Cog
asked on
Master Slave (active passive) configuration
I am not a networking guy I am only a lowly programmer :) , so excuse the question if its is very simple but a client of mine has asked what Microsoft networking protocols would be required bewteen Active / Passive servers? does anyone know where i can find some info on this or even better know the answer.
ASKER
The set up is as follows there is a Master machine that serves up all the web content and has SQL server installed the second machine is simply a copy of the first and only becomes active in the event that there is a problem with the master.
windows 2000 is installed on box boxes
I hope this helps
windows 2000 is installed on box boxes
I hope this helps
i think he is asking which network protocols must be allowed between 2 servers if they are in a cluster in order for them to work. Is that the case?
ASKER
mikeleebrla that is what i am asking thanks
Check out this page: http://www.microsoft.com/windows2000/techinfo/planning/clustering.asp
ASKER CERTIFIED SOLUTION
membership
Create a free account to see this answer
Signing up is free and takes 30 seconds. No credit card required.
They could also refer to FTP kind of access which can be passive and active. Check this link http://slacksite.com/other/ftp.html - as you are new to networking, you might not understand it fully; let me know if you need a much more "accessible" explanation. However, the bottom line is that for security reasons it is better to use a passive access.
Anyway, my explanation doesn't "click" with the "microsoft protocols" part!!! Protocols are usualy defined as standards and are not (usualy) from microsoft! However, they are indeed the "authors" for some authentication protocols and some other own additions on other protocols... I'm not even trying to search by brain now about what are these protocols anyway ...
Cheers.
Anyway, my explanation doesn't "click" with the "microsoft protocols" part!!! Protocols are usualy defined as standards and are not (usualy) from microsoft! However, they are indeed the "authors" for some authentication protocols and some other own additions on other protocols... I'm not even trying to search by brain now about what are these protocols anyway ...
Cheers.
.
Alternatively, there are network solutions which can do server clustering. Cisco's http://www.cisco.com/warp/public/cc/so/neso/ienesv/cxne/cslbs_ov.htm
Nortel's: http://www.nortelnetworks.com/products/01/alteon/2224/faq.html
We use Radware Web Server Directors: http://www.radware.com/content/products/wsd/default.asp
HTH