Client Server 3.0 - 6 Ways JavaScript is Revolutionizing the Client/Server Relationship
Client/ Server technologies and their applications.
-
Upload
betty-lewis -
Category
Documents
-
view
220 -
download
4
Transcript of Client/ Server technologies and their applications.
![Page 1: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/1.jpg)
Client/ Server technologies and their applications
![Page 2: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/2.jpg)
Introductionto Networking
![Page 3: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/3.jpg)
NetworksDefined
• Two or more connected computers that share data
• Network evolution– Centralized (mainframe) models– Client/server models– Web-based networking
![Page 4: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/4.jpg)
Mainframes
• Retrieving information from mainframes• Mainframe liabilities• The future of mainframes
![Page 5: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/5.jpg)
Mainframe Networking Model
![Page 6: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/6.jpg)
Client/ServerModel
• The client/server model database example– SQL
• Client/server advantages• Migration to client/server architecture
– Workstations
![Page 7: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/7.jpg)
Client/ServerNetworking Model
![Page 8: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/8.jpg)
Web-BasedNetworking
• Advantages– Mainframe model power– Client/server model scalability– Open, global solution
![Page 9: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/9.jpg)
NetworkingCategories
• Peer-to-peer• Server-based
![Page 10: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/10.jpg)
NetworkOperating Systems
• Interoperability– Novell NetWare– Microsoft Windows – UNIX
![Page 11: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/11.jpg)
NetworkingProtocols
![Page 12: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/12.jpg)
OSI (International Organization for Standardization)
Model Layers
Application
Presentation
Session
Transport
Network
Data Link
Physical
Application
Presentation
Session
Transport
Network
Data Link
Physical
Client Server
![Page 13: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/13.jpg)
PacketStructure
Trailer
Data
Header
![Page 14: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/14.jpg)
TCP/IP
• A collection of protocols– TCP– IP– An open standard
![Page 15: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/15.jpg)
AdditionalNetworking Protocols
• NetBEUI– NetBIOS
• AppleTalk
![Page 16: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/16.jpg)
LANs and WANs
![Page 17: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/17.jpg)
Local AreaNetworks (LANs)
• A group of computers connected within a confined geographic area
• Commonly used for intraoffice communication
![Page 18: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/18.jpg)
Wide AreaNetworks (WANs)
• A group of computers connected over an expansive geographic area
![Page 19: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/19.jpg)
NetworkAccess Points (NAPs)
• Internet backbones• Backbone Network
Service• Segments Atlanta
New York
Chicago
SanFrancisco
Boston
Phoenix
Seattle
Backbone
Backbone
![Page 20: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/20.jpg)
CommonNetwork Components
![Page 21: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/21.jpg)
IEEELAN Standards
• IEEE 802.2• Ethernet/IEEE 802.3• IEEE 802.3u—fast Ethernet• IEEE 802.3z and 802.3ab—gigabit Ethernet• IEEE 802.5—token ring• IEEE 802-12—100VG-AnyLAN
![Page 22: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/22.jpg)
AdditionalLAN Standards
• Apple LocalTalk• FDDI
![Page 23: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/23.jpg)
T-CarrierSystem
T-Carrier Data Transfer Rate
T1 1.544 Mbps
T2 6.312 Mbps
T3 44.736 Mbps
T4 274.176 Mbps
![Page 24: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/24.jpg)
E-CarrierSystem
E-Carrier Data Transfer Rate
E1 2.048 Mbps
E2 8.448 Mbps
E3 34.368 Mbps
E4 139.264 Mbps
E5 565.148 Mbps
![Page 25: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/25.jpg)
TCP/IP Suiteand Internet Addressing
![Page 26: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/26.jpg)
InternetArchitecture
![Page 27: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/27.jpg)
RoutingProtocols
![Page 28: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/28.jpg)
PortNumbers
• Well-known port numbers• Registered port numbers
![Page 29: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/29.jpg)
InternetAddressing
field1.field2.field3.field4
Each field represents one byte of data
![Page 30: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/30.jpg)
ReservedIP Addressing
• 10.0.0.0 10.255.255.255• 172.16.0.0 172.31.255.255• 192.168.0.0 192.168.255.255
![Page 31: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/31.jpg)
Subnet Masks
• Distinguish the network and host portions of an IP address
• Specify whether a destination address is local or remote
![Page 32: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/32.jpg)
Normal TCP/IPDesktop Configurations
• Basic configurations• Name resolution configurations
![Page 33: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/33.jpg)
Diagnostic Toolsfor Internet Troubleshooting
• The ping command• The tracert command• The netstat command• The ipconfig command—Windows NT/2000• The arp command• Network analyzers
![Page 34: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/34.jpg)
Internetworking Servers
![Page 35: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/35.jpg)
InternetworkingServers
• File and print• HTTP• Proxy• Caching• Mail• Mailing list• Media
• DNS• FTP• News• Certificate• Directory• Catalog• Transaction
![Page 36: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/36.jpg)
File andPrint Servers
• File servers• Print servers
– Print queue– LPR/LPD
![Page 37: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/37.jpg)
HTTPServer Essentials
• Web server• Web gateways• Additional HTTP server considerations• Common Web servers
![Page 38: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/38.jpg)
ProxyServers
• Caching Web documents• Providing corporate firewall access• Filtering client transactions• Logging transactions• Securing the host• Enabling enhanced administration
![Page 39: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/39.jpg)
CachingServers
• Dedicated servers that speed data access by storing data retrieved by users, then presenting it directly to users
![Page 40: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/40.jpg)
MailServers
• SMTP• POP• IMAP• POP3
![Page 41: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/41.jpg)
MailingList Servers
• Mailing List Manager• Public and private mailing lists• Mailing list server vendors
![Page 42: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/42.jpg)
MediaServers
• Streaming audio and video• Buffers
![Page 43: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/43.jpg)
DNSServers
• Hosts file• DNS hierarchy• DNS components• DNS server types• DNS records
![Page 44: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/44.jpg)
FTPServers
• Logging control• Access control
![Page 45: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/45.jpg)
NewsServers
• Newsgroup issues– Policies– Security– Legalities
![Page 46: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/46.jpg)
CertificateServers
• Keys• Identity theft• Digital certificates
![Page 47: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/47.jpg)
DirectoryServers
• Directory service uses• Directory services protocols
![Page 48: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/48.jpg)
MirroredServers
• Mirror set• Redundant Array of Inexpensive Disks
standard
![Page 49: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/49.jpg)
Choosing the Ideal Server
• Popular server products– Apache Web server– Microsoft IIS– Lotus Domino series– Sun-Netscape Alliance servers
![Page 50: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/50.jpg)
Server-Side Scriptingand Database Connectivity
![Page 51: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/51.jpg)
Client-Side andServer-Side Scripting
• Server-side includes• Active content
![Page 52: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/52.jpg)
HTTPGateways
• Application program interface (API)• Client-side scripting• Load distribution• Transactions and download time
![Page 53: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/53.jpg)
HTML Formsand Form Processing
• <FORM> tag attributes– METHOD attribute– ACTION attribute
![Page 54: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/54.jpg)
CommonGateway Interface
• Where are CGI scripts located?• Benefits
– Interpreted languages• Drawbacks
– Out-of-process events
![Page 55: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/55.jpg)
CGI Alternatives: Server Programming Interfaces
• SAPI• ISAPI
– DLL files• NSAPI
![Page 56: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/56.jpg)
CGI Alternatives:Scripting Technologies
• JSP• PHP• ASP• SSJS
![Page 57: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/57.jpg)
CGI Alternatives:Java Servlets
• Java essentials• JVM• Java servlets versus scripting languages
![Page 58: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/58.jpg)
Databases
• Online Transaction Processing• Types
– Nonrelational– Relational– Object-oriented
• Common features of a DBMS, RDBMS or ODBMS– Hierarchical versus network– One-tier, two-tier, three-tier and n-tier
![Page 59: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/59.jpg)
Two-TierComputing Architecture
![Page 60: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/60.jpg)
Three-TierComputing Architecture
PC
Database
Server
First TierSecond (Middle)
TierThird Tier
![Page 61: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/61.jpg)
N-TierComputing Architecture
![Page 62: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/62.jpg)
DatabaseConnectivity
• ODBC– 16-bit versus 32-bit– Registering a database
• JDBC
![Page 63: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/63.jpg)
Database Connectivity Implementations
• Server-Side JavaScript and LiveWire• ColdFusion• Save as HTML• ASP and ActiveX Data Objects
![Page 64: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/64.jpg)
Network Security Essentials
![Page 65: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/65.jpg)
![Page 66: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/66.jpg)
Defining
• Local resources• Network resources• Server resources• Database and information resources
![Page 67: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/67.jpg)
Security Threats
• Accidental threats• Intentional threats
![Page 68: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/68.jpg)
Viruses
• Types– Macros– Executables– Boot sector– Stealth– Polymorphic
• Virus protection software• User education
![Page 69: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/69.jpg)
TheHacker Process
• Stage 1: Discovery• Stage 2: Penetration• Stage 3: Control
![Page 70: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/70.jpg)
DefeatingAttacks
• OSI/RM security services– Authentication– Access control– Data confidentiality– Data integrity– Nonrepudiation
![Page 71: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/71.jpg)
Auditing
• Status quo analysis• Risk analysis• Threat analysis
![Page 72: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/72.jpg)
Authentication
• Proving what you know• Proving what you have• Proving who you are
![Page 73: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/73.jpg)
Encryption
• Symmetric-key encryption– Symmetric algorithms– Dictionary programs– Password sniffing– SSL
• Asymmetric-key encryption
![Page 74: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/74.jpg)
SSL
(Secure sockets layer)
So slow connection?
![Page 75: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/75.jpg)
VirtualPrivate Networks
• Tunneling protocols• Encryption occurs Source• Decryption occurs Destination• VPN using PPTP• VPN using L2TP• VPN using ISAKMP or IPSec
![Page 76: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/76.jpg)
Firewalls
![Page 77: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/77.jpg)
PacketFilters
• Packet fields– Source IP address– Destination IP address– TCP/UDP source port– TCP/UDP destination port
![Page 78: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/78.jpg)
ProxyServers
• Circuit-level gateways• Application-level gateways
![Page 79: Client/ Server technologies and their applications.](https://reader037.fdocuments.in/reader037/viewer/2022103023/56649daa5503460f94a98c8f/html5/thumbnails/79.jpg)
FirewallTopology
• Firewall implementations– Packet filter– Single-homed bastion host– Dual-homed bastion host– Screened subnet