Install and manage a Server

ICTNWK401 Install and manage a Server

Written Part

Table of Contents

AssignmentTutorOnline

Written Part 1

Features of Network Operating Systems 3

Linux OS/2 3

Novell Netware 4

Unix Ware 6

MS Windows NT 6

MS Windows Server 2000/ Net 8

MS Exchange Server 2010 8

Features of Application Included in These Servers 9

1. Red Hat Enterprise Server 9

2. Linux Terminal Services 10

3. Novell GroupWise for messaging 11

4. Apache for Web services 12

5. Microsoft Internet Security and Acceleration (ISA Server) 13

6. MS SQL Server 14

7. Novell Directory Services 15

8. HP Open View 16

9. PeopleSoft Business application 17

10. MS Terminal Server 18

 Terminal Services Architecture 18

 Bridging Technology, Application Deployment, Remote Administration 18

Terminal Services client software is available for different client hardware devices, including PCs, Windows-based terminals, and even non-Windows-based devices such as a Macintosh or UNIX workstation. (Non-Windows-based platforms require additional third party software such as Citrix MetaFrame.) 18

 Ease of Use 18

 Manageability 19

 Security 19

What are the main functions of a Server OS? 19

How do Server OS handle resource allocation and security of access? 21

Features of Network Operating Systems

Linux OS/2

  • Portable(Multiplatform)
  • Multitasking
  • Multi User
  • Multiprocessor (SMP) Support
  • Multithreading Support
  • Virtual Memory
  • Hierarchical File System
  • Graphical User Interface (X Window System, Wayland)
  • Wide Hardware Support
  • Dynamically Linked Shared Libraries as well as Static Libraries
  • POSIX Compliant (Almost)
  • Multiple Virtual Consoles
  • Multiple File system Support
  • Multiple Networking Protocols (TCP/IP, IPX/SPX, AppleTalk, AX.25)
  • Shell
  • Strong Security Model
  • Open Source

It’s free. Means you don’t have to pay anything to get a decent operating system that is safer than Windows.

Most of the applications and programs that run on Linux are free, so no need to pay anything.

It’s open source. Meaning the source code for the operating systems, and most of the applications that run on it, is available for free so that you can modify it to your needs.

There are not many malwares that are aimed at compromising a Linux system and so you statistically don’t need an anti-virus.

If you’re not shy to use a terminal, you can learn a lot about the internals of the system.

[REF: https://www.tutorialspoint.com/operating_system/os_linux.htm]

Novell Netware

  • Secure Login

Security extensions enable secure FTP clients that support SSL and TLS mechanism to establish secure connections with NetWare FTP server.

  • Multiple instances of NetWare FTP Server software

Multiple instances of NetWare FTP Server software can be loaded on the same NetWare server, providing different FTP services to different sets of users.

  • FTP access restrictions

FTP access can be restricted at various levels through various types of access rights.

  • Intruder detection

An intruder host or user who tries to log in using an invalid password can be detected and restricted.

  • Remote server access

FTP users can navigate and access files from other NetWare eDirectory servers in the same eDirectory tree whether or not the remote servers are running NetWare FTP Server software.

  • Anonymous user access

An Anonymous user account can be set up to provide users with basic access to public files. Creating several anonymous user accounts with separate rights and contexts is now supported.

  • Firewall support

When the FTP client is behind a firewall and the NetWare FTP Server cannot connect to the FTP client, NetWare FTP Server software supports passive mode data transfer and the configuration of a range of passive data ports.

  • Active Sessions display

You can view details of all the active FTP instances at a particular time, such as a list of all instances, details of each instance, all sessions in an instance, and all details of each session.

  • Name space support

NetWare FTP Server software can operate in both DOS and long name spaces. The FTP user can dynamically change the default name space by using one of the SITE commands.

  • Simple Network Management Protocol error reporting service

Simple Network Management Protocol (SNMP) traps are issued when an FTP login request comes from an intruder host or from a node address restricted through Novell eDirectory. The traps can be viewed on the management console.

  • Welcome banner and message file support

NetWare FTP Server displays a welcome banner when an FTP client establishes a connection, and also displays a message file when a user changes the directory in which the file exists.

  • Web-based Administration

You can configure the NetWare FTP Server by using the iManager management utility. Through iManager, you can now run multiple instances of FTP on a server when separate IP addresses or ports are available.

  • Cluster-enabled

The NetWare FTP Server can be cluster-enabled for high availability and load balancing.

[REF:http://web4.uwindsor.ca/units/its/insight/insight.nsf/babe0ebac149fc7b852567d700715d2a/88000da7157faebf85256c960061cd36!OpenDocument]

Unix Ware

Some key features of the Unix architecture concept are:

  • Unix systems use a centralized operating system kernel which manages system and process activities.
  • All non-kernel software is organized into separate, kernel-managed processes.
  • Unix systems are preemptively multitasking: multiple processes can run at the same time, or within small time slices and nearly at the same time, and any process can be interrupted and moved out of execution by the kernel. This is known as thread management.
  • Files are stored on disk in a hierarchical file system, with a single top location throughout the system (root, or “/”), with both files and directories, subdirectories, sub-subdirectories, and so on below it.
  • With few exceptions, devices and some types of communications between processes are managed and visible as files or pseudo-files within the file system hierarchy. This is known as everything is a file. However, Linus Torvalds states that this is inaccurate and may be better rephrased as “everything is a stream of bytes”.

The UNIX operating system supports the following features and capabilities:

  • Multitasking and multiuser
  • Programming interface
  • Use of files as abstractions of devices and other objects
  • Built-in networking (TCP/IP is standard)
  • Persistent system service processes called “daemons” and managed by init or inet

[Ref:https://en.wikipedia.org/wiki/Unix_architecture]

MS Windows NT

  • Interface
  1. Contains the Windows 95 interface and features like the Start button, Taskbar, Explorer, Network Neighborhood, and Briefcase
  • Networking
  1. NetWare client and login script support
  2. Enhanced meta-file (EMF) spooling for improved network printing speed
  3. Support for 15 network protocols
  • Messaging Capabilities
  1. Windows Messaging Subsystem
  2. Microsoft Exchange and Microsoft Schedule+ included
  3. WINCHAT, NET MESSAGE, or NetDDET
  • Remote Management
  1. Remote management utilities such as Event Viewer, Performance Monitor, Service Controller, and Registry Editor
  2. Dial-out capability to remote servers
  3. Remote dial-in capability
  • Remote Access Services (RAS)
  1. Internet access to Windows NT Server and DNS names for resource connections
  2. Dial-out capability to remote servers, including Internet services
  3. Remote dial-in ability to any workstation
  4. Dial-in capability to remote NetWare servers using RAS
  5. Multi-link capability for channel aggregation of multiple modem connections
  • Security
  1. Per-file and per-directory security with the NT file system (NTFS)
  2. Local desktop security; user ID and password required for access
  3. Account lockout capabilities to prevent unlimited login attempts
  4. Network security with single network login using challenge/response protocol
  5. Government C-2 level certifiable security
  • Application Support
  1. Native support for all applications based on Windows 95, Win32, 16-bit Windows, 16-bit MS-DOS, 16-bitOS/2, and POSIX 1003.1
  2. Separate memory spaces for 16-bit applications (multiple virtual MS-DOS machines)
  3. OLE support between all 16-bit and 32-bit Windows based applications
  • Graphics and Multimedia
  1. Significant performance gains for graphic intensive applications
  2. OpenGL APIs for high-performance three-dimensional color graphics
  3. 16-bit and 32-bit API support for the Video for Windows 1.1 feature set
  • Utilities
  1. File compression with NTFS
  2. User Manager for configuration and security
  3. Disk Administrator for graphical disk configuration
  4. Diagnostics utility that details basic system information
  5. Tape backup
  • Hardware Support
  1. Multiple hardware configuration; you can specify a hardware profile at start time, including services, devices, and video resolutions
  2. Intel, Alpha AXP, MIPS, and PowerPC platforms
  3. Symmetric multiprocessing (SMP) support

[Ref:https://kb.iu.edu/d/abno]

MS Windows Server 2000/ Net

  • Active Directory

Microsoft included Active Directory feature for the first time in Windows 2000 Server. Active Directory is used to store information about resources, users, or a group and its attributes.

  • Distributed File System

Windows 2000 server operating system brought Distributed File System (DFS) feature which enables users to distribute files across multiple servers over the network.

  • NTFS 3.0 File system

Windows 2000 Server introduced new version of NTFS file system i.e. NTFS 3.0 with new features such as file-system-level encryption, disk quotas, sparse files and reparse points.

  • Virtual Private Network

This operating system provides virtual private network feature that allows you to make your computer a remote server and enables other users to connect to the server via VPN. With this feature, users can access shared files that reside on your system or on the network.

[Ref:https://www.windowsdatarecoverysoftware.com/win2000-server/]

MS Exchange Server 2010

An Exchange 2010 server is installed only with the roles you choose (with some limitations that I’ll go into shortly) instead of being installed with the entire Exchange Server 2010 product.

This approach means that Exchange 2010 servers are easier to configure, easier to secure, easier to maintain, and easier to size for hardware.

The server roles in Exchange Server 2010 are:

  • Mailbox Server – hosts the mailbox and public folder databases
  • Client Access Server – provides connectivity for clients (eg Outlook, Outlook Web App, ActiveSync) to mailboxes
  • Hub Transport Server – responsible for all mail flow in the organization
  • Edge Transport Server – a special transport server intended for installation in DMZ networks to provide secure inbound/outbound email flow for the organization
  • Unified Messaging Server – provides voice mail and other telephony integration with Exchange

Exchange 2010 servers can be configured with multiple server roles.

  • Small environments often install a “Typical” Exchange 2010 server running the Mailbox, Client Access, and Hub Transport roles
  • Large organizations tend to separate servers into dedicated roles so they can scale appropriately
  • Unified Messaging is not all that common in my experience so far but will co-exist with the Mailbox, Hub Transport, or Client Access role

[Ref:https://practical365.com/exchange-server/exchange-2010-server-roles/]

Features of Application Included in These Servers

1. Red Hat Enterprise Server

  • Freedom through stability: 

Business applications require a tested, proven, predictable platform. Red Hat Enterprise Linux frees you to deliver meaningful business results by providing exceptional reliability and military-grade security.

  • An ecosystem of solutions and support: 

With a Red Hat Enterprise Linux subscription, you are connected to the industry’s largest ecosystem of partners, customers and experts that support and accelerate your success.

  • Confidence through flexibility: 

Red Hat Enterprise Linux gives you the flexibility to tailor your infrastructure for business needs now and in the future. As markets shift and technologies evolve, you’ll have the agility, adaptability and performance to succeed.

  • Security: 

Red Hat Enterprise Linux delivers military-grade security technologies to prevent intrusions and protect your data. From network firewall control to secure containers for application isolation, Red Hat Enterprise Linux is one of the most secure operating systems available.

  • Performance

Red Hat Enterprise Linux is ready to run your toughest workloads right out of the box and a set of performance-optimized profiles and tuning utilities help you to tailor and align system behavior for your particular workloads.

  • Administration:

 System deployment and management – Red Hat Enterprise Linux gives system administrators a powerful framework to simplify both deployment processes and system configuration.

  • Interoperability:

 Red Hat Enterprise Linux is compatible with heterogeneous systems, including UNIX and Microsoft Windows Server.

[Ref:http://www.qbssoftware.com/products/Red_Hat_Enterprise_Linux/features/_prodREDHATAD]

2. Linux Terminal Services

Linux Terminal Server Project (LTSP) is a free and open source terminal server for Linux that allows many people to simultaneously use the same computer. Applications run on the server with a terminal known as a thin client (also known as an X Terminal) handling input and output. Generally, terminals are low-powered, lack a hard disk and are quieter and more reliable than desktop computers because they do not have any moving parts.

This technology is becoming popular in schools as it allows the school to provide pupils access to computers without purchasing or upgrading expensive desktop machines. Improving access to computers becomes less costly as thin client machines can be older computers that are no longer suitable for running a full desktop OS. Even a relatively slow CPU with as little as 128 MB of RAM can deliver excellent performance as a thin client. In addition, the use of centralized computing resources means that more performance can be gained for less money through upgrades to a single server rather than across a fleet of computers.

In LTSP-cluster high-availability and high-performance thin-clients are specified through the optional use of redundant components. Services that can be load-balanced and made highly available are:

  • DHCP server
  • TFTP server
  • Boot servers (root file system for the thin clients)
  • Application servers
  • Control center (PostgreSQL database + web frontend)

[Ref:https://www.digitalocean.com/community/tutorials/an-introduction-to-the-linux-terminal]

3. Novell GroupWise for messaging

  • Social threading

GroupWise takes a new approach to your in-box with social threading. This will help reduce the clutter when you get multiple responses to any email.

  • Home view

GroupWise gives you a Home View—a personal productivity dashboard that consolidates the tools and web applications you interact with most for any given aspect of your work.

  • Scheduling

View and manage your appointments, tasks, and reminder notes in a Calendar view..

  • Task management

Stay on top of critical action items by creating tasks for yourself—or for anyone else you rely on for completion of a project.

  • Easier attachments

Email can quickly be bogged down with attachments, especially when the same version of a file gets stored again and again.

  • Contact management

GroupWise gives you easy access to key information for all of the contacts, groups, resources, and organizations you interact with.

  • Secure instant messaging

Communicate in real time with other GroupWise users through Messenger. Messenger allows employees to collaborate wherever they are, regardless of workstation or device.

  • Mobile access

Mobility is the holy grail of personal productivity, so GroupWise offers a full set of options to stay connected whenever you’re on the move.

  • Administrative features

Some of the most ardent GroupWise supporters are those who administer it.

  • Cloud email

Get all the benefits of GroupWise in the cloud either by hosting it with a partner or by upgrading to Enterprise Messaging and getting it directly through Micro Focus or through a hosting partner.

  • Dynamic flexibility

What good is power without flexibility? GroupWise gives end users a flexible, dynamic interface that works the way they want to work—and the freedom to make (or change) decisions at will.

[Ref:https://www.microfocus.com/en-us/products/groupwise/features/ ]

4. Apache for Web services

The Apache HTTP server is an open source Web server application developed by the Apache Software Foundation. The server software is freely distributed, and the open source license means users can edit the underlying code to tweak performance and contribute to the future development of the program.

Although Apache will run on pretty much any operating system, it is frequently used in combination with the Linux operating system, which is also open source. These two combined with MySQL and PHP database and scripting language comprise the popular LAMP Web server solution.

The main advantages of Apache and LAMP server systems are:

  • Lower costs, since there are no software licensing fees
  • Programming flexibility due to the open source
  • Enhanced security. Since Apache was developed for a non-Microsoft operating system, and the majority of malicious programs have traditionally been written to take advantage of vulnerabilities in Windows, Apache has always enjoyed a reputation as a more secure option than Microsoft’s IIS.

[Ref: https://hostway.com/blog/which-web-server-iis-vs-apache/]

5. Microsoft Internet Security and Acceleration (ISA Server)

  • New firewall features

In addition to supporting packet-, circuit-, and application-level traffic filtering, ISA Server supports stateful packet inspection (i.e., the ability to examine data passing through the firewall based on its protocol and the connection’s status). I

  • Policy-based administration

ISA Server lets administrators define policy elements such as users and groups, client protocols, schedules, sites, and content groups, then use those elements to manage various settings through ISA Server policies (e.g., client protocol access policies, site access policies, bandwidth usage policies).

  • RRAS and VPN integration 

Unlike Proxy Server’s RAS and Routing and Remote Access Service (RRAS) integration under NT 4.0, the process of establishing a Virtual Private Network (VPN) through ISA Server or to a remote RRAS VPN server is a breeze.

  • Smart caching

 ISA Server offers active caching features so administrators can proactively cache content from popular Web sites. Administrators can schedule cache updates to run automatically at specific times during the day.

  • Smart application filters

 Using smart application filters, you can control traffic through ISA Server on an application-specific level.

  • Dynamic IP filtering

 Many firewall products can reduce the management burden of administrators by dynamically opening firewall ports for active client sessions to the Internet and closing them after the session terminates.

  • Scalability

 In large organizations, scalability is an important feature of a Web caching server because performance can deteriorate when a server caches a lot of data. I

  • Bandwidth usage rules

By utilizing Win2K’s bandwidth control and Quality of Service (QoS) features, ISA Server lets you configure rules that define the amount of bandwidth various protocols and traffic types can consume as they pass through an ISA Server between the Internet and the local network.

  • Enhanced reporting

ISA Server lets you run extensive reports on user access and security events. You can schedule ISA Server to automatically run the reports and deliver them to you at specified intervals (e.g., daily, weekly, monthly).

[Ref : https://www.itprotoday.com/security/features-benefits-isa-server]

6. MS SQL Server

  • #1 in price and performance—with massive scale

SQL Server consistently leads in the TPC-E OLTP workload, the TPC-H data warehousing workload, and real-world application performance benchmarks. Get record-breaking performance now on Windows and Linux.

  • Highest performing data warehouses

Get support for small data marts to large enterprise data warehouses while reducing storage needs with enhanced data compression.

  • Security and compliance

Protect data at rest and in motion with a database that has the least vulnerabilities of any major platform for six years running in the NIST vulnerabilities database (National Institute of Standards and Technology, National Vulnerability Database, Jan 17, 2017).

  • High availability and disaster recovery

Gain mission-critical uptime, fast failover, easy setup, and load balancing of readable secondaries with enhanced Always On in SQL Server 2017—a unified solution for high availability and disaster recovery on Linux and Windows.

  • Corporate business intelligence

Scale your business intelligence (BI) models, enrich your data, and ensure quality and accuracy with a complete BI solution.

  • End-to-end mobile BI on any device

Gain insights and transform your business with modern, paginated reports and rich visualizations.

  • Simplify data big and small

Combine relational data and big data with PolyBase technology that queries Hadoop using simple T-SQL commands.

  • In-database advanced analytics

Build intelligent applications with SQL Server Machine Learning Services using R and Python. Move beyond reactive and into predictive and prescriptive analytics by performing advanced analytics directly within the database.

  • Now on Windows, Linux and Docker

Develop once and deploy anywhere with our consistent experience from on-premises to cloud.

  • Consistent data platform from on-premises to cloud

Get a consistent experience from on-premises to the cloud—letting you build and deploy hybrid solutions for managing your data investments.

  • Easy-to-use tools and connectors

Use the skills you already have, along with familiar tools like Azure Active Directory and SQL Server Management Studio, to manage your database infrastructure across on-premises SQL Server and Microsoft Azure.

[Ref: https://www.microsoft.com/en-us/sql-server/sql-server-2017-features]

7. Novell Directory Services

Novell Directory Services provides the following features that make it an advanced global, distributed, replicated, and partitioned directory service:

  • Schema.
  • Naming.
  • Entry Management.
  • Relationship Management.
  • NDS personalities.
  • Local event services.
  • Authentication.
  • Authorization.

Novell Directory Services (NDS) is a popular software product for managing access to computer resources and keeping track of the users of a network, such as a company’s intranet, from a single point of administration. Using NDS, a network administrator can set up and control a database of users and manage them using a directory with an easy-to-use graphical user interface (GUI). Users of computers at remote locations can be added, updated, and managed centrally. Applications can be distributed electronically and maintained centrally.Lucent Technologies plans to integrate NDS into its own QIP product, which automatically maintains directory information about network Internet Protocol (IP) domain name and IP address and Dynamic Host Configuration Protocol (DHCP) information. Administrators will be able to set up primary and secondary directories and automate immediate switchover to the backup directory in the event of a server failure.

[Ref:https://searchnetworking.techtarget.com/definition/Novell-Directory-Services]

8. HP Open View

Features for monitoring, notifying and analyzing:

  • It provides network views in an intuitive graphical format.
  • It discovers network devices and provides a map to illustrate the structure of the network and the status of devices and segments.
  • Other capabilities help network administrators prevent problems by identifying potential trouble spots before a failure occurs.
  • Administrators are able to manage the network more intelligently, leading to increased network up-time and lower costs.
  • Event correlation technology — Pinpoints the cause of network problems by letting the administrator drill down to see all events that contributed to an alarm.
  • Scalability — Windows® NT® and UNIX® collection stations can be distributed throughout the environment so that data can be collected locally and forwarded to one or more management stations.
  • Web text and sms messaging (intranet and Internet)
  • Email notification and email text messaging
  • Can run as a system service
  • Log of message transmissions
  • Transmission to single or mutiple mobile phones or devices
  • Supports multiple modems and/or direct connection to the telecom terminal

[Ref:https://www.notepage.net/hpopenview/features_benefits.htm]

9. PeopleSoft Business application

Global Core Human Capital Management

  • Global by design
  • A variety of specialized benefit solutions
  • Global payroll architecture

Workforce Management

  • Managerial time reporting
  • Automated leave planning
  • Optimized workforce scheduling

Labor Rules and Monitoring

  • Use labor policy rules leveraging the natural language capability provided by Oracle Policy Automation
  • Real-time analysis and exception alerts of overtime, unplanned absences, and other critical labor data

Workforce Service Delivery

  • End-to-end delivery of HR service to employees
  • Integrated HR self-service tools
  • Centralized, global store of employee data

Talent Management

  • Global Manager Desktop for compensation administration
  • Track and monitor performance, learning, and development
  • Integrated solution for succession planning
  • World-class recruiting and career search tools for candidates, recruiters, and managers

[Ref: https://reviews.financesonline.com/p/peoplesoft/]

10. MS Terminal Server

  • Terminal Services Architecture

Terminal Services extends the model of distributed computing by allowing PCs to operate in a server-based computing environment. With Terminal Services running on a Windows 2000-based server, all client application execution, data processing, and data storage occur on the server. Applications and user desktops are transmitted over the network and displayed via terminal emulation software.

  • Bridging Technology, Application Deployment, Remote Administration

Terminal Services client software is available for different client hardware devices, including PCs, Windows-based terminals, and even non-Windows-based devices such as a Macintosh or UNIX workstation. (Non-Windows-based platforms require additional third party software such as Citrix MetaFrame.)

  • Ease of Use
Feature Description
Automated Local Printer Support Windows 2000 Server Terminal Services can add and automatically reconnect printers attached to Terminal Services clients.
Clipboard Redirection This feature lets users cut and paste between applications running on the local machine and those running on the Terminal Server.
Performance Enhancements Many improvements to caching, including persistent caching, packet utilization, frame size, and other enhancements,
Roaming Disconnect Support This feature lets users disconnect from a session without logging off. Users can let a session remain active while disconnected and then reconnect to the existing session from another machine or at a later time. Th
Multiple Logon Support This feature lets a user have multiple simultaneous logon sessions from one or more desktops.
  • Manageability
Feature Description
Remote Administration mode Remote administration mode allows Terminal Services to be enabled on any computer running Windows 2000 Server for graphical remote administration.
Remote Control This feature lets helpdesk staff view or control another Terminal Services session. Keyboard input, mouse movements, and display graphics are shared between two Terminal
Integration with Windows 2000 Server Features Terminal Services supports and extends all Windows 2000 Server features, such as Active DirectoryTM services and the Microsoft Management Console.
  • Security
Feature Description
RDP Encryption The built-in RDP encryption feature lets administrators encrypt all or some of the RDP data transmitted between the Windows 2000 Server and Terminal Services Clients (including all Windows-based Terminals) at three different levels (low, medium, or high), depending on security needs.
Limit Logon Attempts and Connection Time Administrators can limit the number of user logon attempts to prevent hackers from attacking a server.
Manage User Security Administrators can set up security restrictions for individual users or an entire server. This includes limiting the ability to redirect to local devices.

[Ref: https://www.advanced-concepts.com/Products/terminal_services.htm]

What are the main functions of a Server OS?

File and printer sharing: File sharing involves setting up a common storage point for a company’s documents – a network drive, as it were. Print sharing allows multiple computers to use a single printer. Windows 95, 98 and ME do have file and print sharing, but are not recommended for use as server OSes.

Application services (including databases): a server OS’s ability to run the applications you need is obviously crucial. Servers function as crucial database stores and shared environments for collaborative applications (such as networked MYOB or Quicken).

Web site services: A hypertext transfer protocol (HTTP) server is included with many server OSes, either via an integrated application, or other HTTP applications such as the Apache open source server. Some OSes also come with more advanced features, such as database integration (so you can dynamically build Web pages based on information in a database), personalization and scripting.

E-mail, groupware and messaging: A central e-mail server allows you to forward and receive e-mails to and from your business, as well as control individual e-mail accounts based on a domain. Groupware applications, such as Lotus Notes, Microsoft Exchange or Novell GroupWise, provide email as well as much more sophisticated collaboration.

Terminal services: Allow a client to run a productivity application on a server, while seeing the visual results of the application on their screen. For instance, a client (‘terminal’) could be running Microsoft Word on the server from their desktop. The server does all the processing work, and just transmits the graphical changes to the terminal, while taking the user’s input (mouse movements and key strokes) and sending them to the server.

Caching: Speeding up network access (usually Internet access) by storing previously downloaded files in a cache – kind of like the way an Internet browser keeps a cache of the Web pages you have visited so it doesn’t have to download the files all over again.

Multiple Accessibility: Server can connect multiple network at a same time. Sometimes – a typical server OS can handle two of more of these tasks for a small number of clients. When a large number of clients are added, or the applications called for use a lot of processing power, you may need to add more servers and diversify their functions.

Administration – what tools are available and how easy are they to use.

Security: perhaps the most important feature, and the hardest to judge and get right. In general, the more tasks a server performs, the more potential holes hackers have to get in.

Features – does it have the specific services you want built in (does it have an HTTP server for your planned Intranet, for instance, or an FTP server for remote file access)?

Performance – is the server OS, and the hardware platform it runs on, fast enough for your needs. Simple applications like file and print sharing do not require a fast PC – a Pentium-based server with a large hard disk does the trick – while Terminal services or high-volume database servers frequently require very powerful server hardware.

Scalability – how many clients can reasonably access this system, and how far can the OS scale in the future (to new hardware or more processors, for instance) if needed.

TCO – how much the ancillary costs of the operating system are – in terms of productivity, administration and downtime.

[Ref : https://www.pcworld.idg.com.au/article/151491/server_operating_systems/ ]

How do Server OS handle resource allocation and security of access?

In computing, resource allocation is necessary for any application to be run on the system. When the user opens any program this will be counted as a process, and therefore requires the computer to allocate certain resources for it to be able to run. Such resources could have access to a section of the computer’s memory, data in a device interface buffer, one or more files, or the required amount of processing power.

A computer with a single processor can only perform one process at a time, regardless of the amount of programs loaded by the user (or initiated on start-up). Computers using single processors appear to be running multiple programs at once because the processor quickly alternates between programs, processing what is needed in very small amounts of time. This process is known as multitasking or time slicing. The time allocation is automatic, however higher or lower priority may be given to certain processes, essentially giving high priority programs more/bigger slices of the processor’s time.

On a computer with multiple processors different processes can be allocated to different processors so that the computer can truly multitask. Some programs, such as Adobe Photoshop and YafRay, which can require intense processing power, have been coded so that they are able to run on more than one processor at once, thus running more quickly and efficiently. Same goes with server os.

Permissions

Permission settings determine what a User or User Group can do on items for which they have rights within an organizational item:

  • Read—the user or group can view items
  • Write—the user or group can create or edit items
  • Delete—the user or group can delete items
  • Localize—the user or group can create local copies of shared BluePrint items

Privileges

Privileges are granted to one or more Groups to allow a User of one or more of those Groups to manage parts of the system that are not inside a Publication.

Setting User and Group rights

You can assign rights to individual Users or to User Groups. It is recommended to add Users to User Groups and assign collective rights and permissions for users in these groups.

Setting permissions determine what actions users and groups can perform on the contents of a Folder, Structure Group or Category for those Content Manager items for which they have the necessary rights.

Setting publishing rights and permissions To publish items, a User or User Group needs permissions to publish to one or more Target Types and have Publish to Content Distributor rights for the Publication.

List of Privileges You can grant a Group a number of Privileges, so that every member of that Group can perform the operation system-wide.

Granting a Group the privilege to create Sites By default, only users with System Administration Privilege can use the Site Wizard to create Sites.

Rights and system privileges for Content Manager items Users and User Groups require you to assign them rights (Publication-specific) and/or system privileges (system-wide) so that they can work on Content Manager items.

[Ref: https://www.revolvy.com/page/Resource-allocation-%28computer%29\]