Thursday 8 December 2016

Internet Information Services (IIS)

  • IIS is a web server developed by Microsoft.
  • It is used to host and provide internet based services to ASP.NET and ASP web application.
  • When a request comes from client to server IIS takes that request from users and process it and send response back to users.
  • IIS includes a set of programs for building and administrating web applications, search engines and web-based application that access databases.

Working process

  • IIS has it’s own process engine to handle the request.
  • So when a request comes from client to server, IIS takes that request and process it and send response back to clients.


Worker process
  • Worker process (w3wp.exe) runs the application in IIS.
  • It is responsible for handling requests sent to a web server for a specific application pool.
  • When a request comes to the server from a client worker process is responsible to generate the request and response.


Application pool
  • An application pool defines a group of one or more worker processes, configured with common settings that serve requests to one or more applications that are assigned to that application pool.
  • The worker process serves as the process boundary that separates each application pool so that when one worker process or application is having an issue or recycles, other applications or worker processes are not affected.


Advantages

  • More compatible with windows as Microsoft's IIS is the output.
  • Performance for PHP is more stable, reliable and fast.
  • The diagnostic capabilities for tracking error (can be customized).
  • Applications are can be run using only browser, other application are not needed.
  • IIS applications work with a wide variety of browsers and operating systems, so you can easily reach a wide audience.

Disadvantages

  • To the platform .NET, users can only use the IIS.
  • Has the highest score of any other web server to issue a bug.
  • Port 80 (Port for web services) is very easily attacked by crackers.
  • Security log files are also very easy to be penetrated so that the system password would be easily available.

My notes



No comments: