helllllllllllllllllllllp meeeeeeeeeeeeeeeeee please

Posted on 2001-06-09
Last Modified: 2010-04-11

i would be very happy and greatfull if  anyone give me the answer to these question in details or the links of the web pages that may have the answer.....

1- what are the specification of the minimum hardware and software required to
deploy any email system and why?

2-what is a proxy server and why do we use a proxy server on the network?

Question by:ranma51
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 79

Expert Comment

ID: 6171931
Even though this sounds suspiciously like homework, and we don't want to do your homework for you, this link will explain Microsoft's Proxy server. The concept is the same for any proxy server, just implementation is different.

As far as the email system, the field is so varied with high-end to low-end systems that it just all depends on:
- how many users
- what else you want it do do except email
- security requirements
- what client software you want to use

Minimum hardware is an old 386 with 32Mb Ram and Linux (free)software. Sendmail and POP3 email are basic parts of a basic Linux install, and it runs just fine on any old 386/486 PC that you can get pretty cheap..

Accepted Solution

dbusher earned 200 total points
ID: 6172418
  1. They server requirements for a mail server can be defined as a minimum requirement and a suggested requirement. A min req is just enought machine to install the mail sw and probably allow several users to run on it. A suggested req. is what is real world. Using MS mail products and IBM Lotus Notes as an example I will give you a suggested config:
-Pentium class cpu ( 500mghz or more).
-256 MB RAM
-RAID 1 disk storage of a LEAST 1 gig. ( RAID 1 being mirrored drives).
-CD ROM and floppy
-NIC (Network Card) @ 10/100 base
-Backup Exec Pro (tape backup system).
   2. Proxy servers go hand in hand with Firewalls. They are usually dedicated servers that run Proxy software (Microsoft makes a Proxy product). A Proxy server will usually be 'multi-homed' meaning having 2 NICs. One NIC will have an IP for the customer LAN the other NIC will be an IP (non-private) that is exposed to the outside world (Internet).  The proxy server acts as a 'guard', checking each data packet that goes in and out. Usually you will include a proxy server on your firewall.  A proxy server will tell where the users are going on the intra/extra and internet.  Its a sort of like a tracking system and helps the network engineer to deside if certain URLs or PORTs need to be blocked for LAN protection.

Hope this helps.  Let me know if you need more info as these two topics can be expounded on greatly.  

Expert Comment

ID: 6172421
The email server where I work is a Dual Zeon 550 with 2 GB of memory and 12 10K RPM disks. What Lmoore wrote about the email is completely correct. There is no way to answer how much hardware you need without knowing at the very least what email program you are using. Besides just basic email, programs like Microsoft Exchange provude calendar, task lists and etc... and allow multiple people to collaborate on any one of those things. In addition, you'll find that many companies use some sort of integrated messaging system to provide Fax and voicemail services as part of their email program.

Why Off-Site Backups Are The Only Way To Go

You are probably backing up your data—but how and where? Ransomware is on the rise and there are variants that specifically target backups. Read on to discover why off-site is the way to go.


Expert Comment

ID: 6172466
   jjeff1 has a good point. It is hard to tell you EXACTLY what type of hardware you should run without more info. But assuming you are sticking with INTEL based systems (not RISC), then I can tell you that when I worked at IKON Office Solutions as thier net eng. we used a single Compaq Proliant with the exact specs as I gave in my prior post. It worked fine for a local company of just under 400 users.
If you were to add fax, voicemail etc.. options I would NOT recommend adding to a mail server.  I would get seperate servers to run that sw.  That would be a bad practice.
LVL 12

Expert Comment

ID: 6176010
> what are the specification of the minimum hardware and software required to deploy any email system and why?

I used to have an IBM PS/2 system with a 286 processor,
running at 10Mhz, with 2Mb of RAM and a 20MB (not 20GB) hard-drive,
and I could run an E-mail client on that system,
and read my E-mail.

Is that "minimal" enough?  :-)

Of course, the "mail-server" was larger.
I'll leave the specifications for that as an exercise for the reader.  :-)

We use a proxy-server to monitor the managers who try to web-surf to pr0n sites using company resources on company time.   :-)

Expert Comment

ID: 6178314
ranma51, Have any of the comments above answer your questions?  Can we help further?

Expert Comment

ID: 6391819

You seem to be experiencing some difficulty with this site.

Please look at your profile, you can find it here:

Every question flagged as "Locked" or "Unlocked" remains unresolved. Please bring these questions to a conclusion.

I'm posting the following in every question that appears to be abandoned, so please do not take this personally. But please do take it seriously and take positive action around this.

Experts-Exchange is not a news group, in which you can post a question, get the answer, and walk away, or ignore any posts that do not serve to solve your problem.

You can read more about how the site works in our member agreement:

Although the agreement tells you something about how the site works, it doesn't tell you much about the netiquette that has evolved on our site. In Experts-Exchange it is expected that you always provide feedback to those who participate in the questions that you post. And I'll explain why this is the case.

When a question is resolved, it becomes a Previously Answered Question, and will be stored in the database. Users who have similar problems can buy your question for 1/10 of the original point value in order to find a solution to *their* problem.

A a result it is important that you provide feedback to our experts

If an expert provides a suggestion that solves your problem, award them by grading the answer so that the question does indeed become such a "PAQ". That way future visitors of this question get the most out of it.

If you did *not* get a satisfactory response to one of your questions, you have to tell participants that this is the case, so that they know that you have read and understood their suggestions, even though it didn't help you. After that, by all means, you can contact me or post a question in the Community Support topic area, and ask us to delete the question and refund your points.

I would also like you to consider this: Our experts are willing to spend some of their precious time to help you solve your problem. A lot of our experts are professionals, to whom time is money. And they're willingly giving up some of their time to help you.

And the only thing we're asking in return is a bit of feedback and an effort on your behalf to participate according to our member agreement and our peculiar brand of netiquette. I think that is a pretty good deal, don't you?

Community Support

Expert Comment

ID: 6744565
Points awarded to dbusher.

community support moderator

Featured Post

Easy, flexible multimedia distribution & control

Coming soon!  Ideal for large-scale A/V applications, ATEN's VM3200 Modular Matrix Switch is an all-in-one solution that simplifies video wall integration. Easily customize display layouts to see what you want, how you want it in 4k.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Suggested Courses

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question