0% found this document useful (0 votes)
132 views

Web Development and Database Administration Level-III

Uploaded by

Melkam dessalegn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
132 views

Web Development and Database Administration Level-III

Uploaded by

Melkam dessalegn
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 18

Web Development and Database

Administration Level-III

Based on November 2023, Curriculum Version II


Module Title: Evaluating and selecting hosting service
Module code: EIS WDDBA3 M10 1123
Nominal duration: 40 Hours

Acronym
ACL -----------------------------------------------Access control lists

CDN ----------------------------------------------Content delivery network

DNS -----------------------------------------------Domain Name system

ISP ------------------------------------------------Internet service provider

Mbps ----------------------------------------------Megabits per second

NIDS ----------------------------------------------Network-based intrusion detection systems

OS ------------------------------------------------Operating System

QOS -----------------------------------------------Quality of Service

SEO -----------------------------------------------Search engine optimization

SLA -----------------------------------------------Service Level Agreements

SSL ------------------------------------------------Secure Sockets Layer

TLS -----------------------------------------------Transport Layer Security

VPN -----------------------------------------------Virtual private network


Unit One: ISP Selection
1.1. Comparable characteristics of hosting services

1.1.1. ISP (Internet Service Provider)

 An ISP (internet service provider) is a company that provides individuals and


organizations access to the internet and other related services.

 An ISP has the equipment and the telecommunication line access required to have
a point of presence on the internet for the geographic area served.

 ISPs make it possible for customers to access the internet while also providing additional
services such as email, domain registration and web hosting.

 ISPs may also provide different internet connection types, such as cable and fiber.
Connections can also come in the form of high-speed broadband or non-broadband.

 An ISP is also sometimes referred to as an internet access provider.

 ISP is also sometimes used as an abbreviation for independent service provider to


distinguish a service provider that is a separate company from a telephone company.

1.1.2. Web Hosting

 Web hosting is a service that allows organizations and individuals to post a website or
web page onto the Internet.

 Web hosting is a necessity for any website it is the physical location of your website on
the Internet, an online storage center that houses the information, images, video, and
other content that comprises your website.

 A web hosting service is a type of Internet hosting service that allows individuals and
organizations to make their website accessible via the World Wide Web.

 Web hosts are companies that provide space on a server owned or leased for use by
clients, as well as providing Internet connectivity, typically in a data center.

 Web hosting is the place where all the files of your website live. It is like the home of
your website where it actually lives.
Figure 1.1: web hosting features

A server is a computer that connects other web users to your site from anywhere in the world.
Characteristics of a good web hosting company

A good web hosting company should have

I. Good reputation

A good web hosting company must have a good and excellent reputation in the web hosting
business circles.

II. Long existence

A good web hosting service provider should have been in existence for some reasonably long
time.

III. Ability to offer technical support

The other major characteristic that a good web hosting company should offer is that they should
have the ability to provide all the technical support where and when you need it. phone calls on a
24 hours basis.

IV. Customized services

When you are looking for a web hosting service provider be sure to select that which will offer
customized services to you..
V. Quality machinery and hardware

machinery and hardware.

VI. Security

they should enable easy backup in case of any emergency.

1.2. Flexible Email and Mailing list services

1.2.1. Email Hosting

Email hosting is the service of renting out and managing email servers. The server is a space
where you can send, receive and store emails. With email hosting, you can set up professional
email addresses on your domain name.

1.2.2. Email Hosting Services

A. Free Web-hosting Email services

Web-hosting email services allow you to send and receive mail and manage email accounts
through webmail and email clients.

B. Professional Email Hosting

It’s not advised to use free email hosting , Professional (paid) email hosting services are most
likely to fit the needs of a growing business better.

C. Cloud Email Hosting and Shared Hosting

Cloud servers are always kept up-to-date with the latest security patches and recent
technological advancements. Benefits include increased bandwidth requirements and firewall
settings for additional security, among many others. A final benefit to consider is that email lives
on the Internet, so if your system goes down, everything is safely backed up.

1.3. Business needs support service standards

I. Installing new tools


II. Site Errors and Malfunctions
III. Web Hosting Upgrades.

1.4. Data capacity for partial outages

A variety of factors can interrupt service, from temporary disruptions to longer-term incidents or
degradations. Common points of failure could be major ISPs, DNS providers, CDN providers,
hosting or infrastructure vendors, or even APIs for information exchange.
1.5. Security technologies assessment

Internet Service Provider Security Policies

ISP Secure Network Design

Other Security Measures .

1.6. Evaluation of scripting language availability

Web server scripting languages and frameworks are essential tools for system administrators
who want to create dynamic and interactive web applications..

I. Project requirements.

II. Server environment

III. Your personal preference.

IV. Budget and Resources

V. Testing and Debugging options.

VI. Future plans

1.7. Assessment of optional server applications for advanced web functions

A. Web Server:-Apache, Nginx, Microsoft IIS


B. Database Server:-MySQL, PostgreSQL, MongoDB

C. Application Server:-Tomcat, JBoss, Microsoft ASP.NET

D. Load Balancer:- Nginx, HAProxy, F5 BIG-IP


E. Caching System:-Varnish, Redis, Memcached
F. Security Applications:-Web Application Firewall (WAF), IDS, SIEM

1.8. Client selection criteria with ISP hosting service

Selecting the right Internet Service Provider (ISP) hosting service for your business is crucial for
ensuring a reliable online presence. Here are key client selection criteria to consider when
evaluating ISP hosting services:

I. Bandwidth and Speed:.


II. Reliability and Uptime:
III. Scalability:
IV. Security Measures:Evaluate the ISP's security measures, including firewalls,
DDoS protection, and other security protocols.
V. Support and Customer Service:
VI. Technical Features and Compatibility
VII. Data Backup and Recovery:
VIII. Network Redundancy:Look for ISPs with redundant network connections to
minimize the risk of downtime in case of a network failure. Redundancy ensures
continuity of service.
IX. Location and Geographic Coverage:
X. Cost and Value for Money:
XI. Service Level Agreements (SLAs)
XII. Reviews and Reputation:
Self-Check 1
Part-I: Choose the correct answer
1. A company that provides individuals and organizations access to the internet and other
related services.
A. Web Hosting
B. ISP
C. Cloud Service
D. Email Hosting
2. A service that allows organizations and individuals to post a website or web page onto the
Internet.
A. Web Hosting
B. ISP
C. Cloud Service
D. Email Hosting
3. Which one of the following is not a characteristics of a good web hosting company?
A. Long existence
B. Good reputation
C. Cloud Service
D. Customized services
Part-II: Answer the following questions accordingly
1. What do we mean by Cloud Service?
2. What is the importance of customer support for Web Hosting?
3. Explain the purpose of IDS in ISP security?

Unit Two: Permanent Online Presence


2.1. Server performance and availability

2.1.1. Server monitoring

Servers are essential components of modern IT infrastructures and provide services such as
email, web hosting, database management, and other applications.
Monitoring servers is important because it lets you detect problems early, preventing
downtime and data loss. There are several ways to monitor server performance, from simple
tools to complex solutions.

2.1.2. Types of Server Monitoring

I. Availability/Uptime Monitoring

II. Performance Monitoring

III. Resource Monitoring:-Monitoring of the server should focus on the


performance of these components. Hard Disk, RAM, and Processor are
the three main components of a server.Effective resource monitoring is
an important part of any IT infrastructure.

IV. Error Monitoring

V. Log Monitoring

VI. Database Monitoring

VII. Security Monitoring.

2.2. Negotiate escalation procedures and performance standards

A. Establishing Clear Performance Standards

B. Defining Escalation Procedures

C. Customizing Service Level Agreements (SLAs)

D. Continuous Monitoring and Reporting.

E. Flexibility and Review Mechanisms

F. Incentives for Performance Improvement.

2.3. Security and backup procedures for business needs

i. Encrypt Data and Control the Encryption Keys

ii. Control the Keys to the Storage

iii. Don’t Let Users In

iv. Create a New User for Backups Instead of Using “Admin”

v. Think Ahead
Self-Check-2
Part-I: Say True or False

1. Database monitoring include response times, availability, throughput, and memory


usage.
2. Escalation Procedure serves as a contractual framework that helps maintain
accountability and transparency between your business and the ISP.
3. Successful negotiations with an ISP involve establishing clear performance standards,
and defining escalation procedures.

Part-II: Give short answer

1. List the types of system monitoring. (At least three)


2. Identify the major difference between cloud storage and on-premises storage.
3. What is the need of data encryption?
4.

Unit Three: Technical Requirements for Web hosting


3.1. OS compatibility with business software and applications

An operating system is a system software program that distributes and manages the server's
resources. It acts as a communication bridge between user's and computer's hardware hence,
prioritizes user's request and programs.

3.1.1. Types of Operating Systems

The two most popular ones used for running websites are Linux and Windows-based OS.

LINUX They are very secure, and the OS is constantly updated with security patches,

WINDOWS Windows is the most popular OS used globally and has been around since 1985

3.1.2. Choose the right OS for Web Hosting

Budget

Requirements

Technical Knowledge

Support

Compatibility
3.2. Web-host server for dynamic websites

3.2.1. Dynamic Websites

Dynamic sites use a server-side programming language to connect with a database to enable
interactive features and alter the content.

A dynamic website shows different content to different users.

Dynamic sites use a server-side programming language to connect with a database to enable
interactive features and alter the content. Their common use cases include forums, social media
platforms, and eCommerce sites.

3.2.2. Dynamic Website Types

Depending on the scripting language, there are two types of dynamic websites.

Client-Side Scripting

Server-Side Scripting

3.2.3. Build Dynamic Websites

Dynamic web pages require complex software and additional scripting language, making them
more difficult to develop than static websites.

a dynamic web page has some advantages:

 Easier maintenance.

 Content personalization

 More features.

 Better search engine optimization (SEO).

3.3. Security systems and payment technologies

3.3.1. Securing Payments in E-commerce

In the ever-growing world of e-commerce, securing payment transactions has become a top
priority for businesses and consumers.

3.3.2. Understanding the Online Payment Ecosystem

The online payment ecosystem comprises several components that enable seamless and secure
payment transactions. The primary components of this ecosystem are:
 Customers: The y initiate transactions by
choosing the goods or services they want to purchase and providing their payment
details.

 Merchant Websites/Apps: The e-commerce platform, developed by a merchant, which


displays the products and services for purchase and collects customers' payment
information.

 Payment Gateways: They act as intermediaries between the merchant website and the
payment processor. Payment gateways encrypt customer payment details and transmit
them securely to the payment processor.

 Payment Processors: They receive, validate, and process payment information from
the payment gateway, acquiring the funds from the issuing bank and depositing them
into the merchant's account.

 Issuing Banks: Financial institutions that issue credit or debit cards to consumers on
behalf of the card networks (e.g., Visa or Mastercard).

 Card Networks: Associations or organizations responsible for establishing and


maintaining the rules and parameters that govern how electronic payment transactions
are processed (e.g., Visa, Mastercard, American Express, etc.).

To ensure secure transactions, all these components must work together cohesively and
implement security measures that protect sensitive customer data.

3.3.3. Secure Payments are Essential for E-Commerce

Securing payments should be among the top priorities for any e-commerce business. Here are
some compelling reasons why secure payments are essential for e-commerce:

 Build Trust and Confidence:

 Prevent Fraud:

 Compliance with Regulations and Standards

 Protect Customer Data

 Reduce Chargebacks

3.3.4. Practices for Securing Payments in E-Commerce

Implementing the best practices for securing payments in e-commerce helps businesses comply
with security regulations and reduces the likelihood of security breaches and fraud attempts.
Here are some best practices that e-commerce
merchants should consider:

A. Secure Data Storage To prevent unauthorized access to sensitive data

B. Encryption All sensitive data transmitted over public networks, such as payment details,
should be encrypted using SSL (Secure Sockets Layer) or TLS (Transport Layer
Security). This ensures that attackers cannot easily decipher intercepted data.

C. Strong Authentication and Access Control

D. Secure Code Development

E. System Monitoring

F. Regular Security Audits

Self-Check-3
Part-I: Choose the correct answer

1. Which of the following is an open-source operating system known for security and
constant updates?
A. Windows C. Linux
B. macOS D. Android
2. What is one advantage of choosing Linux for web hosting?
A. Limited customization options
B. Expensive licensing fees
C. Open-source with no cost restrictions
D. Compatibility issues with software
3. When considering the right OS for web hosting, what does technical knowledge refer to?
A. User interface familiarity C. Internet connection speed
B. Programming and coding skills D. Number of installed applications
4. Which factor is NOT mentioned as a consideration when choosing a website hosting
operating system?
A. Technical knowledge C. Compatibility
B. Server color D. Budget
5. Why is securing payments essential for e-commerce?
A. Increase charge C. Encourage online fraud
B. Build trust and confidence D. Decrease customer satisfaction
Part-II: Matching Questions

A B
1. Payment Gateways C A. Financial institutions issuing cards
2. SSL/TLS Encryption D B. Website or app developed by a merchant
3. Issuing Banks A C. Intermediaries between merchant and processor
4. Dynamic Websites E D. Technology for securing data transmission
5. Merchant Websites/Apps B E. Websites content-based user interactions

Unit Four: Benchmark and Test Performance


4.1. ISP performance during on and off-peak times

4.1.1. Navigating Peak and Off-Peak Hours

4.1.2. Importance of Understanding Peak and Off-Peak Hours

Before we delve into how to efficiently manage data usage, it is important to understand the
concept of peak and off-peak hours. Internet service providers often categorize certain times of
the day as peak hours, where network traffic is at its highest due to a surge in user activity.
These peak hours usually coincide with periods of heavy internet usage, such as evenings when
people return from work or school.

During peak hours, network congestion may occur, resulting in slower internet speeds and
buffering.

off-peak hours refer to the times when internet usage is relatively lower, leading to a smoother
and faster online experience.

4.1.3. Optimizing Data Usage during Peak Hours

Now that we understand the basics, let's explore some practical tips to optimize data usage
during peak hours:

 Limit streaming quality:

 Download content in advance:

 Maintain device updates

4.1.4. Mastering Your Data Plan: Maximize Value during Peak and Off-Peak
Times
With more and more people relying on smartphones,
tablets, and other connected devices, it's essential to optimize your data usage and ensure that
you get the most out of your plan.

Whether you are a heavy data user or simply want to avoid unnecessary charges, understanding
how to master your data plan will help you save money and have a smoother online experience.
In this article, we will explore different strategies to maximize the value of your data plan during
peak and off-peak times.

I. Track Your Data Usage

The first step to mastering your data plan is to keep a close eye on your data consumption. Most
smartphones provide built-in tools to monitor your data usage, allowing you to track how much
data you've used and which apps are consuming the most. By regularly monitoring your usage,
you can identify any data-hungry applications and take necessary action.

 Use data tracking apps to gain more detailed insights into your data usage.
 Set up data usage alerts to receive notifications when you reach certain thresholds.
 Review your data usage regularly and adjust your habits as needed.

II. Utilize Wi-Fi Networks

Connecting to Wi-Fi networks whenever possible is one of the easiest ways to conserve your
precious mobile data. By using Wi-Fi, you can enjoy faster speeds and avoid using your cellular
data altogether. Take advantage of Wi-Fi networks available at home, work, cafes, or public
places to limit your reliance on the cellular network.

 Ensure you are connected to a trusted and secure Wi-Fi network.


 Turn on Wi-Fi Assist feature on your phone to automatically switch to Wi-Fi when
available.
 Consider using a virtual private network (VPN) when connected to public Wi-Fi
networks to enhance security.

III. Optimize App Settings

Many apps have settings that allow you to control how they consume data. By tweaking these
settings, you can minimize their impact on your data plan.

 Disable auto-play for videos and disable automatic app updates.


 Set up social media apps to refresh content manually instead of automatically.
 Configure email apps to fetch new messages at specific intervals instead of continuously
syncing.
IV. Stream and Download Smartly

Streaming music and videos can quickly eat into your data allowance. However, by making
smart choices, you can still enjoy your favorite content without draining your plan.

 Download music and videos over Wi-Fi for offline consumption.


 Consider using streaming services that offer data-saving modes or lower bitrates.
 Adjust streaming quality settings to a lower resolution if needed.

V. Take Advantage of Off-Peak Times

Off-peak times, typically during the late night or early morning hours, often offer faster and
more stable network speeds. By scheduling your data-intensive activities during these periods,
you can make the most of your data plan without experiencing any slow-downs or congestion.

 Check with your service provider to determine off-peak hours.


 Download large files or perform system updates during off-peak times.
 Utilize cloud storage services to sync and back up your data during off-peak hours.

4.2. Email and Mailing services backup procedures

A backup of a server is often created in order to be able to restore data if the original server
crashes or becomes inaccessible. This is especially important in organizations for legal or
business reasons.
The process of backups is done by making an exact copy of the server’s data storage device in
order to prevent data loss. This operation can be done manually by copying all files onto an
external storage device. This can be also done automatically by setting up a scheduled process.
The backup process is much more complex in action. It requires a lot of time, expertise, and
caution to be successful. There are different factors a system administrator should take into
account in order not to lose any data, especially when it’s done manually.
Here are some tips when choosing your e-mail and collaboration platform to create a digital
workplace for your business:

 Pay attention that an integrated backup system is always preferred over third-party
solutions,
 Make sure that you back up all of the important data on a regular basis relying on a real-
time backup plan,
 Off-site backups are a good way to protect your data from natural disasters,
 The amount of time and effort required to implement the backup plan,
 Lastly, if the backup system is optimized to
work in your environment for better performance.

4.3. Services align with business needs

The following are several types of support services that companies can use to maintain their IT
infrastructure and other procedures to increase their effectiveness:
I. Data storage
II. HR and people management.
III. Computer support
IV. Administration support
Other support services companies often use include those that help assist in the administrative
process within their organizations. There are several small duties required for these tasks, which
can take up an administrative professional's time. Examples of available services in this
department include updating customer databases, inputting data and responding to
correspondence from clients and employees.
V. Customer service
Customer service is a popular support service that many organizations rely on to keep their
customers happy. If there aren't enough in-house customer service employees to handle
customer needs, customers may feel as though the company cannot meet their needs. Third-party
customer service support programs make sure clients receive optimal support in a timely
manner.
VI. Web development
Website development and maintenance are important components of support services and help
manage various aspects of web-related tasks, including customer service and inventory
management. These support services can decrease the time that site owners spend on
troubleshooting and fixing issues on their website. There are several resources that can keep
systems and websites functioning and reduce the need for employees to regularly manage the
company's sites.
VII. Sales and revenue generation
One way to increase sales and revenue generation is to use support services focused on
increasing brand awareness and loyalty. These services typically involve assisting customers in
determining the help they require. Services may also include assisting customers in finding
products and services that meet their needs and preferences.

4.4. Quaility of Service Delivered


A set of technologies that work on a network to
guarantee its ability to dependably run high-priority applications and traffic under limited
network capacity. QoS technologies accomplish this by providing differentiated handling and
capacity allocation to specific flows in network traffic. This enables the network administrator to
assign the order in which packets are handled and the amount of bandwidth afforded to that
application or traffic flow.

Types of Traffic on the Network

To understand QoS, you must understand the traffic types it measures. Measurements of concern
to QoS are:
1. Bandwidth (maximum rate of transfer) — the speed of a link
2. Throughput (actual rate of transfer)
3. Latency (delay) — the amount of time it takes for a packet to traverse the network, from
source to destination
4. Jitter (variance in latency) — when packets don’t arrive in the same order they were sent

QoS is key to:

 Voice and video applications


 Email
 Interactive applications
 Batch applications
 Online purchasing
For example, high-bandwidth, real-time data traffic such as voice over IP (VoIP), video
conferencing and video-on-demand have high sensitivity to latency and jitter. These
applications, with minimum bandwidth requirements and maximum latency limits, are called
“inelastic.”

How to Implement QoS

A successful QoS implementation includes three main stages:


1. Strategically define business objectives to be achieved using QoS.
2. Determine service-level requirements of traffic classes.
3. Design and test QoS policies.

Ongoing service level monitoring, adjustments and tuning of QoS policies should always follow
a successful QoS policy deployment. Business conditions are always changing, so organizations
must adapt the QoS deployment cycle accordingly. This can include:
 Starting the QoS deployment cycle over
 Redefining objectives
 Testing and tuning designs
 Deployment of new designs
 Monitoring

Depending on the provider, the above services and controls can be managed and consolidated
down to a single box. Such is the case for QoS via Palo Alto Networks firewalls. Thus, to
communicate QoS measures and classification outside the box and downstream network
infrastructure, Differentiated Services Code Point (DSCP) can be implemented. DSCP marks
each packet based on its classification and communicates this to each box the packet travels
through, ensuring a consistent implementation of QoS policy.

Self-Check-3
Part-I: Choose the correct answer

1. What is the main challenge during peak hours for internet users?
A) Slow device updates
B) Network congestion and slower speeds
C) Limited streaming options
D) Off-peak discounts
2. Why is tracking data usage important in mastering your data plan?
A) To increase data charges
B) To identify data-hungry applications
C) To disable Wi-Fi networks
D) To avoid off-peak times
3. When is it advisable to schedule data-intensive activities for optimal performance?
A) Peak hours
B) Random times during the day
C) Off-peak times
D) Weekends

Part-II: Give short answer

1. Explain the need of QoS?


2. How do we identify the peak hours ISP performance?
3. List the ways to optimize data usage during the peak hours.

You might also like