当前位置:网站首页>Huakaiyun (Zhiyin) | virtual host: what is a virtual host
Huakaiyun (Zhiyin) | virtual host: what is a virtual host
2022-07-03 01:45:00 【Weaving sound Z】
Let's recommend his virtual host :www.zwwhl.com
Virtual host ( English :virtual hosting) Or called Shared host (shared web hosting), also called Virtual server , On a single host or host group , How to implement multi domain services , Can run multiple Website Or service technology . Virtual hosts are completely independent , And can be managed by users themselves , Virtual does not mean that there is no , It means that the space is extended from the server of the entity , Its Hardware The system can be based on server clusters , Or a single server .

Its technology is Internet The server Server savings adopted Hardware Cost technology , Virtual host technology is mainly used in HTTP,FTP,EMAIL And many other services , One or all services of a server Logic Divided into multiple service units , The external representation is multiple servers , So as to make full use of server hardware resources . If the partition is system level , It's called a virtual server .
Easy to manage
All virtual hosts are in the same host , Therefore, they can share the same configuration settings , So as to save the manpower and cost of management .[1]
Improve performance
Virtual hosts within the same host can share assemblies with each other (Process Pool), Therefore, the response time to the client can be shortened .[1]
cost reduction
Virtual host enables the resources of a single server to be used more effectively , Include Memory 、 Storage space or processor resources . Because usually the resources needed to serve a single web address are quite small for the whole server , In this way, the resources of the server can be used more effectively .[2]
Multiple virtual servers , Can pass Software Set up in the same entity The server On , And each Virtual server It can provide all the functions of the server , In this way, the cost of each virtual server is reduced to a certain extent . See : Dedicated hosting service
Implementation type of virtual host
There are three ways to achieve it : URL name correspondence (Name-based)、IP The address corresponds to (IP-based) as well as Port The port number corresponds to (Port-based).[1]
URL name correspondence (Name-based)
URL name correspondence (Name-based) By identifying the URL provided by the client , Determine the corresponding service , This method effectively reduces IP Occupation of address , But the disadvantage is that we must rely on DNS The name corresponds to the service Support for , If the name corresponds to service interruption , The service corresponding to this name will also be unavailable .[1]
IP The address corresponds to (IP-based)
IP The address corresponds to (IP-based) It means on the same server , Borrow the same configuration settings 、 Different IP To manage multiple services .[1]
Port The port number corresponds to (Port-based)
Approximate to IP The address corresponds to , But in the same place IP under , Use different Port Port number to distinguish different services , To quickly create multiple virtual hosts . for example :
- 192.168.0.1:80
- 192.168.0.1:8080
- 192.168.0.1:8888
However, most of these applications are used in private or experimental services , The reason is that the user cannot use the default port number ( for example Web The default port number of the service 80) Access to the services provided , Unless the user knows the port number of the service .[1]
Choose a virtual host
The hardware facilities of the host, the virtual host machine room owned by the virtual host provider , What size Data Center , Whether there is enough bandwidth of the computer room line , Whether the online speed of the virtual host website can meet the traffic bandwidth of all its virtual host customers at the same time . How many websites are set up on a virtual host? Usually a virtual host can set up hundreds to thousands of websites , If there are more websites , The more people share the same server ; In comparison, resources are relatively tight . Generally related to machines CPU、 Memory Etc .IIS It's usually 10000/ Number of connections per server .
边栏推荐
- Vant implements a simple login registration module and a personal user center
- How is the mask effect achieved in the LPL ban/pick selection stage?
- Network security - man in the middle attack
- Smart management of Green Cities: Digital twin underground integrated pipe gallery platform
- STM32 - GPIO input / output mode
- Leetcode skimming questions_ Sum of two numbers II - enter an ordered array
- Wordinsert formula /endnote
- Related concepts of GDB in embedded system
- C application interface development foundation - form control (1) - form form
- View of MySQL
猜你喜欢

leetcode刷题_两数之和 II - 输入有序数组

Main features of transport layer TCP and TCP connection

Wireshark data analysis and forensics a.pacapng

传输层 TCP主要特点和TCP连接

How is the mask effect achieved in the LPL ban/pick selection stage?

Meituan dynamic thread pool practice ideas, open source

【QT】自定义控件的封装

Work experience of a hard pressed programmer

"Jetpack - livedata parsing"

什么是调。调的故事
随机推荐
网络安全-防火墙
Function definition and call, this, strict mode, higher-order function, closure, recursion
GDB 在嵌入式中的相关概念
C语言课程信息管理系统
自定义组件、使用npm包、全局数据共享、分包
Smart management of Green Cities: Digital twin underground integrated pipe gallery platform
Network security - dynamic routing protocol rip
[QT] encapsulation of custom controls
数学知识:Nim游戏—博弈论
[shutter] animation animation (basic process of shutter animation | create animation controller | create animation | set value listener | set state listener | use animation values in layout | animatio
Mathematical knowledge: divisible number inclusion exclusion principle
英语常用词汇
Learn the five skills you need to master in cloud computing application development
Everything文件搜索工具
Vant implements a simple login registration module and a personal user center
Vant 实现简单的登录注册模块以及个人用户中心
PS remove watermark details
Take you ten days to easily complete the go micro service series (II)
网络安全-中间人攻击
Network security ACL access control list