fwt1 internet technology

Upload: bhagyashree-mall

Post on 07-Apr-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/4/2019 FWT1 Internet Technology

    1/20

    1

    Internet Technology

    Subject InchargePratidnya S. Hegde Patil

    2

    Subject Topics Basics of Internet & Web Technology HTML HTML Forms with JavaScript JavaScript CSS Java Applets & ActiveX Controls ASP CGI with Perl Cookies Ecommerce Security

    HTML & WebDesign Tips &Techniques,Kris Jamsa,Konrad King,Andy Anderson

    Web Applications, Craig Knuckles, David Yuen

  • 8/4/2019 FWT1 Internet Technology

    2/20

    The Inter-network is a big network

    of networks.

    3

    4

    Internet The Internet is a massive network of networks, a

    networking infrastructure.

    No one owns the Internet. Every person whomakes a connection owns a slice of the Internet.There is no central administration of Internet.

    It connects millions of computers togetherglobally, forming a network in which any

    computer can communicate with any othercomputer as long as they are both connected tothe Internet. Information that travels over theInternet does so via a variety of languagesknown as protocols.

  • 8/4/2019 FWT1 Internet Technology

    3/20

    5

    Need for Internet

    Proprietary computers forming islands ofnetworks.

    Need of people grew with time so that a usernetwork A to communicate to user on network B.

    There should be a way of communicationbetween (compatibility). Eg : Network of IBMcomputer were unknown entity to a network ofHP computers.

    All networks connected through some backbone

    network.

    6

    What is an Internet ?

    A community of people

    Who use and develop the networks

    A collection of resources

    That can be reached from those networks.

    A setup to facilitate collaboration

    Among members of the research and

    educational communities, world wide. The connected networks use the TCP/IP

    protocol.

  • 8/4/2019 FWT1 Internet Technology

    4/20

    Client/Server Architecture

    Numerous applications run in a client/server environment,this means that client computers (computers formingpart of the network) contact a server, generally a verypowerful computer in terms of input/output, which providesservices to the client computers. These services areprogrammes which provide data such as the time, files, aconnection, etc.

    The services are used by programs client programs whichrun on client computers. Designed to run on a clientcomputer, capable of processing data received from a

    server (in the case of the FTP client we are dealing withfiles whereas for the email client we deal with email).

    7

    Advantages of Client/Server Model Centralised resources: given that the server is the centre of the

    network, it can manage resources that are common to all users,for example: a central database would be used to avoid problemscaused by redundant and inconsistent data.

    Improved security: as the number of entry points giving accessto data is not so important.

    Server level administration: as clients do not play a major rolein this model, they require less administration.

    Scalable network: thanks to this architecture it is possible toremove or add clients without affecting the operation of thenetwork and without the need for major modification.

    8

  • 8/4/2019 FWT1 Internet Technology

    5/20

    Disadvantages of Client/Server

    Model

    Increased cost: due to the technical complexityof the server.

    A weak link: the server is the only weak link inthe client/server network, given that the entirenetwork is built around it! Fortunately, the serveris highly fault tolerant (primarily thanks to theRAID system).

    9

    Client/Server system operation

    The client sends arequest to the serverusing its IP address andthe port, which isreserved for a particularservice running on theserver.

    The server receives therequest and respondsusing the client IPaddress and port.

    10

  • 8/4/2019 FWT1 Internet Technology

    6/20

    2 Tier Architecture

    2-tier architecture is usedto describe client/serversystems where the clientrequests resources and theserver responds directly tothe request, using its ownresources.

    The server does not call onanother application inorder to provide part of the

    service.

    11

    3 Tier Architecture In 3-tier architecture, there is

    an intermediary level,meaning the architecture isgenerally split up between:

    A client, i.e. the computer,which requests the resources,equipped with a user interface(usually a web browser) forpresentation purposes

    The application server (also

    called middleware), whosetask it is to provide therequested resources, but bycalling on another server

    The data server, whichprovides the applicationserver with the data itrequires

    12

  • 8/4/2019 FWT1 Internet Technology

    7/20

    Comparing 2 & 3 Tier Architectures

    2-tier architecture is a client-server architecture where theserver is versatile, i.e. it is capable of directly responding toall of the client's resource requests.

    In 3-tier architecture however, the server-level applicationsare remote from one another, i.e. each server is specializedwith a certain task (for example: web server/databaseserver).

    3-tier architecture provides: A greater degree of flexibility

    Increased security, as security can be defined for each service, and at

    each level Increased performance, as tasks are shared between servers

    13

    Multi Tier Architecture

    In 3-tier architecture, eachserver (tier 2 and 3) performsa specialized task (a service).

    A server can therefore useservices from other servers inorder to provide its ownservice.

    As a result, 3-tier architectureis potentially an n-tieredarchitecture

    14

  • 8/4/2019 FWT1 Internet Technology

    8/20

    TCP/IP Protocol

    15

    The five-layer networking model for theinternet

  • 8/4/2019 FWT1 Internet Technology

    9/20

    17

    TCP/IP TCP/IP is the communication protocol for the internet.

    TCP/IP defines the rule computers must follow tocommunicate with each other over the internet.

    TCP/IP standard there are several protocols for handlingdata communication: TCP (Transmission Control Protocol) communication between

    applications UDP (User Datagram Protocol) simple communication between

    applications IP (Internet Protocol) communication between computers ICMP (Internet Control Message Protocol) for errors and

    statistics DHCP (Dynamic Host Configuration Protocol) for dynamic

    addressing

    18

    TCP TCP is for communication between applications.

    If one application wants to communicate with another viaTCP, it sends a communication request. This request mustbe sent to an exact address. After a "handshake" betweenthe two applications, TCP will set up a "full-duplex"communication between the two applications.

    The "full-duplex" communication will occupy thecommunication line between the two computers until it is

    closed by one of the two applications.

    UDP is very similar to TCP, but simpler and less reliable.

  • 8/4/2019 FWT1 Internet Technology

    10/20

    19

    IP

    Network layer protocol of internet isInternet Protocol (IP).

    Its job is to provide a best-effort way totransport datagrams from source todestination, without regard to whether ornot these machines are on the samenetwork, or whether or not there are othernetworks in between them.

    20

    IP Addresses

    Every host & router on the Internet has an IPaddress, which encodes its network number andhost number.

    All IP addresses are 32 bits long and are used inthe source address & destination address fields ofIP packets.

    Those machines connected to multiple networkshave a different IP address on each network.

  • 8/4/2019 FWT1 Internet Technology

    11/20

    21

    Internet Control Message Protocol (ICMP)

    The operation of the Internet is monitored closelyby the routers. When something unexpectedoccurs, the event is reported by the ICMP whichis also used to test the Internet.

    Each ICMP message type is encapsulated in an IPpacket.

    Messages like : DESTINATION UNREACHABLE,

    TIME EXCEEDED, PARAMETER PROBLEM,REDIRECT etc.

    22

    Applications of Internet1.Remote Login

    TELNETRlogin

    2.File Transfer and AccessFTP

    TFTPNFS3.Electronic Mail

    SMTPMIME

    4.Internet ManagementSNMP

    5.USENET NEWS

  • 8/4/2019 FWT1 Internet Technology

    12/20

    23

    Terminal Network Emulator (TELNET)

    Allows a user at one site to establish a TCP connection to alogin server at another.

    It then passes keystrokes from the users keyboard directlyto the remote computer as if they had been typed on akeyboard attached to the remote machine.

    It also carries output from the remote machine back to theusers screen. The service is called transparent because itgives the appearance that he users keyboard and displayattach directly to the remote machine.

    24

    TELNET Ex: when a user invokes TELNET, an application program

    on the users machine becomes the client. The clientestablishes a TCP connection to the server over which theywill communicate. Once the connection has beenestablished, the client accepts keystrokes from the userskeyboard and sends them to the server, while itconcurrently accepts characters that the server sends backand displays them on the users screen. Then server mustaccept a TCP connection from the client, and then relaydata between the TCP connection and the local operatingsystem.

  • 8/4/2019 FWT1 Internet Technology

    13/20

    25

    Remote Login (Rlogin) Operating system derived from BSD UNIX includes a

    remote login service, rlogin, that supports trusted hosts.

    It allows system administrators to choose a set of machinesover which login names and file access protections areshared and to establish equivalences among user logins.

    Users can control access to their accounts by authorizingremote login based on remote host and remote user name.Thus, it is possible for a user to have login name X on onemachine and Y on another, and still be able to remotelylogin from one of the machines to the other without typing

    a password each time.

    26

    File Transfer Protocol (FTP) For managing files across machines without having to establish a remote

    session with Telnet. FTP enables you to transfer files back and forth,manage directories. FTP is not designed to enable access to anothermachine to execute programs, but it is the best utility for file transfers.

    FTP uses two TCP channels. TCP port 20 is the data channel, and port 21 isthe command channel. FTP is different from most other TCP/IP applicationprograms in that it does use two channels, enabling simultaneous transferof FTP commands and data. It also differs in one other important aspect:FTP conducts all file transfers in the foreground, instead of the background.In other words, FTP does not use spoolers or queues, so you are watchingthe transfer process in real time. By using TCP, FTP eliminates the need toworry about reliability or connection management, because FTP can rely onTCP to perform these functions properly.

  • 8/4/2019 FWT1 Internet Technology

    14/20

    27

    Trivial File Transfer Protocol (TFTP) It differs from FTP in two primary ways: it does not log onto the remote

    machine, and it uses the User Datagram Protocol (UDP) connectionlesstransport protocol instead of TCP. By using UDP, TFTP does not monitorthe progress of the file transfer, although it does have to employ morecomplex algorithms to ensure proper data integrity. By avoiding loggingonto the remote, user access and file permission problems are avoided.TFTP uses the TCP port identifier number 69, even though TCP is notinvolved in the protocol.

    TFTP has few advantages over FTP. It is not usually used for file transfersbetween machines where FTP could be used instead, although TFTP isuseful when a diskless terminal or workstation is involved. Typically, TFTPis used to load applications and fonts into these machines, as well as forbootstrapping. TFTP is necessary in these cases because the disklessmachines cannot execute FTP until they are fully loaded with an operatingsystem. TFTP's small executable size and memory requirements make itideal for inclusion in a bootstrap, where the system requires only TFTP,UDP, and a network driver, all of which can be provided in a small EPROM.

    It runs on top of UDP or any other unreliable packet delivery system,using timeout and retransmission to ensure that data arrives. The sendingside transmits a file in fixed size blocks and awaits an acknowledgementfor each block before sending the next. The receiver acknowledges eachblock upon receipt.

    28

    Network File System (NFS)

    NFS provides on-line shared file accessthat is transparent and integrated; manyTCP/IP sites use NFS to interconnect theircomputers file system.

    From the users perspective NFS is almostinvisible. A user can execute an arbitrary

    application program and use arbitrary filesfor input or output. The file namesthemselves do not show whether the filesare local or remote.

  • 8/4/2019 FWT1 Internet Technology

    15/20

    29

    Email System

    Electronic mail is among the most widelyavailable application services. Like mostTCP/IP services, it uses the client-server

    paradigm. The mail system buffers outgoingand incoming messages, allowing the transfer

    from client and server to occur in

    background.

    30

    Electronic mail (email) Email systems consists of two subsystems :

    user agents, which allow people to read and sendemail. They are local programs that provide interfacefor interacting with the email system.

    message transfer agents, which move themessages from the source to the destination. They aresystem daemons that run in the background andmove email through the system.

    Five basic functions:1. Composition : process of creating messages and answers.2.

    Transfer : moving messages from the originator to therecipient.3. Reporting : telling the originator what happened to the

    message.4. Displaying : Simple conversions and formatting required for

    reading incoming messages.5. Disposition : Concerns what the recipient does with the

    message after receiving it.

  • 8/4/2019 FWT1 Internet Technology

    16/20

    31

    Message Transfer

    Establish a transport connectionfrom the source machine to thedestination machine and thenjust transfer the message

    32

    Simple Mail Transfer Protocol (SMTP)

    Simple ASCII protocol.

    Within the Internet, email is delivered by havingthe source machine establish a TCP connection toport 25 of the destination machine. Listening tothis port is an email daemon that speaks SMTP.

    This daemon accepts incoming connections and

    copies messages into the appropriate mailboxes.If message not delivered, an error reportcontaining the first part of the undeliveredmessage is returned to the sender.

  • 8/4/2019 FWT1 Internet Technology

    17/20

    33

    Post Office Protocol (POP) Simple protocol used for fetching email from a remote

    mailbox.

    Ex : In many companies, users work at desktop PCs thatare not on the Internet and are not capable of sending orreceiving email from outside the company. Instead thecompany has one or more email servers that can send andreceive email.

    Useful to only user having one workstation.

    To send or receive messages, one must talk to an emailserver using some kind of delivery protocol.

    The goal of POP is to fetch email from the remote mailboxand store it on the users local machine to be read later.

    34

    Interactive Mail Access Protocol (IMAP)

    A more sophisticated delivery protocol than POP.

    It was designed to help the user who usesmultiple computers, perhaps a workstation in theoffice, a PC at home, and a laptop on the road.

    The goal of IMAP is to maintain a central

    repository that can be accessed from anymachine. Unlike POP, IMAP does not copy emailto users personal machine because the user canhave many access points.

  • 8/4/2019 FWT1 Internet Technology

    18/20

    35

    Distributed Mail System Protocol (DMSP)

    Also known as PCMAIL.

    It allows users to download email from theserver to a workstation, PC, or laptop andthen disconnect.

    The email can be read and answered while

    disconnected. When reconnection occurslater, email is transferred and the systemis resynchronized.

    36

    Message Formats

    Format of the email messages

  • 8/4/2019 FWT1 Internet Technology

    19/20

    37

    Multipurpose Internet Mail Extensions (MIME)

    In the early days of the ARPANET, email consisted exclusively oftext messages written in English and expressed in ASCII. But forworldwide Internet, this approach is no longer adequate.

    MIME uses the basic RFC 822 format (text format) but also addsstructure to the message body and defines encoding rules fornon-ASCII messages.

    MIME messages can be sent using the existing mail programs andprotocols only the sending and receiving programs are changed.

    Multipurpose Internet Mail Extensions is a standard used toencode data such as images as printable. MIME adds lines to theheader of an e-mail message to define the type of the data andencoding used. MIMEs mixed multipart type permits a singlemessage to contain multiple data types.

    38

    Network Management

    In addition to protocols that provide networklevel services and application programs that

    use those services, an Internet needssoftware that allow managers to debug

    problems, control routing and find computers

    that violate protocol standards. Suchactivities are referred as InternetManagement.

  • 8/4/2019 FWT1 Internet Technology

    20/20

    39

    Simple Network Monitoring Protocol (SNMP)

    It is a standard protocol used to monitor hosts, routers andthe networks to which they attach.

    A router being managed must keep control and statusinformation that the manager can access.

    For example, router keeps statistics on the status of itsnetwork interfaces, incoming and outgoing traffic, droppeddatagrams, and error messages generated. Although itallows a manager to access these statistics, SNMP does notspecify exactly which data can be accessed. Instead, aseparate standard specifies the details. Known as

    Management Information Base (MIB), the standardspecifies the data items a host or router must keep and theoperations allowed on each.

    40

    USENET NEWS

    A newsgroup is a worldwide discussion forum onsome specific topic. People interested in thesubject can subscribe to the newsgroup.

    Subscribers can use a special kind ofuser agent,a news reader, to read all the articles to thenewsgroup.

    People can also post articles to the newsgroup.Each article posted to a newsgroup isautomatically delivered to all the subscribers,wherever they may be in the world.