how to make a computer,  computer  software.  hard dis, clustering, ups, computer power supply
AddThis Social Bookmark Button
  Making a Computer Server
  Configuring a Network
  Communication Devices
  IT Certifications
  Computer Network Glossary
  Ethernet Explained
  Router Commands
  Security Overview
  Home Networking
  ISDN Lines
  VOIP Explained
  Windows Resources
  Web Server
  Internet Fax
  GSM Technology
  Network How To
  Routing Explained
  OSI Layers Model
  IT Tutorials
  Free Software Tools
  Free Online Tests
  Wireless Communication
  Computer Hardware
  Mobile Technology
  More Topics





Here you will learn designing a network server techniques, windows 2000, memory, processor, power supply, clustering, monitoring, software and hardware requirements of a server.

A computer network server can be configured reliable and efficient according to the needs of a business. If the business is of a critical nature like banks, consulates, police department or corporate companies, the cost on the reliability of the server increases. There are a large number of the objects involved in a computer network such as hubs, routers, Gateway, bridges, ISDN adapters, Modems, transceivers, firewalls and many others and all these devices by some means depends on the server to share data and resources. There are a number of the subsystems involved in the reliability of a server. Following are the tips and recommendations in making a secure, high performance server according to your business needs.

1. Hard Disk Subsystem Reliability

The main server component that is prone to failure is the hard disk that stores the data of the server. Hard disk is a mechanical component in a server. While selecting the disk drives, you should consider the S.M.A.R.T technology (Self monitoring and Reporting technology). This technology allows the monitoring of the disk drives parameters and is able to predict the failure of the disk drives. Most server vendors provide the hot swap disk drives this means that they can be replaced while the server is in working mode. To provide fault tolerance, implement RAID (redundant array of the inexpensive disks). RAID is implemented by installing RAID disk controller in the server. RAID 5 provides fault tolerance by adding the parity information of the data as it is written on the disk drives. This parity information can be used to regenerate the data in case of disk failure. Minimum 3 disk drives are required to implement a RAID 5 (striped set with parity) and the maximum numbers of the disks involved in the RAID5 are 32.

2. Server Processor

Most of the servers use the Pentium processors that are very reliable in performance and processing speed. Processor or CPU is a heart of any server and if it fails to work, the server becomes non functional. Trend is growing to use a dual-processor server or even multiple processor servers. If this scenario, if one processor fails to work, there is not effect on the other processors in a server. So it is a best decision of the network administrators to use the multiprocessor server.

3. Network Subsystem

The attachment of the server to the network is carried out by the NIC adapter. If a NIC of the server fails to work, the connection of the server with the other computers in a network also fails. Many servers support redundant NICs that can be implemented in the fail over or load balancing situations. In the NIC fail over situations one NIC is used to communicate with the server and the other NIC is held reserve until the other NIC fails and the second NIC is automatically activated. In the NIC load balancing situation both the NICs are activated so improve the reliability and performance of the server communication. A PCI hot swap slot allows replacing the faulty NIC adapter without shutting down the server.

4. Clustering

Redundancy is achieved by clustering. In a clustered environment, two or more server operates as a single server and the failure of the one server, does not affect the working of the other server. There are many advantages of the clustered environment such as reliability, load balancing and high performance of the computing environment.

5. Memory Performance

The memory technology has been improved and it fails to work very seldom. Purchasing a memory for a server that supports ECC (Error correcting code) is a best decision of the system ornetwork administrators. ECC technology is capable of detecting and fixing the single bit error and reporting the multiple bit memory errors. A server needs a high amount of memory to perform its function smoothly. If a memory is low in a server, it can results in slow boot up, slow response time and halting the system so memory is a vital for a computing server.

6. Power Supply Usage

Many computers come with the multiple power supplies and these multiple power supplies 2 or more share the electric load of the computer server. The main advantage of the multiple power supplies is that the failure of the one power supply does not cause the server to shut down because other power supply takes all the electric loads and so server works normally without any problem. Like the other hot swappable hardware in the server, the multiple power supply system is also hot swappable. This means the faulty power supply can be replaced with the new one, while the server is running.

7. UPS ( Uninterruptible Power Supply) Function

A UPS or uninterruptible power supply system plays very vital role in case of the power failure. UPS normally provides power back for 3-4 hours and during this time, server can easily be setup to save the data and all the network users can also access the store their important data on the server. The shutdown process of the server is controlled by software that is installed on the server. UPS is very important in a network environment and if there are a number of the UPS in a network, they can share the load and provide constant power supply to the server.

8. Emergency Generator Working

When a full time operation of the server is required such as hosting servers, web servers, email servers, data server, and emergency generator is a necessary. The emergency generators are usually diesel powers and are developed by a number of the world’s renowned companies like Jubaili Brothers, Cummins. These emergency power generators can be set to automatically switch on in case of power failure or they can be used after the UPS is fully used.

9. Cooling Fans Function

There is a large amount of the hardware installed in inside the CPU so there must be cooling system inside the CPU. The cooling of the server is achieved by the cooling fans, which are installed inside the CPU. These cooling fans pull the cool air inside the CPU and throw away the heated air from inside the CPU. The failure of the cooling fans in the server leads to the automatic shut down of the server due to high buildup heat in the server. Many vendors are providing the hot swappable cooling fans.

10. Computer Monitoring Hardware

There is a specially designed adaptor available for monitoring the performance of the different components of the server. The server can be monitored locally or remotely via a modem by this adapter. In very critical network environments, these types of adapters are usually used in the server to put a check on the performance of the different networking devices.

11. Computer Server Software

Software installed on the server should be very reliable and virus free. A good anti virus software like Norton Anti Virus, Trend Micro, McAfee Anti virus, Panda Anti virus or any other anti virus should be installed and updated. Additionally, a good firewall, anti spyware, malware, adware should also be installed to keep the server virus or spyware free. Good backup software should also be installed on the server in case of any emergency. Any unwanted software, media players, codec, flash games or emails can provide a room for the viruses from the internet to enter in your network. No unauthorized software applications or hardware should be installed in the server. If a virus enters in the server by any means, it is very easy for the viruses to spread all over the network and if they are of severe nature, they can even destroy all your critical data. The above mentioned recommendations for a designing a good server can play a key role in designing a secure, reliable and high performing server for your computer network.

12. Data Server Location

A server should be placed in a room that is capable of providing the cooling and dust free environment to the server. It is very advisable that the server room should be very secure and only the authorized persons like (network administrators or other users) be allowed to enter in the server room.


Home About us Contact us Tutorials Sitemap Links

  AddThis Social Bookmark Button

Copyright 2007. All rights reserved