• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 247
  • Last Modified:

Master Slave (active passive) configuration

I am not a networking guy I am only a lowly programmer :) , so excuse the question if its is very simple but a client of mine has asked what Microsoft networking protocols would be required bewteen  Active / Passive servers?  does anyone know where i can find some info on this or even better know the answer.
0
Cog
Asked:
Cog
1 Solution
 
pseudocyberCommented:
You mean some kind of server load balancing?  I believe you'd have to use Microsoft's Cluster Server found at:  http://www.microsoft.com/windowsserver2003/technologies/clustering/default.mspx.  Windows 2000 can also do clustering.

Alternatively, there are network solutions which can do server clustering.  Cisco's http://www.cisco.com/warp/public/cc/so/neso/ienesv/cxne/cslbs_ov.htm

Nortel's:  http://www.nortelnetworks.com/products/01/alteon/2224/faq.html

We use Radware Web Server Directors:  http://www.radware.com/content/products/wsd/default.asp

HTH
0
 
CogAuthor Commented:
The set up is as follows there is a Master machine that serves up all the web content and has SQL server installed the second machine is simply a copy of the first and only becomes active in the event that there is a problem with the master.

windows 2000 is installed on box boxes

I hope this helps
0
 
mikeleebrlaCommented:
i think he is asking which network protocols must be allowed between 2 servers if they are in  a cluster in order for them to work.  Is that the case?
0
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
CogAuthor Commented:
mikeleebrla that is what i am asking thanks
0
 
pseudocyberCommented:
0
 
rafael_accCommented:
They could also refer to FTP kind of access which can be passive and active. Check this link http://slacksite.com/other/ftp.html - as you are new to networking, you might not understand it fully; let me know if you need a much more "accessible" explanation. However, the bottom line is that for security reasons it is better to use a passive access.

Anyway, my explanation doesn't "click" with the "microsoft protocols" part!!! Protocols are usualy defined as standards and are not (usualy) from microsoft! However, they are indeed the "authors" for some authentication protocols and some other own additions on other protocols... I'm not even trying to search by brain now about what are these protocols anyway ...

Cheers.
0
 
pseudocyberCommented:
.
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now