Link to home
Create AccountLog in
Avatar of Cog
Cog

asked on

Master Slave (active passive) configuration

I am not a networking guy I am only a lowly programmer :) , so excuse the question if its is very simple but a client of mine has asked what Microsoft networking protocols would be required bewteen  Active / Passive servers?  does anyone know where i can find some info on this or even better know the answer.
Avatar of pseudocyber
pseudocyber

You mean some kind of server load balancing?  I believe you'd have to use Microsoft's Cluster Server found at:  http://www.microsoft.com/windowsserver2003/technologies/clustering/default.mspx.  Windows 2000 can also do clustering.

Alternatively, there are network solutions which can do server clustering.  Cisco's http://www.cisco.com/warp/public/cc/so/neso/ienesv/cxne/cslbs_ov.htm

Nortel's:  http://www.nortelnetworks.com/products/01/alteon/2224/faq.html

We use Radware Web Server Directors:  http://www.radware.com/content/products/wsd/default.asp

HTH
Avatar of Cog

ASKER

The set up is as follows there is a Master machine that serves up all the web content and has SQL server installed the second machine is simply a copy of the first and only becomes active in the event that there is a problem with the master.

windows 2000 is installed on box boxes

I hope this helps
i think he is asking which network protocols must be allowed between 2 servers if they are in  a cluster in order for them to work.  Is that the case?
Avatar of Cog

ASKER

mikeleebrla that is what i am asking thanks
ASKER CERTIFIED SOLUTION
Avatar of pseudocyber
pseudocyber

Link to home
membership
Create a free account to see this answer
Signing up is free and takes 30 seconds. No credit card required.
See answer
They could also refer to FTP kind of access which can be passive and active. Check this link http://slacksite.com/other/ftp.html - as you are new to networking, you might not understand it fully; let me know if you need a much more "accessible" explanation. However, the bottom line is that for security reasons it is better to use a passive access.

Anyway, my explanation doesn't "click" with the "microsoft protocols" part!!! Protocols are usualy defined as standards and are not (usualy) from microsoft! However, they are indeed the "authors" for some authentication protocols and some other own additions on other protocols... I'm not even trying to search by brain now about what are these protocols anyway ...

Cheers.