Overview of Typical Windows Server Roles
Overview of Typical Windows Server Roles
Overview of Typical Windows Server Roles
Prerequisites: no prerequisites.
Key terms: network, server, proxy, services, web, segment, firewall, internet, applications,
gateway, router
Active Directory (AD) is a database that stores information about network users, computers
and printers. It helps administrators to mange all those resources, and it is required for
Exchange Server implementation and Domain Group Policy. We should differentiate Active
Directory Domain Services (ADDS) and Active Directory Certificate Services (ADCS). We
can use ADCS to create manage public key certificates. Administrators can use ADCS to
bind the identity of a person, device or service to a specific private key.
DNS is used to map IP addresses to logical names. With Server 2008 we also have support
for IPv6 addresses. DHCP (Dynamic Host Configuration Protocol) service can be used to
provide IP configuration information for hosts on our network including local IP address,
default gateway, DNS server, etc. Print services allows us to manage printers on servers and
to publish printers in Active Directory.
With File Services we can manage network file sharing. We can use Distributed File
Service to store copies of shared folders on multiple servers. We can also manage quotas for
users by using File Server Resource Manager (FSRM). We can also provide access to files
by using NFS protocol which is often used on Linux machines.
Starting from Windows Server 2008 version, we also have Windows SharePoint services,
Network Access Protection, improved Terminal Services, and Windows Deployment
Services (WDS). Windows Sharepoint provides collaboration tools. Network Access
Protection can be used to restrict access on our network for certain computers which are not
compliant with our security policies. Terminal Services can be used to access server
desktop over network or to run applications on terminal server. Windows Deployment
Service can be used to deploy and install various Windows operating systems over
network.
Not all roles are supported on all versions of Windows Server OS. For example, when it
comes to Windows Server 2008, AD FS is only supported in DataCenter or Enterprise
editions of Windows Server 2008.
Applications Server
When the server is configured as application server, the server will provide certain network
applications that can be accessed by users. For example, the server can have a database
software installed that the users on the network can use to store or query data. When we talk
about the client/server model, database servers can be programs that provide database
services or they can be computers that are dedicated to running database programs.
Another example of applications on our server would be web-based applications. Web
applications are not static web pages. Web application can be any web site that provides
dynamic data or services to users. For example, web applications are web calendars, online
spreadsheets, chat rooms, online CRM software, etc. There are different technologies which
can be used to write web applications, but some of the most popular ones are PHP and
ASP.NET.
Roles that we mentioned up to now are designed to provide services to users. However,
there other roles which are related to network infrastructure. Those roles are the Gateway or
Router, Bridge, Firewall or Proxy.
Gateway or Router
Technically, gateway and router are two different things. However, often the Gateway and
Router are sometimes used interchangeably. That's because we often implement a Gateway
when we implement a Router and vice versa. Gateways and Routers are similar in that they
connect two distinct logical networks. To set the server to function as Gateway or Router,
the server has to have two (or more) network interfaces installed. One network interface is
connected to one network segment and the second interface is connected to another network
segment. This alone will not make our server to route packets between those two network
segments. We also have to have routing software installed. Operating systems like
Windows, Linux and NetWare have this software. Hosts on different network segments will
have different logical addresses (IPs) assigned. Our server (now router) will use IP
addresses to route packets from one segment to another. If host on one network segment
needs to send some data to a host on another network segment, it will first send data to a
Default gateway. Default gateway will know on which network segment the destination
host resides, so it will route data to that network segment. We can actually configure
multiple routers to cover many different networks. That's how the Internet actually works.
Bridge
This role is not used often any more, but it was common in the old days. As we said, with
Router we connect two different logical network segments. Now, with Bridge we connect to
different physical network segments. With Bridge, those two physical networks are still one
logical network segment. Bridge uses MAC (physical) addresses to isolate traffic from one
physical network segment from another. So, the Bridge memorizes which host is on which
physical network segment using the Mac address.
Firewall
Firewall role is often implemented on servers. The Firewall separates our internal computer
network from the public network, which is usually the Internet. We want to allow some
traffic from the Internet, but we also want to block some traffic from the Internet. Most
operating systems have firewall software in them, like Linux and Windows. By using
Firewall we can configure set of rules in which we define what and which type of network
traffic is allowed to enter (or exit) our private network and which is not allowed. So, we can
configure inbound and outbound rules. All traffic going between our local network inside
and the public network outside has to go through the Firewall. The Firewall analyzes all that
trafficking and based on the defined rules, decides to allow or deny specific traffic.
Proxy
Most operating systems also have a proxy feature which can be enabled. With proxy server
we separate and hide our private network from the Internet, and we also have a degree of
control which resources on the Internet are being accessed. A server running as a firewall
can also run as a proxy or a separate proxy server can be set up. All hosts on the network
are connected to our proxy server. If some host on our private network wants to go the
Internet, it has to go trough our proxy server. The proxy server takes a look at all requests
and decides to allow or deny the request based on the configured rules. If the request is
allowed, the servers send it out on the Internet and retrieve the resource requested (or its
gets it from its cache). Then it forwards the results back to the original workstation. When
we use a proxy server the address of the proxy server is the only address available to the
public network.
Common Features
As we mentioned earlier, we can also use many features to improve services on our server
machine. For example, we can use BitLocker. We can also set up Remote Assistance
service, SMTP, Telnet server or Telnet client feature. We also have Failover Clustering,
Network Load Balancing (NLB), WINS, Windows Backup and Powershell, Windows
Backup and Powershell.
BitLocker is used to encrypt the entire hard disk on the server and in that way protect data
on it. Remote Assistance is used to offer assistance to users on their computers and to
correct problems over network. Simple Mail Transfer Protocol (SMTP) is used to transfer e-
mail between systems and clients. For example, we can add SMTP feature to add e-mail
support to IIS. With Telnet feature we can use a command line to manage remote servers.
Telnet Server allows us to accept incoming connections, while Telnet Client allows us to
initiate connections. Failover Clustering is used to increase the fault tolerance of network
servers by sharing storage resources. In that way if one server fails, the available server will
respond to the requests. Network Load Balancing feature is used to disperse workload
between multiple servers to optimize performance and response time. This also provides
fault tolerance. WINS server is used to map NetBIOS names and IP addresses. WINS
database is used to resolve NetBIOS names. It is only used if we need to support legacy
clients which can't use DNS for name resolution (DNS replaced WINS). Windows Server
Backup can be used to backup and recover content from Windows Server machine.
Powershell is a command line scripting program which can be used to manage Windows
Server.
Source : http://www.utilizewindows.com/server/basics/354-overview-of-typical-
windows-server-roles