?
Solved

Master Slave (active passive) configuration

Posted on 2005-03-03
11
Medium Priority
?
236 Views
Last Modified: 2013-11-29
I am not a networking guy I am only a lowly programmer :) , so excuse the question if its is very simple but a client of mine has asked what Microsoft networking protocols would be required bewteen  Active / Passive servers?  does anyone know where i can find some info on this or even better know the answer.
0
Comment
Question by:Cog
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
11 Comments
 
LVL 27

Expert Comment

by:pseudocyber
ID: 13450970
You mean some kind of server load balancing?  I believe you'd have to use Microsoft's Cluster Server found at:  http://www.microsoft.com/windowsserver2003/technologies/clustering/default.mspx.  Windows 2000 can also do clustering.

Alternatively, there are network solutions which can do server clustering.  Cisco's http://www.cisco.com/warp/public/cc/so/neso/ienesv/cxne/cslbs_ov.htm

Nortel's:  http://www.nortelnetworks.com/products/01/alteon/2224/faq.html

We use Radware Web Server Directors:  http://www.radware.com/content/products/wsd/default.asp

HTH
0
 

Author Comment

by:Cog
ID: 13451106
The set up is as follows there is a Master machine that serves up all the web content and has SQL server installed the second machine is simply a copy of the first and only becomes active in the event that there is a problem with the master.

windows 2000 is installed on box boxes

I hope this helps
0
 
LVL 25

Expert Comment

by:mikeleebrla
ID: 13451244
i think he is asking which network protocols must be allowed between 2 servers if they are in  a cluster in order for them to work.  Is that the case?
0
NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

 

Author Comment

by:Cog
ID: 13451289
mikeleebrla that is what i am asking thanks
0
 
LVL 27

Expert Comment

by:pseudocyber
ID: 13451304
0
 
LVL 27

Accepted Solution

by:
pseudocyber earned 500 total points
ID: 13451360
0
 
LVL 11

Expert Comment

by:rafael_acc
ID: 13455652
They could also refer to FTP kind of access which can be passive and active. Check this link http://slacksite.com/other/ftp.html - as you are new to networking, you might not understand it fully; let me know if you need a much more "accessible" explanation. However, the bottom line is that for security reasons it is better to use a passive access.

Anyway, my explanation doesn't "click" with the "microsoft protocols" part!!! Protocols are usualy defined as standards and are not (usualy) from microsoft! However, they are indeed the "authors" for some authentication protocols and some other own additions on other protocols... I'm not even trying to search by brain now about what are these protocols anyway ...

Cheers.
0
 
LVL 27

Expert Comment

by:pseudocyber
ID: 13923365
.
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
This article is in regards to the Cisco QSFP-4SFP10G-CU1M cables, which are designed to uplink/downlink 40GB ports to 10GB SFP ports. I recently experienced this and found very little configuration documentation on how these are supposed to be confi…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question