Browse Definitions :

BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

This content is part of the Essential Guide: Server form factors: A guide to rackmount, blade servers and more
Definition

server

A server is a computer program or device that provides a service to another computer program and its user, also known as the client. In a data center, the physical computer that a server program runs on is also frequently referred to as a server. That machine may be a dedicated server or it may be used for other purposes as well.

In the client/server programming model, a server program awaits and fulfills requests from client programs, which may be running in the same or other computers. A given application in a computer may function as a client with requests for services from other programs and also as a server of requests from other programs.

Types of servers

Servers are often categorized in terms of their purpose. A few examples of the types of servers available are:

  • Web server is a computer program that serves requested HTML pages or files. In this case, a Web browser acts as the client.
  • An application server is a program in a computer in a distributed network that provides the business logic for an application program.
  • A proxy server is software that acts as an intermediary between an endpoint device, such as a computer, and another server from which a user or client is requesting a service.
  • A mail server is an application that receives incoming e-mails from local users (people within the same domain) and remote senders and forwards outgoing e-mails for delivery.
  • A virtual server is a program running on a shared server that is configured in such a way that it seems to each user that they have complete control of a server.
  • A blade server is a server chassis housing multiple thin, modular electronic circuit boards, known as server blades. Each blade is a server in its own right, often dedicated to a single application.
  • A file server is a computer responsible for the central storage and management of data files so that other computers on the same network can access them.
  • A policy server is a security component of a policy-based network that provides authorization services and facilitates tracking and control of files. 
Server features vs. use case

Choosing the right server 

There are many factors to consider in the midst of a server selection, including virtual machine (VM) and container consolidation. When choosing a server, it is important to evaluate the importance of certain features based on the use cases. Security capabilities are also important and there will probably be a number of protection, detection and recovery features to consider, including native data encryption to protect data in flight and data at rest, as well as persistent event logging to provide an indelible record of all activity. If the server will rely on internal storage, the choice of disk types and capacity is also important because it can have a significant influence on input/output (I/O) and resilience. 

Many organizations are shrinking the number of physical servers in their data centers as virtualization allows fewer servers to host more workloads. The advent of cloud computing has also changed the number of servers an organization needs to host on premises. Packing more capability into fewer boxes can reduce overall capital expenses, data center floor space and power and cooling demands. Hosting more workloads on fewer boxes, however, can also pose an increased risk to the business because more workloads will be affected if the server fails or needs to be offline for routine maintenance.

A server maintenance checklist should cover physical elements as well as the system's critical configuration. Download a PDF of this server maintenance checklist.

This was last updated in February 2019

Continue Reading About server

Join the conversation

15 comments

Send me notifications when other members comment.

Please create a username to comment.

Helps me about telling me basic of IIS.
Cancel
Nice.
Cancel
It helps me know about it clearly.
Cancel
Thank you.
Cancel
Ok but with cloud storage these days, why would you need a server for a small business with around 5 to 10 employees?
Cancel
This really helped thank you! ^^ *wink*
Cancel
Please explain why my computer keeps, coming on with comments saying: (server is not responding) This is a brand new computer. Everything is going down. Thank you for your time.
Cancel
I wouldn't call a sever a program. More of a machine.
Cancel
How does your organization ensure the routine maintenance and security testing of your servers?
Cancel
The application server actually stores all the applications that are used by the employs of any organisation to use the application directly from the server rather downloading the application in the user system and install it to use them.
Cancel
That should have been the mail server. Mail servers actually stores the mails of all the persons in a organization.
Cancel
Hi. Can I know what the different between this server and server operating system?
Cancel
Thank you! It's very informative information for me!
Cancel
wow
Cancel
we are planning to create our own software for that we need to assemble a server and nearly 50nos of employees can work under that server can suggest me the required details please.
 
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • data breach

    A data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or ...

  • zero-day (computer)

    A zero-day vulnerability, also known as a computer zero day, is a flaw in software, hardware or firmware that is unknown to the ...

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

SearchStorage

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...

  • dedicated cloud

    A dedicated cloud is a single-tenant cloud infrastructure, which essentially acts as an isolated, single-tenant public cloud.

Close