Sei sulla pagina 1di 20

Internet Technology

Subject Incharge Pratidnya S. Hegde Patil


1

Subject Topics
Basics of Internet & Web Technology HTML HTML Forms with JavaScript JavaScript CSS Java Applets & ActiveX Controls ASP CGI with Perl Web Applications, Craig Cookies Ecommerce Security HTML & Web Design Tips & Techniques, Kris Jamsa, Konrad King, Andy Anderson Knuckles, David Yuen

The Inter-network is a big network of networks.

Internet
The Internet is a massive network of networks, a networking infrastructure. No one owns the Internet. Every person who makes a connection owns a slice of the Internet. There is no central administration of Internet. It connects millions of computers together globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the Internet. Information that travels over the Internet does so via a variety of languages known as protocols.
4

Need for Internet


Proprietary computers forming islands of networks. Need of people grew with time so that a user network A to communicate to user on network B. There should be a way of communication between (compatibility). Eg : Network of IBM computer were unknown entity to a network of HP computers. All networks connected through some backbone network.

What is an Internet ?
A community of people
Who use and develop the networks

A collection of resources
That can be reached from those networks.

A setup to facilitate collaboration


Among members of the research educational communities, world wide. and

The connected networks use the TCP/IP protocol.


6

Client/Server Architecture
Numerous applications run in a client/server environment, this means that client computers (computers forming part of the network) contact a server, generally a very powerful computer in terms of input/output, which provides services to the client computers. These services are programmes which provide data such as the time, files, a connection, etc. The services are used by programs client programs which run on client computers. Designed to run on a client computer, capable of processing data received from a server (in the case of the FTP client we are dealing with files whereas for the email client we deal with email).
7

Advantages of Client/Server Model


Centralised resources: given that the server is the centre of the network, it can manage resources that are common to all users, for example: a central database would be used to avoid problems caused by redundant and inconsistent data. Improved security: as the number of entry points giving access to data is not so important. Server level administration: as clients do not play a major role in this model, they require less administration. Scalable network: thanks to this architecture it is possible to remove or add clients without affecting the operation of the network and without the need for major modification.
8

Disadvantages of Client/Server Model


Increased cost: due to the technical complexity of the server. A weak link: the server is the only weak link in the client/server network, given that the entire network is built around it! Fortunately, the server is highly fault tolerant (primarily thanks to the RAID system).

Client/Server system operation


The client sends a request to the server using its IP address and the port, which is reserved for a particular service running on the server. The server receives the request and responds using the client IP address and port.
10

2 Tier Architecture
2-tier architecture is used to describe client/server systems where the client requests resources and the server responds directly to the request, using its own resources. The server does not call on in another application order to provide part of the service.

11

3 Tier Architecture
In 3-tier architecture, there is intermediary level, an meaning the architecture is generally split up between: A client, i.e. the computer, which requests the resources, equipped with a user interface (usually a web browser) for presentation purposes The application server (also called middleware), whose task it is to provide the requested resources, but by calling on another server The data server, which provides the application server with the data it requires

12

Comparing 2 & 3 Tier Architectures


2-tier architecture is a client-server architecture where the server is versatile, i.e. it is capable of directly responding to all of the client's resource requests. In 3-tier architecture however, the server-level applications are remote from one another, i.e. each server is specialized with a certain task (for example: web server/database server). 3-tier architecture provides:
A greater degree of flexibility Increased security, as security can be defined for each service, and at each level Increased performance, as tasks are shared between servers

13

Multi Tier Architecture


In 3-tier architecture, each server (tier 2 and 3) performs a specialized task (a service). A server can therefore use services from other servers in order to provide its own service. As a result, 3-tier architecture is potentially an n-tiered architecture

14

TCP/IP Protocol

15

The five-layer networking model for the internet

TCP/IP
TCP/IP is the communication protocol for the internet. TCP/IP defines the rule computers must communicate with each other over the internet. follow to

TCP/IP standard there are several protocols for handling data communication:
TCP (Transmission Control Protocol) communication between applications UDP (User Datagram Protocol) simple communication between applications IP (Internet Protocol) communication between computers ICMP (Internet Control Message Protocol) for errors and statistics DHCP (Dynamic Host Configuration Protocol) for dynamic addressing
17

TCP
TCP is for communication between applications. If one application wants to communicate with another via TCP, it sends a communication request. This request must be sent to an exact address. After a "handshake" between the two applications, TCP will set up a "full-duplex" communication between the two applications. The "full-duplex" communication will occupy the communication line between the two computers until it is closed by one of the two applications. UDP is very similar to TCP, but simpler and less reliable.

18

IP
Network layer protocol Internet Protocol (IP). of internet is

Its job is to provide a best-effort way to transport datagrams from source to destination, without regard to whether or not these machines are on the same network, or whether or not there are other networks in between them.
19

IP Addresses
Every host & router on the Internet has an IP address, which encodes its network number and host number. All IP addresses are 32 bits long and are used in the source address & destination address fields of IP packets. Those machines connected to multiple networks have a different IP address on each network.
20

10

Internet Control Message Protocol (ICMP)


The operation of the Internet is monitored closely by the routers. When something unexpected occurs, the event is reported by the ICMP which is also used to test the Internet. Each ICMP message type is encapsulated in an IP packet. Messages like : DESTINATION UNREACHABLE, TIME EXCEEDED, PARAMETER PROBLEM, REDIRECT etc.
21

Applications of Internet
1.Remote Login TELNET Rlogin 2.File Transfer and Access FTP TFTP NFS 3.Electronic Mail SMTP MIME 4.Internet Management SNMP 5.USENET NEWS

22

11

Terminal Network Emulator (TELNET)


Allows a user at one site to establish a TCP connection to a login server at another. It then passes keystrokes from the users keyboard directly to the remote computer as if they had been typed on a keyboard attached to the remote machine. It also carries output from the remote machine back to the users screen. The service is called transparent because it gives the appearance that he users keyboard and display attach directly to the remote machine.

23

TELNET
Ex: when a user invokes TELNET, an application program on the users machine becomes the client. The client establishes a TCP connection to the server over which they will communicate. Once the connection has been established, the client accepts keystrokes from the users keyboard and sends them to the server, while it concurrently accepts characters that the server sends back and displays them on the users screen. Then server must accept a TCP connection from the client, and then relay data between the TCP connection and the local operating system.

24

12

Remote Login (Rlogin)


Operating system derived from BSD UNIX includes a remote login service, rlogin, that supports trusted hosts. It allows system administrators to choose a set of machines over which login names and file access protections are shared and to establish equivalences among user logins. Users can control access to their accounts by authorizing remote login based on remote host and remote user name. Thus, it is possible for a user to have login name X on one machine and Y on another, and still be able to remotely login from one of the machines to the other without typing a password each time.

25

File Transfer Protocol (FTP)


For managing files across machines without having to establish a remote session with Telnet. FTP enables you to transfer files back and forth, manage directories. FTP is not designed to enable access to another machine to execute programs, but it is the best utility for file transfers. FTP uses two TCP channels. TCP port 20 is the data channel, and port 21 is the command channel. FTP is different from most other TCP/IP application programs in that it does use two channels, enabling simultaneous transfer of FTP commands and data. It also differs in one other important aspect: FTP conducts all file transfers in the foreground, instead of the background. In other words, FTP does not use spoolers or queues, so you are watching the transfer process in real time. By using TCP, FTP eliminates the need to worry about reliability or connection management, because FTP can rely on TCP to perform these functions properly.

26

13

Trivial File Transfer Protocol (TFTP)


It differs from FTP in two primary ways: it does not log onto the remote machine, and it uses the User Datagram Protocol (UDP) connectionless transport protocol instead of TCP. By using UDP, TFTP does not monitor the progress of the file transfer, although it does have to employ more complex algorithms to ensure proper data integrity. By avoiding logging onto the remote, user access and file permission problems are avoided. TFTP uses the TCP port identifier number 69, even though TCP is not involved in the protocol. TFTP has few advantages over FTP. It is not usually used for file transfers between machines where FTP could be used instead, although TFTP is useful when a diskless terminal or workstation is involved. Typically, TFTP is used to load applications and fonts into these machines, as well as for bootstrapping. TFTP is necessary in these cases because the diskless machines cannot execute FTP until they are fully loaded with an operating system. TFTP's small executable size and memory requirements make it ideal for inclusion in a bootstrap, where the system requires only TFTP, UDP, and a network driver, all of which can be provided in a small EPROM. It runs on top of UDP or any other unreliable packet delivery system, using timeout and retransmission to ensure that data arrives. The sending side transmits a file in fixed size blocks and awaits an acknowledgement for each block before sending the next. The receiver acknowledges each 27 block upon receipt.

Network File System (NFS)


NFS provides on-line shared file access that is transparent and integrated; many TCP/IP sites use NFS to interconnect their computers file system. From the users perspective NFS is almost invisible. A user can execute an arbitrary application program and use arbitrary files for input or output. The file names themselves do not show whether the files are local or remote.
28

14

Email System
Electronic mail is among the most widely available application services. Like most TCP/IP services, it uses the client-server paradigm. The mail system buffers outgoing and incoming messages, allowing the transfer from client and server to occur in background.

29

Electronic mail (email)


Email systems consists of two subsystems : user agents, which allow people to read and send email. They are local programs that provide interface for interacting with the email system. message transfer agents, which move the messages from the source to the destination. They are system daemons that run in the background and move email through the system. Five basic functions:
1. 2. 3. 4. 5.

Composition : process of creating messages and answers. Transfer : moving messages from the originator to the recipient. Reporting : telling the originator what happened to the message. Displaying : Simple conversions and formatting required for reading incoming messages. Disposition : Concerns what the recipient does with the message after receiving it.

30

15

Message Transfer
Establish a transport connection from the source machine to the destination machine and then just transfer the message

31

Simple Mail Transfer Protocol (SMTP)


Simple ASCII protocol. Within the the source port 25 of this port is Internet, email is delivered by having machine establish a TCP connection to the destination machine. Listening to an email daemon that speaks SMTP.

This daemon accepts incoming connections and copies messages into the appropriate mailboxes. If message not delivered, an error report containing the first part of the undelivered message is returned to the sender.
32

16

Post Office Protocol (POP)


Simple protocol used for fetching email from a remote mailbox. Ex : In many companies, users work at desktop PCs that are not on the Internet and are not capable of sending or receiving email from outside the company. Instead the company has one or more email servers that can send and receive email. Useful to only user having one workstation. To send or receive messages, one must talk to an email server using some kind of delivery protocol. The goal of POP is to fetch email from the remote mailbox and store it on the users local machine to be read later. 33

Interactive Mail Access Protocol (IMAP)


A more sophisticated delivery protocol than POP. It was designed to help the user who uses multiple computers, perhaps a workstation in the office, a PC at home, and a laptop on the road. The goal of IMAP is to maintain a central repository that can be accessed from any machine. Unlike POP, IMAP does not copy email to users personal machine because the user can have many access points.
34

17

Distributed Mail System Protocol (DMSP)


Also known as PCMAIL. It allows users to download email from the server to a workstation, PC, or laptop and then disconnect. The email can be read and answered while disconnected. When reconnection occurs later, email is transferred and the system is resynchronized.
35

Message Formats
Format of the email messages

36

18

Multipurpose Internet Mail Extensions (MIME)


In the early days of the ARPANET, email consisted exclusively of text messages written in English and expressed in ASCII. But for worldwide Internet, this approach is no longer adequate. MIME uses the basic RFC 822 format (text format) but also adds structure to the message body and defines encoding rules for non-ASCII messages. MIME messages can be sent using the existing mail programs and protocols only the sending and receiving programs are changed. Multipurpose Internet Mail Extensions is a standard used to encode data such as images as printable. MIME adds lines to the header of an e-mail message to define the type of the data and encoding used. MIMEs mixed multipart type permits a single message to contain multiple data types.

37

Network Management
In addition to protocols that provide network level services and application programs that use those services, an Internet needs software that allow managers to debug problems, control routing and find computers that violate protocol standards. Such activities are referred as Internet Management.

38

19

Simple Network Monitoring Protocol (SNMP)


It is a standard protocol used to monitor hosts, routers and the networks to which they attach. A router being managed must keep control and status information that the manager can access. For example, router keeps statistics on the status of its network interfaces, incoming and outgoing traffic, dropped datagrams, and error messages generated. Although it allows a manager to access these statistics, SNMP does not specify exactly which data can be accessed. Instead, a separate standard specifies the details. Known as Management Information Base (MIB), the standard specifies the data items a host or router must keep and the operations allowed on each.
39

USENET NEWS
A newsgroup is a worldwide discussion forum on some specific topic. People interested in the subject can subscribe to the newsgroup. Subscribers can use a special kind of user agent, a news reader, to read all the articles to the newsgroup. People can also post articles to the newsgroup. Each article posted to a newsgroup is automatically delivered to all the subscribers, wherever they may be in the world.
40

20

Potrebbero piacerti anche