Have questions? Call now! (ID:229235)+1-855-211-0932

Goo Hosting

HomeHosting ArticlesHow Dedicated Servers Work

How Dedicated Servers Work

When we talk about hosting web servers, there are three basic categories - shared hosting servers, VPS (virtual private web hosting servers) and dedicated servers. Shared hosting web servers host a lot of customers and therefore the resources per hosting account are limited, virtual private servers give you more server configuration freedom, but also affect other virtual private hosting servers on the hardware node if used heedlessly, and dedicated servers give you the possibility to do everything you think fit without interfering with anyone else.

Why would you need a dedicated servers?

Intel Atom D525 1.8 GHz (2 cores)
2x240 GB SSD Hard Drives
34.72* /mo
€38.58 /mo
Please wait...
Xeon E3 v5
Xeon E3-1240L V5 2.10 GHz (4 Cores)
2x240 GB SSD Hard Drives
70.36* /mo
€84.42 /mo
Please wait...

Dedicated servers are traditionally much more high-priced than shared web servers or virtual web hosting servers. Why would anyone, then, want to use them? The answer is quite simple. If your firm has a high resource-demanding web page, or simply has very explicit web server configuration requirements, the wisest choice is a dedicated servers. For somebody who is ready to invest in safety and dependability, the higher price is not an issue. You gain complete root-level access and can use 100% of the web server's system resources without anyone else availing of these system resources and interfering with your online portals.

Hardware configurations

The majority of website hosting vendors, incl. us at Goo Hosting, provide different hardware architectures you can pick from based on your necessities. The configurations include different kinds of microprocessors, a different number of cores, different RAM memory and disk drive sizes and different bandwidth usage quotas. You can pick a web hosting Control Panel, which is a handy interface if you would like to use the dedicated servers for website hosting purposes only and prefer not to resort to an SSH console for all the modifications you will be making. We provide 3 kinds of hosting Control Panel software - Hepsia, DirectAdmin and cPanel.

The web hosting Control Panel of your choosing

If you are a self-confident Linux OS user (our dedicated hosting servers are running on Linux or other Unix-based Operating Systems), you could administer your dedicated servers through a Secure Shell terminal only. That, however, could be inconvenient, particularly if you choose to grant root access to somebody else who has less technical expertise than yourself. This is why having web hosting CP software activated is a smart idea. The Hepsia hosting Control Panel tool that we provide does not offer full root-level access and is mostly suitable for somebody who has a lot of web sites that devour a lot of system resources, but wants to administer the web pages, databases and e-mail accounts via an intuitive web hosting CP. The DirectAdmin and cPanel web hosting CPs, on the other hand, give you complete root access and offer 3 access levels - root, reseller and user. If you plan to resell hosting packages instead of using the dedicated servers only for yourself, you should choose one of these two.

Server monitoring and backup procedures

Last but not least, there is the issue of monitoring the dedicated servers and of backing it up. In case of a problem with your dedicated hosting server, such as an unresponsive Apache or a downtime, it is desirable to have some sort of monitoring system enabled. Here at Goo Hosting the system administrators monitor all dedicated servers for ping timeouts, and, if you order a Managed Services upgrade, they monitor the individual services on the dedicated servers as well. Backups are also a bonus feature - the hosting vendor offers you data backups on our own backup servers. You could choose a type of RAID that would permit you to have the very same data on 2 server disk drives as a precaution in the event of a hard disk drive failure, or in case someone whom you have given root-level access erases something by accident.