source tool with BDS licensed. Its latest updated release is 3.2.8. It can support to Linux and Windows operating system. This is written by ANSI C language. It supports hashes and strings data types, and its database speed and queries performance is great.  CouchDB CouchDB is availabe in both version free and paid, and it is coded in Erlang language. Its latest updated version is 2.0.0. It can also support both Linux and Windows operating system. It is secure system network, and efficient error handling.  Neo4j Neo4j contains enlarge capacity server, and it stores all data in the graphical form. So it is known as “Graph Database Management System”. Its latest updated release is 3.1.0, and it is written by Java language. This database system can run on Linux, UNIX, and Windows operating system.  OrientDB It is also known as “Graph Database Management System” because it stores all data in graphical form. Its current stable release id 2.2.17, and it is written by Java language. It is used mostly real-time web base applications over big data market. It can support to Linux and Windows operating system.  Couchbase Couchbase is an open source database management system, and it is coded with C++, C, Erland languages. Its current updated stable release is 4.5. It supports to Linux and Windows platforms.  Toad JTO Ph-II Week 2 Version 3.0 Aug 2021 Page 29 of 131 For Restricted Circulation JTO Ph-II DNIT Server implementation (Web, FTP, Database) It is easy to set up and use, and it helps to produce result with highly efficient as well as its enlarge amount of data can be exported in several formats, does not need more time for its maintenance.  phpMyAdmin This database server is available as open-source, and it contains user friendly interface. It has currently stable updated version 4.6.6. This database server is written by XHTML, JavaScript, and PHP languages. It is capable to support of Linux and Windows operating systems. Its data can be exported in different file formats like as CSV, SQL, and XML. It has also ability to import data into both file formats (CSV and SQL).  SQL Developer It is also open-source database server. It has ability to execute all queries into different formats like as HTML, PDF, XML, and Excel. It has latest updated version 4.1.5.21.78. This system is written by Java language. It can run on both platforms like as Linux and Windows.  Sequel Pro This database system is used for Mac database. It is easy to operate and works along with MySQL database. Easy to connectivity and more flexible. Installation is easy and quick.  Robomongo This database server is also free and open-source and it can support to both platforms Linux and Windows. It can bear enlarge quantity of load as well as getting great error handling system.  DbVisualizer It has user friendly interface, and easy to set up as well as installation. It also offers better facility for exporting data in CSV format. User has option to scroll down to view the result, if any time it produces enlarges number of rows for retrieving.  Hadoop HDFS This database system offers to enlarge data storage and uses several machines for storing data. Easy to access of data, and due to data redundancy, it prevents data loss. Parallel processing of data and data authentication is also available.  Cloudera JTO Ph-II Week 2 Version 3.0 Aug 2021 Page 30 of 131 For Restricted Circulation JTO Ph-II DNIT Server implementation (Web, FTP, Database) It has higher speed of data processing so mostly large enterprises use this database system. It offers high level security and better efficiency for enlarge amount of data.  MariaDB This database management system is also available in both versions free and paid. The database engine allows you to choose from a variety of storage engines, and it makes great use of resources via an optimizer that increases query performance and processing. It can run on Windows, Linux, UNIX, and Mac operating system. It offers multi-core support, multiple threads, internet protocol, and real-time database access.  Informix Dynamic Server It can support Windows, Linux, UNIX, and Mac operating system. It offers multi-core support, multiple threads, internet protocol, and real-time database access.  4D 4D stands for “4th Dimension”, and it also supports Mac and Windows platform. It has ability for importing and exporting data and it also offers drag and drop facility. 2.17 Function and Working of Database Server Database server is a high performing computer system that helps to provide another computer along with services related for accessing as well as retrieving data from database side. “Front End” is run on the local machines which are operated by users for getting access permission to database server, and “Back End” is run on database server itself that is accessed by remote shell. After retrieving information from database, it is outputted to user requesting data. 2.18 Conclusion The HTTP,FTP and Database servers are playing the key role in providing essential network based services, and nobody can imagine the internet without these services. These servers are fulfilling the high performance network based requirement and generates uncountable responses for the clients. The better understanding of these services will provide the seemless services to the customers. JTO Ph-II Week 2 Version 3.0 Aug 2021 Page 31 of 131 For Restricted Circulation

Use Quizgecko on...
Browser
Browser