Академический Документы
Профессиональный Документы
Культура Документы
Fremont
PC PDA
PC Laptop
Network 4
Laptop PC PC
Mainframe
Bangalore
PC
Sydney
PC PC
PC
Scanner PC
TO
Berlin
Laptop OTHER
Printer
NETWORKS
Minicomputer
Fax
Network 2
G
iMac
Ethernet Ethernet
Ethernet
Card Card Card
Network
Ethernet
Ethernet Card
Card F
192.168.223.208
192.168.121.40
1111110000010010 192.168.223.208
0011111001000100 4
10100010000111..
1010001000011111
0010101110010001 192.168.121.40
192.168.223.208
1110111111000001 3
`
0010010001000011 00100100010000..
1110010101110010 192.168.121.40
0011110011111001 192.168.223.208
2
0001001010001000 0111110001000..
0111110001000111 192.168.121.40
1001111100100011 192.168.223.208
1
1100111110111001 1100111110111..
192.168.121.40
192.168.121.40
192.168.121.40 192.168.121.40 192.168.223.208
192.168.223.208
192.168.223.208 192.168.223.20 1
2
4 3 1100111110111..
0111110001000..
10100010000111..
00100100010000.
Ethernet 1111110000010010
Card 0011111001000100
1010001000011111
F 0010101110010001
1110111111000001
0010010001000011
1110010101110010
0011110011111001
192.168.223.208 0001001010001000
0111110001000111
1001111100100011
1100111110111001
NETWORK ID HOST ID
EXAMPLE: 130.99.128.25
1 0 0 0 0 0 1 0 1 1 0 0 0 0 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 0 1
NETWORK
ID
HOST ID
Class B
1 0 w x y z 16,384 65,534
NETWORK ID HOST ID
Class C
1 1 0 w x y z 2,097,152 254
NETWORK ID HOST ID
DYNAMIC IP CASE
Assigns IP
address and other P
n sI d DHCP Other
config info si g an fo
As ress ig in SERVER Computers
d f
User Dials into Modem Ad r con on Network.
the network e
oth
(Connect)
LAN
Server
Computer
Boots up
(Broadcasts on the
Network) IBM Compatible
1 0 0 0 0 0 1 0 1 1 0 0 0 0 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 0 1
Internet ID Host ID
Sub-Netting
Physical
Network
130 99 128 25
IP Address
1 0 0 0 0 0 1 0 1 1 0 0 0 0 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 0 1
Internet ID Host ID
Physical
Subnet Mask Network
1 1 1 1 1 1 1 1 1 1 1 111 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0
3 5
Bits Bits
• Intranet
– Used by corporations for their own business or operational needs
– Usually accessible only to the members, employees of the organization
– Use the same technology as Internet
– Smaller in size
– Private networks
– Better Controlled and More secure
Uses of VPN:
• Leased lines are expensive
• VPN is used as a secure mechanism to connect to a remote network
• Users on the go use VPN to access their corporate network
• Companies use VPN to connect to customer’s network
Infosys Customer
Switch Belgium
Printer
Laptop
Mainframe
PC
securitypolicy,itis
doesntadhereto
2 a. If the packet
rejected
Web Server
File Server
2b.Ifpacketadheresto
1. Anypacketfrom the securitypolicy,itis
intranetto outside forwarded The Internet
networkisexamined
byfirewall 3.Firewallsexaminesall
incoming packetsaswell.
The Intranet
SecurityPolicy Database Server
implemented on the
firewall
Application Server
File System
Web Server
HTML Pages
GIF/JPG Images etc
Web Gateway
Database
Non-Web Content
(Dynamic Content)
Mime-type Mapping
app/pdf - acroread.exe
video/mpeg mplayer.exe
Driver
Other
Network Interface
TCP/IP
• Active Content
– Server returns a run-able copy of the program
– Browser executes the program locally on the client machine
– May need continuous information feed
– Examples: Java Applets, Active-X controls for IE
– Disadvantage: Possible Security risks
Example:
http://server1.mydomain.com/about.html
Protocol = http
Host = server1.mydomain.com
port = (default for http) 80
Path = /about.html
Copyright © 2004, 39 ER/CORP/CRS/OS41/003
Infosys Technologies Ltd Version no: 2.0
HTML
• Hyper Text Markup Language
– Uses markup tags to format text and graphics
– Allows creating of hyper links
– Allows users to navigate through the documents on the web
– All browsers can understand HTML and render it
• An Example HTML file
<html>
<head>
<title>A sample HTML page...</title>
</head>
<body>
<center>
<h2>A HTML Page</h2>
<p>This is a sample HTML page which demos <b>Bold</b>, <i>italic</i> text and a table.
</center>
</body>
</html>
• Example: http://www.infosys.com/usr/index.html
• POST method
– The parameters from the browser are passed as part of the Message body
– Typically the CGI program receives the message body through STDIN and
decodes it
– HTTP response for POST is usually a program output
• HEAD method
– Gets just the header information from the server
– Usually used to get only information about the content
– Helps save on bandwidth
• HTTP 1.1
– Once a connection is established, it is maintained till the browser is closed
(Also known as persistent connection)
– Allows server side session management even though the HTTP protocol
itself doesn’t support it
• Disadvantages
– No support for session management at the protocol level
– Less secure
Server
Assign a thread
to service the
REQUEST request
Param: Service Name
Additional Parameters er vice t
S ues
Service1
Service2 ReqThread Pool
Client
RESPONSE a ck to
Status tu rn b l
Re Poo
Requested Data
File System
Configuration File
1. Thread Pool size
2. Service configuration
3. Other Parameters
DNS Server
(Local Network) 3. Cannot Resolve
Locally? Resolve
on
from other DNS e cti d
n
Con lishe
.
2. Translate DNS 4. Returns IP Addr
6 tab
Es
Name to IP address 202.68.33.47
The
th e Internet
h ru
t t r ath ns Web Server
n ec erve P n tai
. C on to s t for e (co (Internet)
5 n/w e s s l)
equ l p on .htm
R s t
1. User Invokes URL TP t.htm P Re f tes my.mydomain.com
T
H /tes T o
http://my.mydomain.com/ nd d HT ents 202.68.33.47
e n t
test.html 7.
S Se con
8.
9. Browser Renders
Web
HTMLBrowser
PC