Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
TYPES OF INTRANET
On the basis of applications or use intranet are classified as
Communications intranet
Integrating intranet
Catalogue intranet
Single sign on intranet
Database management
Bulletin board
Information access
Client Workstation
Operating System
Microsoft Windows:
• Microsoft Windows XP Professional
• Microsoft Windows 2000
Database- NA
Processor -1.0 GHz Pentium
Monitor - SVGA with 256 or more colors minimum 800x600 resolution
Other - Internet Explorer 5.5 and Excel 97/2000/XP/2003, for Financial
Reports
CD-ROM Drive- NA
Free Disk Space - 300 MB for application files
Server Requirements
Windows 2000/2003/2008 Server OS (x86 and 64bit compatible)
Internet Information Server (IIS versions 5,6 or 7)
Intel Pentium III, (recommended dual core or quad core processor)
1 GB minimum RAM (recommend 2 GB)
600MB required for installation (recommended minimum 6 GB for uploaded
content/documents)
Monitor - SVGA with 256 or more colors minimum 800x600 resolution
Processor - For a 50-user system:
• 2 Processors, Pentium 4 or Xeon 2.0 GHz
For a 100-user system:
• 4 Processors, Pentium 4 or Xeon 2.0 GHz
Printer - A printer capable of printing 224 characters per line
CD-ROM Drive - Required
Pointing Device - A mouse, supported by Windows
Database:
Pervasive.SQL 8.7 and 9.1 for Novell NetWare/Microsoft Windows/Linux or
Oracle 8i/9i Enterprise Edition, Standard Edition and Standard Edition One
or Microsoft SQL Server 2000 and 2005
WHAT IS ENCRYPTION?
Encryption is the conversion of data into a form, called a cipher text,
that cannot be easily understood by unauthorized people.In cryptography,
encryption is the process of transforming information(referred to as plain
text) using an algorithm to make it unreadable to anyone except those
possessing special knowledge, usually referred to as akey..
Decryption is the process of converting encrypted data back into its
original form, so it can be understood.
Symmetric Encryption
Symmetric Encryption (also known as symmetric-key encryption,
single-key encryption, one-key encryption and private key encryption) is a
type of encryption where the same secret key is used to encrypt and
decrypt information or there is a simple transform between the two keys.
A secret key can be a number, a word, or just a string of random letters.
Secret key is applied to the information to change the content in a particular
way. This might be as simple as shifting each letter by a number of places
in the alphabet. Symmetric algorithms require that both the sender and the
receiver know the secret key, so they can encrypt and decrypt all
information.
There are two types of symmetric algorithms: stream algorithms(stream
ciphers) and block algorithms(block ciphers)
Types of Symmetric algorithms (Symmetric-key algorithms)
Symmetric algorithms (Symmetric-key algorithms) use the same key for
encryption and decryption. Symmetric-key algorithms can be divided into
Stream algorithms (Stream ciphers) and Block algorithms (Block ciphers).
1-Stream cipher
Stream ciphers encrypt the bits of information one at a time - operate on
1 bit (or sometimes 1 byte) of data at a time (encrypt data bit-by-bit).
Stream ciphers are faster and smaller to implement than block ciphers,
however, they have an important security gap. If the same key stream is
used, certain types of attacks may cause the information to be revealed.
2-Block Ciphers
Block cipher (method for encrypting data in blocks) is a symmetric
cipher which encrypts information by breaking it down into blocks and
encrypting data in each block. A block cipher encrypts data in fixed sized
blocks (commonly of 64 bits). The most used block ciphers are TRIPLE
DES and AES
Some examples of popular symmetric algorithms:
AES,DES,IDEA,TRIPLE DES
(i)AES
(iii)Triple DES
Triple DES is a variation of Data Encryption Standard (DES). It uses a 64-
bit key consisting of 56 effective key bits and 8 parity bits. The size of the
block for Triple-DES is 8 bytes. Triple-DES encrypts the data in 8-byte
chunks. The idea behind Triple DES is to improve the security of DES by
applying DES encryption three times using three different keys
Asymmetric Encryption (Public Key Encryption)
Asymmetric encryption uses different keys for encryption and decryption.
The decryption key is very hard to derive from the encryption key. The
encryption key is public so that anyone can encrypt a message. However,
the decryption key is private, so that only the receiver is able to decrypt the
message. It is common to set up "key-pairs" within a network so that each
user has a public and private key. The public key is made available to
everyone so that they can send messages, but the private key is only made
available to the person it belongs to.Asymmetric key encryption is much
slower than symmetric key encryption and hence they are only used for key
exchanges and digital signatures.
How Asymmetric Encryption (Public Key Encryption) works:
The sender and the reciever must have the same software. The
receiver makes a pair of keys - public key and private key .Public key can
be used by anyone with the same software to encrypt a message. Public
keys can be freely distributed without worrying since it is only used to
scramble (encrypt) the data.
The sender does not need the recipient's password to use his or her
public key to encrypt data. The recipient's other key is a private key that
only he or she can use when decrypting the message. Private key should
never be distributed since the private key assures that only the intended
recipient can unscramble (decrypt) data intended for him or her.
To uderstand assymetric encryption better please read an example:
For example, Jack makes public key A and private key A, and Jill makes
public key B and private key B. Jack and Jill exchange their public keys.
Once they have exchanged keys, Jack can send an encrypted message to
Jill by using Jill's public key B to scramble the message. Jill uses her
private key B to unscramble it. If Jill wants to send an encrypted message
to Jack, she uses Jack's public key A to scramble her message, which
Jack can then unscramble with his private key A. Asymmetric cryptography
is typically slower to execute electronically than symmetric cryptography.
PASSWORDS SECURITY
FIREWALL
Type Of Firewall
Packet Filter
Proxy Server
Packet filter-
A packet filter performs following functions
• Receive each packets as it arrives
• Pass the packet through rules,based on IP adress and header of the
packet. Let us take an example to understand it more clearly
A table is used to decide which packet should be accepted and which
should be rejected as shown below .
When user client sends a message,the proxy firewall runs a server process
to receive the request.the server opens the packet at application level and
find out if request is legitimate.If it is ,the server act as a client and send
message to real server.If it is not an error message is sent to external
user.Thus request of external users are filtered based on content of
application layer.
VPN
TUNN
EL Y
FI FIREWALL 2
NETWORK 1
REWALL 1
NETWORK 2
FIG:VPN BETWEEN TWO PRIVATE NETWORK
SOURCE
ADDRESS
X Y OTHER HEADER AND
2-PacketACTUAL
reaches firewall 1.It adds new header and changes source IP
DATA
address of packetDESTINATION
from X to its own IP address(f1).It also changes
ADDRESS
destination IP address from Y to IP address of firewall 2(f2).It also performs
encryption and authentication and sends the packet over internet.
3-Packet reaches firewall 2 via internet.It discards the outer header and
decrypt to get original packet as was created by host X.It then realizes that
packet is meant for host Y and then delivers the packet to host Y.
ELECTRONIC MAIL
One of the most popular Internet services is electronic mail (e-mail). Its
architecture consists of several components.
Architecture:
• When the sender and the receiver of an e-mail are on the same
system,we need only two user agents
• When the sender and the receiver of an e-mail are on different
systems, we need two UAs and a pair of MTAs (client and server).
• When both sender and receiver are connected to the mail server
via a LAN or a WAN, we need two UAs, two pairs of MTAs and a
pair of MAAs.
This is the most common situation today.
Services of user agent:
• Composing messages
• reading messages
• replying to messages
• forwarding messages
• handling mailboxes
SMTP,POP3/IMAP4
SMTP is used two times. Between the sender and senders mail server and
between two mail server.it defines how commands a nd response must be
send back and forth.
The protocol that supports email on the Internet is called Simple Mail
Transfer Protocol (SMTP).
* The UA prepares the message, creates the envelope, and puts the
message in the envelope.
* The email address consists of two parts: a local address (user mailbox)
and a domain name. The form is localname@domainname.
* The MTA transfers the email across the Internet.
* SMTP uses commands and responses to transfer messages between an
MTA client and an MTA server.
* The steps in transferring a mail message are connection establishment,
message transfer, and connection termination
TABLE: RESPONSE
Post Office Protocol, version 3 (POP3) and Internet Mail Access Protocol,
version 4 (IMAP4) are protocols used by a mail server in conjunction with
SMTP to receive and hold email for hosts.
POP 3 Has two modes-delete mode and keep mode.in delete mode mail is
deleted from mailboxes after each retrieval .in keep mode the mail remains
in the mailbox after retrieval.
Pop 3 is deficient in several ways.it does not allow user to organize her
mail on server.the user cannot have different folders on the server.It does
not allow user to partially check the content of mail before downloading.
Following are the four cases in which ARP services can be used.
COAXIAL CABLE-
Coaxial cable has the following layers (starting from the center): a metallic
rod-shaped inner conductor, an insulator covering the rod, a metallic outer
conductor (shield), an insulator covering the shield, and a plastic cover.
* Coaxial cable can carry signals of higher frequency ranges than twisted-
pair cable.
* Coaxial cable is used in cable TV networks and traditional Ethernet LANs.
Figure 7.7 Coaxial cable
ARCHITECTURE
The World Wide Web is a repository of information spread all over the
world and linked together.
* Hypertext and hypermedia are documents linked to one another through
the con-cept of pointers.
* Browsers interpret and display a Web document.
* A browser consists of a controller, client programs, and interpreters
Figure - URL
WEB DOCUMENTS
The documents in the WWW can be grouped into three broad categories:
static, dynamic, and active. The category is based on the time at which the
contents of the document are determined.
1-Static Documents-
A static document is one in which the contents are fixed and stored in a
server. The client can make no changes in the server document.
* Hypertext Markup Language (HTML) is a language used to create static
Web pages
2- Dynamic Document-
HTTP