Client/ Server technologies and their applications - PowerPoint PPT Presentation

Loading...

PPT – Client/ Server technologies and their applications PowerPoint presentation | free to download - id: 5671af-MTFjM



Loading


The Adobe Flash plugin is needed to view this content

Get the plugin now

View by Category
About This Presentation
Title:

Client/ Server technologies and their applications

Description:

Client/ Server technologies and their applications Defining Local resources Network resources Server resources Database and information resources Security Threats ... – PowerPoint PPT presentation

Number of Views:603
Avg rating:3.0/5.0
Slides: 80
Provided by: csRtuLva
Learn more at: http://www.cs.rtu.lv
Category:

less

Write a Comment
User Comments (0)
Transcript and Presenter's Notes

Title: Client/ Server technologies and their applications


1
Client/ Server technologies and their
applications
2
Introduction to Networking
3
Networks Defined
  • Two or more connected computers that share data
  • Network evolution
  • Centralized (mainframe) models
  • Client/server models
  • Web-based networking

4
Mainframes
  • Retrieving information from mainframes
  • Mainframe liabilities
  • The future of mainframes

5
Mainframe Networking Model
6
Client/Server Model
  • The client/server model database example
  • SQL
  • Client/server advantages
  • Migration to client/server architecture
  • Workstations

7
Client/Server Networking Model
8
Web-Based Networking
  • Advantages
  • Mainframe model power
  • Client/server model scalability
  • Open, global solution

9
Networking Categories
  • Peer-to-peer
  • Server-based

10
Network Operating Systems
  • Interoperability
  • Novell NetWare
  • Microsoft Windows
  • UNIX

11
Networking Protocols
12
OSI (International Organization for
Standardization) Model Layers
Client Server
13
Packet Structure
14
TCP/IP
  • A collection of protocols
  • TCP
  • IP
  • An open standard

15
Additional Networking Protocols
  • NetBEUI
  • NetBIOS
  • AppleTalk

16
LANs and WANs
17
Local Area Networks (LANs)
  • A group of computers connected within a confined
    geographic area
  • Commonly used for intraoffice communication

18
Wide Area Networks (WANs)
  • A group of computers connected over an expansive
    geographic area

19
Network Access Points (NAPs)
  • Internet backbones
  • Backbone Network Service
  • Segments

20
Common Network Components
21
IEEE LAN Standards
  • IEEE 802.2
  • Ethernet/IEEE 802.3
  • IEEE 802.3ufast Ethernet
  • IEEE 802.3z and 802.3abgigabit Ethernet
  • IEEE 802.5token ring
  • IEEE 802-12100VG-AnyLAN

22
Additional LAN Standards
  • Apple LocalTalk
  • FDDI

23
T-Carrier System
T-Carrier Data Transfer Rate
T1 1.544 Mbps
T2 6.312 Mbps
T3 44.736 Mbps
T4 274.176 Mbps
24
E-Carrier System
E-Carrier Data Transfer Rate
E1 2.048 Mbps
E2 8.448 Mbps
E3 34.368 Mbps
E4 139.264 Mbps
E5 565.148 Mbps
25
TCP/IP Suite and Internet Addressing
26
Internet Architecture
27
Routing Protocols
28
Port Numbers
  • Well-known port numbers
  • Registered port numbers

29
Internet Addressing
field1.field2.field3.field4
Each field represents one byte of data
30
Reserved IP Addressing
  • 10.0.0.0 ? 10.255.255.255
  • 172.16.0.0 ? 172.31.255.255
  • 192.168.0.0 ? 192.168.255.255

31
Subnet Masks
  • Distinguish the network and host portions of an
    IP address
  • Specify whether a destination address is local or
    remote

32
Normal TCP/IP Desktop Configurations
  • Basic configurations
  • Name resolution configurations

33
Diagnostic Tools for Internet Troubleshooting
  • The ping command
  • The tracert command
  • The netstat command
  • The ipconfig commandWindows NT/2000
  • The arp command
  • Network analyzers

34
Internetworking Servers
35
Internetworking Servers
  • File and print
  • HTTP
  • Proxy
  • Caching
  • Mail
  • Mailing list
  • Media
  • DNS
  • FTP
  • News
  • Certificate
  • Directory
  • Catalog
  • Transaction

36
File and Print Servers
  • File servers
  • Print servers
  • Print queue
  • LPR/LPD

37
HTTP Server Essentials
  • Web server
  • Web gateways
  • Additional HTTP server considerations
  • Common Web servers

38
Proxy Servers
  • Caching Web documents
  • Providing corporate firewall access
  • Filtering client transactions
  • Logging transactions
  • Securing the host
  • Enabling enhanced administration

39
Caching Servers
  • Dedicated servers that speed data access by
    storing data retrieved by users, then presenting
    it directly to users

40
Mail Servers
  • SMTP
  • POP
  • IMAP
  • POP3

41
Mailing List Servers
  • Mailing List Manager
  • Public and private mailing lists
  • Mailing list server vendors

42
Media Servers
  • Streaming audio and video
  • Buffers

43
DNS Servers
  • Hosts file
  • DNS hierarchy
  • DNS components
  • DNS server types
  • DNS records

44
FTP Servers
  • Logging control
  • Access control

45
News Servers
  • Newsgroup issues
  • Policies
  • Security
  • Legalities

46
Certificate Servers
  • Keys
  • Identity theft
  • Digital certificates

47
Directory Servers
  • Directory service uses
  • Directory services protocols

48
Mirrored Servers
  • Mirror set
  • Redundant Array of Inexpensive Disks standard

49
Choosing the Ideal Server
  • Popular server products
  • Apache Web server
  • Microsoft IIS
  • Lotus Domino series
  • Sun-Netscape Alliance servers

50
Server-Side Scripting and Database Connectivity
51
Client-Side and Server-Side Scripting
  • Server-side includes
  • Active content

52
HTTP Gateways
  • Application program interface (API)
  • Client-side scripting
  • Load distribution
  • Transactions and download time

53
HTML Forms and Form Processing
  • ltFORMgt tag attributes
  • METHOD attribute
  • ACTION attribute

54
Common Gateway Interface
  • Where are CGI scripts located?
  • Benefits
  • Interpreted languages
  • Drawbacks
  • Out-of-process events

55
CGI Alternatives Server Programming Interfaces
  • SAPI
  • ISAPI
  • DLL files
  • NSAPI

56
CGI Alternatives Scripting Technologies
  • JSP
  • PHP
  • ASP
  • SSJS

57
CGI Alternatives Java Servlets
  • Java essentials
  • JVM
  • Java servlets versus scripting languages

58
Databases
  • Online Transaction Processing
  • Types
  • Nonrelational
  • Relational
  • Object-oriented
  • Common features of a DBMS, RDBMS or ODBMS
  • Hierarchical versus network
  • One-tier, two-tier, three-tier and n-tier

59
Two-Tier Computing Architecture
60
Three-Tier Computing Architecture
61
N-Tier Computing Architecture
62
Database Connectivity
  • ODBC
  • 16-bit versus 32-bit
  • Registering a database
  • JDBC

63
Database Connectivity Implementations
  • Server-Side JavaScript and LiveWire
  • ColdFusion
  • Save as HTML
  • ASP and ActiveX Data Objects

64
Network Security Essentials
65
(No Transcript)
66
Defining
  • Local resources
  • Network resources
  • Server resources
  • Database and information resources

67
Security Threats
  • Accidental threats
  • Intentional threats

68
Viruses
  • Types
  • Macros
  • Executables
  • Boot sector
  • Stealth
  • Polymorphic
  • Virus protection software
  • User education

69
The Hacker Process
  • Stage 1 Discovery
  • Stage 2 Penetration
  • Stage 3 Control

70
Defeating Attacks
  • OSI/RM security services
  • Authentication
  • Access control
  • Data confidentiality
  • Data integrity
  • Nonrepudiation

71
Auditing
  • Status quo analysis
  • Risk analysis
  • Threat analysis

72
Authentication
  • Proving what you know
  • Proving what you have
  • Proving who you are

73
Encryption
  • Symmetric-key encryption
  • Symmetric algorithms
  • Dictionary programs
  • Password sniffing
  • SSL
  • Asymmetric-key encryption

74
SSL
So slow connection?
(Secure sockets layer)
75
Virtual Private Networks
  • Tunneling protocols
  • Encryption occurs ? Source
  • Decryption occurs ? Destination
  • VPN using PPTP
  • VPN using L2TP
  • VPN using ISAKMP or IPSec

76
Firewalls
77
Packet Filters
  • Packet fields
  • Source IP address
  • Destination IP address
  • TCP/UDP source port
  • TCP/UDP destination port

78
Proxy Servers
  • Circuit-level gateways
  • Application-level gateways

79
Firewall Topology
  • Firewall implementations
  • Packet filter
  • Single-homed bastion host
  • Dual-homed bastion host
  • Screened subnet
About PowerShow.com