Browse Definitions :
Definition

server

This definition is part of our Essential Guide: Server form factors: A guide to rackmount, blade servers and more

A server is a computer program that provides a service to another computer programs (and its user). In a data center, the physical computer that a server program runs in is also frequently referred to as a server. That machine may be a dedicated server or it may be used for other purposes as well.

In the client/server programming model, a server program awaits and fulfills requests from client programs, which may be running in the same or other computers. A given application in a computer may function as a client with requests for services from other programs and also as a server of requests from other programs.

Types of servers

Servers are often categorized in terms of their purpose. A Web server, for example, is a computer program that serves requested HTML pages or files. The program that is requesting web content is called a client. For example, aWeb browser is a client that requests HTML files from Web servers.

Here are a few other types of servers, among a great number of other possibilities:

An application server is a program in a computer in a distributed network that provides the business logic for an application program. 

A proxy server is software that acts as an intermediary between an endpoint device, such as a computer, and another server from which a user or client is requesting a service. 

A mail server is an application that receives incoming e-mail from local users (people within the same domain) and remote senders and forwards outgoing e-mail for delivery.

A virtual server is a program running on a shared server that is configured in such a way that it seems to each user that they have complete control of a server. 

A blade server is a server chassis housing multiple thin, modular electronic circuit boards, known as server blades. Each blade is a server in its own right, often dedicated to a single application.

A file server is a computer responsible for the central storage and management of data files so that other computers on the same network can access them.

A policy server is a security component of a policy-based network that provides authorization services and facilitates tracking and control of files. 

Important server features

Choosing the right server 

There are many factors to consider in the midst of a server selection, including virtual machine (VM) and container consolidation. When choosing a server, it is important to evaluate the importance of certain features based on the use cases. Security capabilities are also important and there will probably be a number of protection, detection and recovery features to consider, including native data encryption to protect data in flight and data at rest, as well as persistent event logging to provide an indelible record of all activity. If the server will rely on internal storage, the choice of disk types and capacity is also important because it can have a significant influence on input/output (I/O) and resilience. 

Many organizations are shrinking the number of physical servers in their data centers as virtualization allows fewer servers to host more workloads. The advent of cloud computing has also changed the number of servers an organization needs to host on premises. Packing more capability into fewer boxes can reduce overall capital expenses, data center floor space and power and cooling demands. Hosting more workloads on fewer boxes, however, can also pose an increased risk to the business because more workloads will be affected if the server fails or needs to be offline for routine maintenance. 

Server maintenance checklist

A server maintenance checklist should cover physical elements as well as the system's critical configuration. Download a PDF of this server maintenance checklist.

See also: server virtualization, server sprawl

This was last updated in January 2018

Continue Reading About server

Join the conversation

12 comments

Send me notifications when other members comment.

Please create a username to comment.

Helps me about telling me basic of IIS.
Cancel
Nice.
Cancel
It helps me know about it clearly.
Cancel
Thank you.
Cancel
Ok but with cloud storage these days, why would you need a server for a small business with around 5 to 10 employees?
Cancel
This really helped thank you! ^^ *wink*
Cancel
Please explain why my computer keeps, coming on with comments saying: (server is not responding) This is a brand new computer. Everything is going down. Thank you for your time.
Cancel
I wouldn't call a sever a program. More of a machine.
Cancel
The application server actually stores all the applications that are used by the employs of any organisation to use the application directly from the server rather downloading the application in the user system and install it to use them.
Cancel
That should have been the mail server. Mail servers actually stores the mails of all the persons in a organization.
Cancel
Hi. Can I know what the different between this server and server operating system?
Cancel
Thank you! It's very informative information for me!
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • challenge-response authentication

    In information security, challenge-response authentication is a type of authentication protocol where one entity presents a ...

  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • exbibyte (EiB)

    An exbibyte (EiB) is a unit used to measure data capacity.

  • zebibyte (ZiB)

    A zebibyte (ZiB) is a unit used to measure computing and storage capacity.

  • tiered storage

    Tiered storage is a way to assign different categories of data to various types of storage media with the objective of reducing ...

Close