Premium Essay

File Server

In:

Submitted By saja17
Words 1163
Pages 5
What is a file server?
Essentially, a file server is a computer that stores files, is attached to a network, and provides shared access of those files to multiple workstation computers. File servers do not perform computational tasks - that is, they do not run programs for client machines. Furthermore, they do not provide dynamic content like a web server. Still further, file servers are not like database servers in that the former do not provide access to a shared database whereas the latter do. File servers provide access to static files via a local intranet through Windows or Unix protocols as well as over the internet through file transfer or hypertext transfer protocols (FTP and HTTP).
What can you do with a file server?

The primary function of a file server is storage. For the home user, one central storage location can increase overall computing efficiency and reduce overall computing cost. By placing all of your important files in a single location, you do not need to worry about different versions of files you're actively working on, wasting disk space by having multiple copies of less-than-important files scattered on different systems, backing up the right files onto the right backup storage medium from the right computer, making sure every PC in your home has access to the appropriate files, and so on.
From a system builder's perspective, a file server can also liberate your various workstation computers from having to accommodate multiple hard drives, and decrease overall hard drive expenditures. With the rise of SSDs, which offer tremendous performance at a high cost per GB, a file server can free workstations from the performance shackles of platter-based disks - an especially useful consideration for laptops and netbooks, where the small capacity of an SSD is often a deal breaker since these mobile computers usually can house only one

Similar Documents

Premium Essay

Installing Server Roles with a Batch File

...Course Objectives and Learning Outcomes In this assignment, you will evaluate how to perform post-installation tasks, including the installation of roles with Server Manager and how to create batch files to manage administrative tasks. Assignment Requirements Evaluate the following scenario: After careful consideration, it was decided by the corporate IT team that in order to increase security and lower your attack surface, Windows 2008 Server Core would be installed on a group of your servers. However, a few roles need to be installed on the server, and your Senior Administrator is not familiar with installing roles on a Server Core machine. Use notepad to create a batch file to install the following roles: DHCP, DNS, Print Services and Hyper-V. Questions: 1. What does the /w switch do? Why is it used? 2. What switch is used to remove a role? 3. What is the command to start the DHCP Server service? 4. What command is used to configure a DNS zone? These commands will be entered in a WordPad. Once entered the file will be saved has roles.bat. double clicking on the file will run it automatically /w ocsetup DHCPServerCore /w ocsetup DNS-Server-Core-Role /w ocsetup Microsoft-Hyper-V /w ocsetup Printing-ServerCore-Role 1. What does the /w switch do? Why is it used? Using /w prevents the command prompt from returning until the installation completes. Without /w, there is no indication that the installation completed. 2. What switch is...

Words: 314 - Pages: 2

Free Essay

Alpha Omega Ti File Server

...entire business while they perform routine maintenance on a server. That is unacceptable, interrupting productivity because it is "a better time for us" is the wrong answer. Alpha Omega Technical Industries around your business. We strive to make technology integrate seamlessly with your business so your business can grow. As your technology partner, when your business grows ours will grow with you, therefore, we will work hand in hand with you to support your growth. With the model and upward mobility we have seen out of Alpha Omega Technical Industries it has experienced a of recent success and a need for growth The CIO of Alpha Omega Technical Industries has expressed an interest in expanding network storage while creating the ability to share files, access security logs and be able to archive data. SECTION II Installing Data Storage Network solutions a. NAS Servers The first step in this process is identifying the type of NAS storage that will be used. The type of NAS severs that will be used will be the TeraStation 7120r 96 TB/TS-2RZH96T12D X 6. “TeraStation 7120r Enterprise is a high performance 12-drive network storage solution ideal for businesses and demanding users requiring a reliable RAID based NAS and iSCSI storage solution for larger networks and business critical applications. With the powerful quad-core processor, TeraStation 7120r Enterprise provides exceptional performance during file transfers and everyday NAS functions: experience maximum network...

Words: 1043 - Pages: 5

Premium Essay

Disaster Recovery Plan for 123 Textiles.

...is to ensure the safety of the building, the server, and its employees and to maintain the assets of the company. First thing to do is to secure the building. In a high-crime area you might want to protect the data and its information first. Being that the company is not open 24 hours a day, security is going to be the first focus. Hiring security guards in a rotation that starts at the close of business is going to be a must. Second the installation of closed-circuit TV or security cameras outside of the building and a few inside near the new location of the server should be ok. All video needs to be recorded using a DVR or any other recording device that records for 24 hours or more. The videos should also be kept secure just in case there is an incident. Alarms should be attached also so that not only security but the police can be notified in case of a break-in. Motion detectors can and should be inserted near the entrance and hall of where the server will now be located. Having a secured door with a pass-code on the door should also be inserted so that only authorized personnel can enter in and out of where the server will now be located. Here is the type of security hardware I would suggest. Being able to back up the system: Securing personal and public information is something that you do not want to lose. So securing data from loss is ensuring that there is a backup for all the data. You will want to regularly save files and place them into a folder of information...

Words: 1270 - Pages: 6

Free Essay

Applied Reserach Course Project

...an attempt to provide end users with a well maintained network storage that would be easily accessible from any location while maintaining a secured connection. To provide an environment to minimize the use and maintenance of local servers, server space, connectivity, and redundancy. | 2. Intended clients or customers The intended client or customer would be the end users of the company, this end users vary from medical office assistants, physicians, office managers, nurses, administrative assistants, receptionist, finance dept, insurance dept, medical records, and materials management to name a few. | 3. Business objective statementThe business objective is to minimize the cost of maintaining 40+ servers on a specified region, meanwhile providing for data storage, redundancy, and fast access to network files that would be housed in the cloud. | 4. Application architecture descriptionThe application architecture would consist of building a system that in scalable for future growth, it would possibly include emails servers, data servers, instant messaging. | 5. Information provided to the clientsThe clients would be notified of the changes being made via email, departmental meetings, and online training in order to be able to find their files and incur minimal downtime. | 6. Basic requirementsSome of the basic requirements we would be looking at would be the cost effectiveness of using cloud services, the capacity of our current networks to be able to maintain a feasible...

Words: 3576 - Pages: 15

Free Essay

Fact Finders Australia

...Part A 1. Recommendations if FFA should have a network with a file server. There are pros and cons for this situation. For pros it will be easier for the users to multitask, instead of needing to switching computers to print, scan or to search on the internet. Also for instance if a file is needed to be printed and it’s on one computers that is only connected to the scanner or the internet, it would take some time to print because the user would have to put it in a storage disc then transfer over to the computer connected to the internet, this would waste a lot of time. The cons about having a network with a file server is that if one of the computers have a virus, there is a high chance where the virus is able to spread to the other computers . This could cause the company to lose important files. Also if this was a small company it is not really necessary to have a file server. 2. Recommendation if FFA should use Electronic Spreadsheet. Using an Electronic Spreadsheet would be most productive for the MRs because it would cause fewer mistakes for the MRs taking down what the shoppers has bought. Also it would be easier for the MRs to add up a total instead of using a pen a paper it would a lot of time and a risk of mistakes happening. 3. Advantages and disadvantages of using an Electronic Spreadsheet. Best type of devices suitable for this task. The advantages for this is when all the data is taken, it is much easier and faster to calculate the total and generating...

Words: 854 - Pages: 4

Free Essay

Linux Homework

...IT250 Linux Home Work Chapter 4 1) What command can be used to list the files in a directory? dir 2) What command can be used to display the contents of a text file? cat 3) What command can be used to delete a file? rm Chapter 5 1) What commands can be used to compress a file? Gzip and bzip2 2) Name two text editing commands we used. nano and vim 3) What VIM command quits without saving. :q! 4) What VIM command saves and quits. ZZ 5) What VIM command is used to switch from text entry to command mode? Esc Chapter 6 1) What command allows us to check or change permissions? Chmod 2) When working with permissions, what symbolic permissions value of RW? Read and write 3) What is the numeric equivalent of this value? 6 Chapter 7 1) When used with a command, what does the > character do? Redirect output 2) What does grep do? Search file(s) for lines that match a given pattern Chapter 8 1) Define GNOME GNOME is designed to be a Windows-like Desktop system Chapter 9 1) Define BASH. Bourne Again Shell GNU’s command interpreter for UNIX Chapter 10 1) What command can I use to identify the name of the computer I’m using? hostname 2) Define daemon. A program that runs in the background, rather than controlled by the user 3) Identify a daemon. ftp 4) Define FQDN. Fully qualified domain name, is the complete domain name for a specific host 5) Identify one top level domain. Infrastructure top-level domain Chapter 11 1) What is sudo? Super...

Words: 437 - Pages: 2

Free Essay

It332 Kaplan Unit 10

...the instruction set architecture is the program language. Table of Contents Introduction What OS file system should we use? What types of processors? Cluster Architecture? Data Backup LAN or WAN Web-based diagram Introduction to Coast to Coast computing We can get in a plane and be across the country in a few hours but what if we need to work together faster than a few hours? Is it possible? How hard is it to have users in California work with users in Washington, New York, and Florida? What has to be done to make this happen? How secure will it be to have such a network? This and many other questions come up when a company starts thinking of expansion beyond the building or city they headquartered at. When looking at a network a business wants to be sure it is using the most cost effective form for the network. The base of a network is the architecture. For small businesses a peer to peer architecture would be best. There are three types of peer-to-peer architecture: collaborative computing, instant messaging, and affinity communities. In collaborative computing the unused CPU processing power along with any free disk space is combined with machines on the same network. A very common peer-to-peer networking is instant messaging. Google Hangouts is an example of this where each user can communicate in real time via chat. In affinity communities there is file sharing which...

Words: 1513 - Pages: 7

Premium Essay

Nt1330 Unit 3

...How to Enhance the Performance of VPS Server? VPS is a combination of shared hosting and dedicated server that provides user an exceptional mixture of features with affordability. VPS assures high-performance, durability and reliability; however, it would be unfair to remain highly dependent on your server and let it go as long as it can. As your business continues to grow, the pressure and load on the equipment goes upward as well. To maintain server efficiency, consider finding out some practical approaches to configure its conduct. For escalating the performance level, below are some measures that companies can apply to improve load times and response rates, in order to achieve better outcome. 1. Installing caching software Caching is one of the easiest way to boost efficiency as it stores temporary files on your hard drive that offers repeated access to the website at a great speed. Requesting files repeatedly will result in slow performance, but temporary file storage on RAM improves latency and website speed as it provides access to frequently accessed web data quickly that lets your customers land on your website within a short period. Installing caching software such as Memcached, Varnish, and Squid will help speed your website significantly. 2....

Words: 504 - Pages: 3

Premium Essay

P3 Unit 1 Network Analysis

...or professional work. A workstation has larger multitasking capabilities this is because of the additional random access memory (RAM), drives and drive capacity. When building a network, the components used fall into a number of different categories these categories are: Network devices- Network devices are components used to connect computers or electronic devices together so that they can share files or resources for instance printers or fax machines. The devices used to setup a Local Area Network (LAN) are the most common type of network...

Words: 662 - Pages: 3

Premium Essay

Unit 4 Summray

...1. Computing Wireless / Networking ------------------------------------------------- Top of Form Search Bottom of Form * Wireless / Networking Categories * Networking Basics * Wi-Fi Wireless * TCP/IP Networking * Internet Connections * Proxy Servers / Lists * Home Networking * VPN and Virtualization * P2P File Sharing * Network Hardware * Windows Networking * Mac OS + iOS Networking * Network Design / IT * Bluetooth Wireless * VoIP - Voice Over IP * Free Practice Tests * Fundamentals Most Popular * What Is Computer Networking? * Introduction to Area Networks * What Is a Network Router? * What Is an Ethernet Card? * Useful Facts About How Wi-Fi Works * Internet Connection Alternatives for Home Networks * More » * Get Connected Most Popular * What Is Computer Networking? * Introduction to Area Networks * What Is a Network Router? * What Is an Ethernet Card? * Useful Facts About How Wi-Fi Works * Internet Connection Alternatives for Home Networks * More » * Uses and Upgrades Most Popular * What Is Computer Networking? * Introduction to Area Networks * What Is a Network Router? * What Is an Ethernet Card? * Useful Facts About How Wi-Fi Works * Internet Connection Alternatives for Home Networks * More » ...

Words: 983 - Pages: 4

Free Essay

It/240

...LAN Technologies 4/29/2014 Farooq Afzal Case 3-1 In my opinion a client/server system with an extended star topology would be the best choice for Old-Tech Corporation. I would replace the 10 Mbps Ethernet cord with an 100 Mbps Ethernet cord to ensure a faster more reliable connection. The extended star topology will allow each computer to have access to shared files and the administrator can delegate which computer has access to which information within the network. I would make sure that we when we do the upgrade the computers are all connected with wireless NIC. Case 3-2 EBiz.com should be upgraded to have a Switched Logical Topology using an extended star topology. This network should be server based with several servers, each server would have its own task. The network should have at a minimum of 250 computers and have room for upgrades of 50 or more computers. I would install more switches to accommodate each floor of the building. This would be done for each floor with the servers having a room of their own. Case 3-3 For this Case Project I would suggest that ENorm set up the system as a Server Based computer system with Mesh Topology. We could use the existing wiring closets...

Words: 253 - Pages: 2

Premium Essay

Www要求

...COMP 7680 Internet and World Wide Web Term Paper: Management of Web Server System for Robustness Hard Deadline: 6 December 2013, 11:55pm Description A company is running a web server system to support its online business. Its income primarily comes from this online business. Therefore, it is very important to ensure that the web server system is robust. For example, when there are hardware failures (e.g., disk failures) or unfavourable incidents (e.g., electricity shutdown), the web site should still be operational. Suppose you are the IT Manager in the above company. In this term paper, you describe how you would manage the computer and human resources to ensure that the above web server system is robust. Specifically, you are required to address this problem from the following perspectives: 1. Automatic monitoring (e.g., monitor the server status and alert the staff when there is any server failure) 2. Equipment redundancy 3. Data redundancy 4. Manpower redundancy 5. Other redundancy (such as electricity and Internet connection) 6. Server room configuration For each perspective, you identify the possible problems, describe how you would prevent these problems from happening, and propose the actions that you would take when these problems arise. Example: You may tackle “data redundancy” as follows:    Problem identified: When a hard disk fails, the company loses its data. When the lost data is important (e.g., business transaction data), the company suffers from significant...

Words: 805 - Pages: 4

Free Essay

Brick & Mortar, Nostalgic Record Store

...Information System Proposal May Tia Lee BIS/220 November 14, 2012 Ralph Schwehr Informational System Proposal The following proposal summary has been prepared by the Information Technology (IT) team describing a new information system required by our Advanced Services Network Consulting Engineers (NCEs). The information provided has been summarized and is intended to provide an overview of the proposed project. Executive Summary Within our organization we have a group of Network Consulting Engineers (NCEs) that provide Planning, Design, Implementation, and Operational (PDIO) services to contracted enterprise and service provider clients. On a number of recent occasions, it has come to light that one NCE is struggling with a design or planning issue that has already been addressed by another NCE. And in some cases, the solutions provided to our clients were not consistent between the NCEs. It has been determined a new system is needed that will provide an orderly and organized data repository that would be available to all NCEs. This system needs to provide an easy method for the NCEs to access and leverage previously defined design solutions. This system will provide several key benefits to the NCE team: ▪ NCE will be able to search for data related to the solution being considered ▪ NCE will save time in that we will not "reinvent the wheel" ▪ NCE provided solutions will be more standardized ▪ Using the same solution repeatedly simplifies supporting...

Words: 1688 - Pages: 7

Premium Essay

Nt1330 Unit 3 Partitioning Paper

...Pfsense firewall linux servers My responsibilities are mainly involved with networking, Linux and security. When installing a new Linux server I have to partition it to fit the needs of the application that will be running on it. Partitioning is essentially managing the hard drive space. I have to anticipate the different needs for each server. For example a ftp server would require a lot more space in the home directory, as each user would be likely storing files in their respective home folder. Partitioning is also used for security as the partitions can be mounted with their own “rules”. For example, the /temp mount point can be mounted with the noexec option. This would prevent executable files being ran in this partition. The noexec option is very important for temp as when a hacker gains control of a system they tend to have a low level account. These low level accounts typically have access to the /temp partition. This is where it is likely a hacker will download a local privilege escalation exploit to gain root privileges. This can break applications, that is why planning is very important for me when setting up new servers and applications. Then there are general rules that have to be applied for all servers. For example, creating separate large partitions specifically for logging....

Words: 699 - Pages: 3

Premium Essay

Pos 355

...communication. Their corporate headquarters's new human resource system (HRIS) will be installed by NAS Iomega network storage. Riordan's three locations will be connected to San Jose by the wide area network connection (WAN), which communicates at T1 connection speeds. The network server relays its information to the human client computers each location uses. Each location's human resources department can then have access to important information, accessed via their local client server computers. Process All of the files that the human resources department needs for their procedures will be saved to the HR system on the main server at corporate headquarters. The HRIS system will store this information on its employees via Riordan's intranet: • Employee files – includes resumes, performance reviews, and other important information. • Job descriptions – explains a job's functions and the education it requires. • Electronic job posting – lists job openings in multiple locations. • Employee handbook – employees can access the handbook electronically. • Policies and procedures – a place to find the company's policies and operating standards. • Employee file updates – Lets employees update their personal information electronically. • Recruitment – Is a way to hire qualified people for a job. This data flow illustrates the way that HR can use the system to hire new employees. On-site recruiters will conduct most of this process...

Words: 435 - Pages: 2