client/ server technologies and their applications

79
Client/ Server technologies and their applications

Upload: betty-lewis

Post on 23-Dec-2015

222 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Client/ Server technologies and their applications

Client/ Server technologies and their applications

Page 2: Client/ Server technologies and their applications

Introductionto Networking

Page 3: Client/ Server technologies and their applications

NetworksDefined

• Two or more connected computers that share data

• Network evolution– Centralized (mainframe) models– Client/server models– Web-based networking

Page 4: Client/ Server technologies and their applications

Mainframes

• Retrieving information from mainframes• Mainframe liabilities• The future of mainframes

Page 5: Client/ Server technologies and their applications

Mainframe Networking Model

Page 6: Client/ Server technologies and their applications

Client/ServerModel

• The client/server model database example– SQL

• Client/server advantages• Migration to client/server architecture

– Workstations

Page 7: Client/ Server technologies and their applications

Client/ServerNetworking Model

Page 8: Client/ Server technologies and their applications

Web-BasedNetworking

• Advantages– Mainframe model power– Client/server model scalability– Open, global solution

Page 9: Client/ Server technologies and their applications

NetworkingCategories

• Peer-to-peer• Server-based

Page 10: Client/ Server technologies and their applications

NetworkOperating Systems

• Interoperability– Novell NetWare– Microsoft Windows – UNIX

Page 11: Client/ Server technologies and their applications

NetworkingProtocols

Page 12: Client/ Server technologies and their applications

OSI (International Organization for Standardization)

Model Layers

Application

Presentation

Session

Transport

Network

Data Link

Physical

Application

Presentation

Session

Transport

Network

Data Link

Physical

Client Server

Page 13: Client/ Server technologies and their applications

PacketStructure

Trailer

Data

Header

Page 14: Client/ Server technologies and their applications

TCP/IP

• A collection of protocols– TCP– IP– An open standard

Page 15: Client/ Server technologies and their applications

AdditionalNetworking Protocols

• NetBEUI– NetBIOS

• AppleTalk

Page 16: Client/ Server technologies and their applications

LANs and WANs

Page 17: Client/ Server technologies and their applications

Local AreaNetworks (LANs)

• A group of computers connected within a confined geographic area

• Commonly used for intraoffice communication

Page 18: Client/ Server technologies and their applications

Wide AreaNetworks (WANs)

• A group of computers connected over an expansive geographic area

Page 19: Client/ Server technologies and their applications

NetworkAccess Points (NAPs)

• Internet backbones• Backbone Network

Service• Segments Atlanta

New York

Chicago

SanFrancisco

Boston

Phoenix

Seattle

Backbone

Backbone

Page 20: Client/ Server technologies and their applications

CommonNetwork Components

Page 21: Client/ Server technologies and their applications

IEEELAN Standards

• IEEE 802.2• Ethernet/IEEE 802.3• IEEE 802.3u—fast Ethernet• IEEE 802.3z and 802.3ab—gigabit Ethernet• IEEE 802.5—token ring• IEEE 802-12—100VG-AnyLAN

Page 22: Client/ Server technologies and their applications

AdditionalLAN Standards

• Apple LocalTalk• FDDI

Page 23: Client/ Server technologies and their applications

T-CarrierSystem

T-Carrier Data Transfer Rate

T1 1.544 Mbps

T2 6.312 Mbps

T3 44.736 Mbps

T4 274.176 Mbps

Page 24: Client/ Server technologies and their applications

E-CarrierSystem

E-Carrier Data Transfer Rate

E1 2.048 Mbps

E2 8.448 Mbps

E3 34.368 Mbps

E4 139.264 Mbps

E5 565.148 Mbps

Page 25: Client/ Server technologies and their applications

TCP/IP Suiteand Internet Addressing

Page 26: Client/ Server technologies and their applications

InternetArchitecture

Page 27: Client/ Server technologies and their applications

RoutingProtocols

Page 28: Client/ Server technologies and their applications

PortNumbers

• Well-known port numbers• Registered port numbers

Page 29: Client/ Server technologies and their applications

InternetAddressing

field1.field2.field3.field4

Each field represents one byte of data

Page 30: Client/ Server technologies and their applications

ReservedIP Addressing

• 10.0.0.0 10.255.255.255• 172.16.0.0 172.31.255.255• 192.168.0.0 192.168.255.255

Page 31: Client/ Server technologies and their applications

Subnet Masks

• Distinguish the network and host portions of an IP address

• Specify whether a destination address is local or remote

Page 32: Client/ Server technologies and their applications

Normal TCP/IPDesktop Configurations

• Basic configurations• Name resolution configurations

Page 33: Client/ Server technologies and their applications

Diagnostic Toolsfor Internet Troubleshooting

• The ping command• The tracert command• The netstat command• The ipconfig command—Windows NT/2000• The arp command• Network analyzers

Page 34: Client/ Server technologies and their applications

Internetworking Servers

Page 35: Client/ Server technologies and their applications

InternetworkingServers

• File and print• HTTP• Proxy• Caching• Mail• Mailing list• Media

• DNS• FTP• News• Certificate• Directory• Catalog• Transaction

Page 36: Client/ Server technologies and their applications

File andPrint Servers

• File servers• Print servers

– Print queue– LPR/LPD

Page 37: Client/ Server technologies and their applications

HTTPServer Essentials

• Web server• Web gateways• Additional HTTP server considerations• Common Web servers

Page 38: Client/ Server technologies and their applications

ProxyServers

• Caching Web documents• Providing corporate firewall access• Filtering client transactions• Logging transactions• Securing the host• Enabling enhanced administration

Page 39: Client/ Server technologies and their applications

CachingServers

• Dedicated servers that speed data access by storing data retrieved by users, then presenting it directly to users

Page 40: Client/ Server technologies and their applications

MailServers

• SMTP• POP• IMAP• POP3

Page 41: Client/ Server technologies and their applications

MailingList Servers

• Mailing List Manager• Public and private mailing lists• Mailing list server vendors

Page 42: Client/ Server technologies and their applications

MediaServers

• Streaming audio and video• Buffers

Page 43: Client/ Server technologies and their applications

DNSServers

• Hosts file• DNS hierarchy• DNS components• DNS server types• DNS records

Page 44: Client/ Server technologies and their applications

FTPServers

• Logging control• Access control

Page 45: Client/ Server technologies and their applications

NewsServers

• Newsgroup issues– Policies– Security– Legalities

Page 46: Client/ Server technologies and their applications

CertificateServers

• Keys• Identity theft• Digital certificates

Page 47: Client/ Server technologies and their applications

DirectoryServers

• Directory service uses• Directory services protocols

Page 48: Client/ Server technologies and their applications

MirroredServers

• Mirror set• Redundant Array of Inexpensive Disks

standard

Page 49: Client/ Server technologies and their applications

Choosing the Ideal Server

• Popular server products– Apache Web server– Microsoft IIS– Lotus Domino series– Sun-Netscape Alliance servers

Page 50: Client/ Server technologies and their applications

Server-Side Scriptingand Database Connectivity

Page 51: Client/ Server technologies and their applications

Client-Side andServer-Side Scripting

• Server-side includes• Active content

Page 52: Client/ Server technologies and their applications

HTTPGateways

• Application program interface (API)• Client-side scripting• Load distribution• Transactions and download time

Page 53: Client/ Server technologies and their applications

HTML Formsand Form Processing

• <FORM> tag attributes– METHOD attribute– ACTION attribute

Page 54: Client/ Server technologies and their applications

CommonGateway Interface

• Where are CGI scripts located?• Benefits

– Interpreted languages• Drawbacks

– Out-of-process events

Page 55: Client/ Server technologies and their applications

CGI Alternatives: Server Programming Interfaces

• SAPI• ISAPI

– DLL files• NSAPI

Page 56: Client/ Server technologies and their applications

CGI Alternatives:Scripting Technologies

• JSP• PHP• ASP• SSJS

Page 57: Client/ Server technologies and their applications

CGI Alternatives:Java Servlets

• Java essentials• JVM• Java servlets versus scripting languages

Page 58: Client/ Server technologies and their applications

Databases

• Online Transaction Processing• Types

– Nonrelational– Relational– Object-oriented

• Common features of a DBMS, RDBMS or ODBMS– Hierarchical versus network– One-tier, two-tier, three-tier and n-tier

Page 59: Client/ Server technologies and their applications

Two-TierComputing Architecture

Page 60: Client/ Server technologies and their applications

Three-TierComputing Architecture

PC

Database

Server

First TierSecond (Middle)

TierThird Tier

Page 61: Client/ Server technologies and their applications

N-TierComputing Architecture

Page 62: Client/ Server technologies and their applications

DatabaseConnectivity

• ODBC– 16-bit versus 32-bit– Registering a database

• JDBC

Page 63: Client/ Server technologies and their applications

Database Connectivity Implementations

• Server-Side JavaScript and LiveWire• ColdFusion• Save as HTML• ASP and ActiveX Data Objects

Page 64: Client/ Server technologies and their applications

Network Security Essentials

Page 65: Client/ Server technologies and their applications
Page 66: Client/ Server technologies and their applications

Defining

• Local resources• Network resources• Server resources• Database and information resources

Page 67: Client/ Server technologies and their applications

Security Threats

• Accidental threats• Intentional threats

Page 68: Client/ Server technologies and their applications

Viruses

• Types– Macros– Executables– Boot sector– Stealth– Polymorphic

• Virus protection software• User education

Page 69: Client/ Server technologies and their applications

TheHacker Process

• Stage 1: Discovery• Stage 2: Penetration• Stage 3: Control

Page 70: Client/ Server technologies and their applications

DefeatingAttacks

• OSI/RM security services– Authentication– Access control– Data confidentiality– Data integrity– Nonrepudiation

Page 71: Client/ Server technologies and their applications

Auditing

• Status quo analysis• Risk analysis• Threat analysis

Page 72: Client/ Server technologies and their applications

Authentication

• Proving what you know• Proving what you have• Proving who you are

Page 73: Client/ Server technologies and their applications

Encryption

• Symmetric-key encryption– Symmetric algorithms– Dictionary programs– Password sniffing– SSL

• Asymmetric-key encryption

Page 74: Client/ Server technologies and their applications

SSL

(Secure sockets layer)

So slow connection?

Page 75: Client/ Server technologies and their applications

VirtualPrivate Networks

• Tunneling protocols• Encryption occurs Source• Decryption occurs Destination• VPN using PPTP• VPN using L2TP• VPN using ISAKMP or IPSec

Page 76: Client/ Server technologies and their applications

Firewalls

Page 77: Client/ Server technologies and their applications

PacketFilters

• Packet fields– Source IP address– Destination IP address– TCP/UDP source port– TCP/UDP destination port

Page 78: Client/ Server technologies and their applications

ProxyServers

• Circuit-level gateways• Application-level gateways

Page 79: Client/ Server technologies and their applications

FirewallTopology

• Firewall implementations– Packet filter– Single-homed bastion host– Dual-homed bastion host– Screened subnet