Sie sind auf Seite 1von 51

Education and Research

We enable you to leverage knowledge anytime, anywhere!

Introduction to Web Technologies


Day 1

ER/CORP/CRS/OS41/003

Ver. No.: 4.0

Copyright 2008, Infosys Technologies Ltd.

Course Objectives
To introduce the general concepts of computer networks, internetworking, network architecture and network security. To introduce the Client Server concepts, WWW, and Web application development To provide the overview of Web application performance, Securing the web application and mobile web application.

Copyright 2008, Infosys Technologies Ltd.

Course Agenda
Day1 Basics of Computer Networks Network Architecture
OSI-ISO reference Model

Day2 Client Server Concepts Introduction to World Wide Web Web Application

Network Components Internetworking IP addressing Concept of Sub-Networking

Day3 Network Security


Proxy server Firewall VPN

Security of Web Applications Web Application Performance

Copyright 2008, Infosys Technologies Ltd.

Session Plan - Day1


Basics of Computer Networks Network Architecture
OSI-ISO reference Model

Network Components Internetworking-Internet IP addressing Concept of Sub-Networking


Copyright 2008, Infosys Technologies Ltd.

References
James F. Kurose, Keith W. Ross, Computer Networking: A Topdown Approach Featuring the Internet, Pearson International, 3rd Edition, 2005. William Stallings, Business Data Communications, 5/E, Prentice Hall, 2005. Douglas E Comer, Internet Book, The: Everything You Need to Know About Computer Networking and How the Internet Works, 4/E, Prentice Hall, 2007 William Stallings, Network Security Essentials: Applications and Standards, Prentice Hall, 3rd Edition, 2007 Raymond Panko, Corporate Computer and Network Security, Prentice Hall, 2004 Jeffrey C. Jackson, Web Technologies: A Computer Science Perspective, Prentice Hall, 2007 http://www.ietf.org/ http://www.w3.org/ http://www.vpnc.org/vpn-standards.html
Copyright 2008, Infosys Technologies Ltd.

Education and Research


We enable you to leverage knowledge anytime, anywhere!

Basics of Computer Networks

ER/CORP/CRS/OS41/003

Ver. No.: 4.0

Copyright 2008, Infosys Technologies Ltd.

Computer Network
A collection of computers interconnected to exchange information Need for computer networks
Intrinsically distributed information Resource sharing Computational power (load sharing) Reliability

Copyright 2008, Infosys Technologies Ltd.

Types of Computer Networks


Computer Networks are classified based on the communication methods and size Based on communication methods
Broadcast communication networks Point-to-Point networks

Based on the size (scale)


Local Area Networks (LAN) Metropolitan Area Networks (MAN) Wide Area Networks (WAN)
Copyright 2008, Infosys Technologies Ltd.

Network Topology
Network Topology
Refers to how the computers are connected in a network either physically or logically Geometric representation of relationship of all the computer and interconnecting devices

Most frequently used topologies are,


Mesh, Star, Ring, Bus

Topologies are evaluated based on communication cost, installation cost, reliability.

Copyright 2008, Infosys Technologies Ltd.

Mesh/Completely connected Topology


Each node (computer/device) has a dedicated point-to-point link to every other node One node can choose any path to another node based on the data traffic To connect one node, in a network of n nodes, n-1 links are required

Copyright 2008, Infosys Technologies Ltd.

10

Star Topology
Each node (computer/device) has a dedicated point-to-point link to the central node If one node wants to send packet to another, it sends the packet to the controller/switch, which then relays the packet to the other connected node

switch

Copyright 2008, Infosys Technologies Ltd.

11

Ring Topology
Each node (computer/device) has a dedicated point-to-point link with the two nodes on either side of it Data packet is passed along the ring in one direction, from one node to node, until it reaches its destination

Copyright 2008, Infosys Technologies Ltd.

12

Bus Topology
One long cable run as a backbone (bus) to link all the nodes in the network Nodes (computer/device) are connected to the bus by drop lines

Drop line

Backbone

Terminator

Copyright 2008, Infosys Technologies Ltd.

13

Network Architecture
Defines the design and implementation of computer networks Has a layered approach which helps in
Reducing the design complexity Shielding the implementation details of the services

Each layer provides services to the layer above Different protocols are followed between corresponding layers in Sender and Receiver Two popularly referenced architectures are
ISO-OSI model TCP/IP model

Copyright 2008, Infosys Technologies Ltd.

14

Why OSI Model ?

Copyright 2008, Infosys Technologies Ltd.

15

ISO-OSI Reference Model


Node A Node B Application protocol

Application
Presentation

Application
Presentation protocol

Presentation
Session protocol

Session

Session Segment

Transport

Transport protocol

Transport

Network

Network protocol

Network

Packet

Data link

Data link protocol

Data link
Physical link protocol

Frame Bit

Physical

Physical

Copyright 2008, Infosys Technologies Ltd.

16

OSI Model Layer Functions Overview


Layer Name Application Presentation Functions Allow access to network for communication Translation, encryption, compression, data/address format Synchronization, dialog control Deals with messages, end-to-end to message delivery Deals with packets, routing, congestion control

Session Transport Network

Data Link

Deals with frames, node-to-node delivery, error and flow control Physical Deals with bits, electrical specifications

Physical

Copyright 2008, Infosys Technologies Ltd.

17

Application Layer
Top most layer which gives services to the application Provides a means for the application process to access the environment Contains a variety of protocols that are commonly needed Examples
FTP EMAIL (SMTP) RLOGIN (Telnet) WWW (HTTP) Newsgroups
Copyright 2008, Infosys Technologies Ltd.

18

Presentation Layer
Basically concerned with the syntax and semantics of the information transmitted Resolves common data formats Big Endian versus small Endian Deals with data compression, encryption & decryption

Copyright 2008, Infosys Technologies Ltd.

19

Session Layer
Allows users of different machines to establish sessions between them Manages dialogue control Provides synchronization

Copyright 2008, Infosys Technologies Ltd.

20

Transport Layer
The primary function of this layer is to accept data from the session layer, split it into smaller units if required and then pass these to the network layer. Deals with delivery of messages (end to end message delivery) Retransmission in case of failures Transport Layer protocols,
Transmission Control Protocol (TCP ) Sequence Packet Exchange (SPX)

Copyright 2008, Infosys Technologies Ltd.

21

Network Layer
Primarily deals with
Routing the packets from source to destination congestion control

Network layer protocols


IP (Internet protocol), IPX (Internet Packet Exchange) protocol

Copyright 2008, Infosys Technologies Ltd.

22

Data link Layer


Deals with sending and receiving frames Responsible for node to node delivery

Provides error-control and flow-control


Data link layer protocols (MAC protocols)
CSMA/CD (Carrier Sense Multiple Access protocol with Collision Detection) CSMA/CA (CSMA with Collision Avoidance) Token Passing Algorithms PPP (point-to-point) protocol HDLC (High level Data Link Control Protocol)
Copyright 2008, Infosys Technologies Ltd.

23

Physical Layer
Deals with physical aspects such as
raw bit transmission voltage of each bit number of bits physical connectors ( RS-232C, X.21 ) Transmission mode ( simplex, half-duplex, fullduplex)

Copyright 2008, Infosys Technologies Ltd.

24

Network Components
There are many different devices for interconnecting networks.
Repeaters Bridges Routers Gateway
LAN LAN LAN Repeater

Bridge

Router/Switch
IP network

X.25
Network

Gateway
LAN
Copyright 2008, Infosys Technologies Ltd.

25

Network Components (Contd)


Repeaters
allow to extend the physical length of a network operates at the physical layer of Network

Bridges
divides a large network into smaller operates in both the physical and data link layer of network

Routers
interconnects similar or dissimilar networks together operates in physical, data link and network layer of network

Gateways
interconnects dissimilar networks together operates in all the layers of network
Copyright 2008, Infosys Technologies Ltd.

26

Education and Research


We enable you to leverage knowledge anytime, anywhere!

Internetworking

ER/CORP/CRS/OS41/003

Ver. No.: 4.0

Copyright 2008, Infosys Technologies Ltd.

Internet
Internet
Huge network of networks

Host/Node
Communicating system connected to the network Millions of hosts hooked on to the Internet

Communication Protocol
TCP/IP

Means to connect to Internet


Dial-up Line (through telephone): Domestic users DSL: Digital Subscriber Line (through telephone), ADSL, Cable Modem: Domestic users ISDN,E1,T1,T3 connections, GPRS, CDMA: Large corporations
Copyright 2008, Infosys Technologies Ltd.

28

What is Internetworking?
Interconnection of various heterogeneous/homogeneous networks Network of Networks

Copyright 2008, Infosys Technologies Ltd.

29

Who provides Internet services?


ISP a company which provides Internet access for individuals, organizations, and companies User should get an account from ISPs, that includes
a software package To dial to the ISPs To monitor the access time username, password access phone number

ISP Network
Modem Laptop

Internet

Telephone Line DSL T1 / T3

Copyright 2008, Infosys Technologies Ltd.

30

How Internet works?


Packet switching protocol (TCP/IP protocol)
Involves breaking down of data into packets or datagrams Packets are labeled with origin and destination address Packets are forwarded from one network to another network until it reaches the destination If packets are lost, originator re-sends the packets

Provides interoperability between different types of nodes on the Internet


Copyright 2008, Infosys Technologies Ltd.

31

What is packet switching?


G 192.168.121.40 192.168.121.5 Router 192.168.223.208 192.168.223.6 192.168.223.0 Network F

192.168.121.0 Network

1111110000010010 0011111001000100 1010001000011111 0010101110010001 1110111111000001 0010010001000011 1110010101110010 0011110011111001 0001001010001000 0111110001000111 1001111100100011 1100111110111001 Data /File

192.168.121.40 192.168.223.208 4 10100010000111.. 192.168.121.40 192.168.223.208 ` 00100100010000.. 192.168.121.40 192.168.223.208 2 0111110001000.. 192.168.121.40 192.168.223.208 1 1100111110111..

Packets
192.168.121.40 192.168.121.40 192.168.121.40 192.168.223.208 192.168.223.208 192.168.223.20 1 2 3 1100111110111.. 0111110001000.. 00100100010000.

192.168.121.40 192.168.223.208 10100010000111. .

F
192.168.223.208

1111110000010010 0011111001000100 1010001000011111 0010101110010001 1110111111000001 0010010001000011 1110010101110010 0011110011111001 0001001010001000 0111110001000111 1001111100100011 1100111110111001

Copyright 2008, Infosys Technologies Ltd.

32

Education and Research


We enable you to leverage knowledge anytime, anywhere!

IP addressing

ER/CORP/CRS/OS41/003

Ver. No.: 4.0

Copyright 2008, Infosys Technologies Ltd.

Internet Protocol Address


A 4-byte addressing scheme used by the IP layer Within a private or closed network, one can assign any IP address Every Internet host must have a distinct IP address It has two components
Network ID Host ID

IP address is provided by the Internet service provider IP addresses are a scarce resource!!

Copyright 2008, Infosys Technologies Ltd.

34

IP Address (IPV4)
EXAMPLE: 130.195.128.25

w NETWORK ID

y HOST ID

1 0 0 0 0 0 1 0 1 1 0 0 0 0 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 0 1

130

195

128

25

Copyright 2008, Infosys Technologies Ltd.

35

Classes of IP Address (IPV4)


NUMBER OF N/Ws NUMBER OF HOSTS

Class A
0

w
NETWORK ID

y HOST ID

126

16,777,214

Class B
1 0

16,384

65,534

NETWORK ID Class C
1 1 0 w

HOST ID

x NETWORK ID

z HOST ID
36

2,097,152

254

Copyright 2008, Infosys Technologies Ltd.

IP Address (IPV4): Range for each class


Class Range A B 1.0.0.0 to 126.255.255.255 128.0.0.0 to 191.255.255.255 Remarks

C
D

192.0.0.0 to 223.255.255.255
224.0.0.0 to 239.255.255.255 (Multi-Casting)

240.0.0.0 to 247.255.255.255

(Reserved for future use)

Copyright 2008, Infosys Technologies Ltd.

37

Special IP Addresses (IPV4)


Zero Addresses (0.0.0.0 to 0.255.255.255)
There is no particular function for this range of IP Address.

Private Addresses
IP Standard defines specific address ranges within Class A, Class B, Class C reserved for use by Private Networks.

Class

Range

A B C

10.0.0.0 to 10.255.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255

Loopbacks Address (127.0.0.0 to 127.255.255.255)


Reserved and used for internal testing on a local machine. They should not be used for host address.
Copyright 2008, Infosys Technologies Ltd.

38

Static and Dynamic IP Address

Computer Boots up (Assumes Static IP addr set by Admin)

Copyright 2008, Infosys Technologies Ltd.

39

Static and Dynamic IP Address (Contd)


User Dials into the network (Connect) 2. Assigns IP Address and other config info 1. U ser Modem di ne als in two t rk o the ISP's Network

DHCP SERVER

Internet

DYNAMIC IP for Dial up Users


ress Add nfo s IP gi sign r confi As he 2. ot and

DHCP SERVER

Other Computers on Network.

LAN 1. Computer Boots up (Broadcasts on the Network) Server

IBM Compatible

DYNAMIC IP for LAN Users


Copyright 2008, Infosys Technologies Ltd.

40

Concept of Sub Networking


Two-layer hierarchy is not appropriate for large networks with IP addresses Consider Infosys Network as an example
Infosys BEF E&R C1 C2 Facilities C1 C2 CCD BCMD IBU CSPD

C1 ,C2 are computers in the sub network


Copyright 2008, Infosys Technologies Ltd.

41

Domain Name system (DNS) Server


Its too difficult to remember IP Addresses Each IP Addresses is registered for a Domain Name
Example: 216.251.50.51 = www.infosys.com

Host can also be identified with Name User submits the request to the Domain Name Domain Name Server
Translates Domain Name to IP Address and vice versa De-centralized

Copyright 2008, Infosys Technologies Ltd.

42

Intranet Vs Internet
Internet
Not owned by any single entity Have publicly known IP addresses (Unique world-wide) Information access is open to everyone

Intranet
Used by corporations for their own business or operational needs Usually accessible only to the members, employees of the organization Use the same technology as Internet Smaller in size Private network Better controlled and more secure

Copyright 2008, Infosys Technologies Ltd.

43

Summary
Basics of Computer Networks Network Architecture
OSI-ISO reference Model

Network Components Internetworking IP addressing Concept of Sub-Networking


Copyright 2008, Infosys Technologies Ltd.

44

Thank You
The contents of this document are proprietary and confidential to Infosys Technologies Ltd. and may not be disclosed in whole or in part at any time, to any third party without the prior written consent of Infosys Technologies Ltd. 2008 Infosys Technologies Ltd. All rights reserved. Copyright in the whole and any part of this document belongs to Infosys Technologies Ltd. This work may not be used, sold, transferred, adapted, abridged, copied or reproduced in whole or in part, in any manner or form, or in any media, without the prior written consent of Infosys Technologies Ltd.

Copyright 2008, Infosys Technologies Ltd.

45

Education and Research


We enable you to leverage knowledge anytime, anywhere!

Appendix 1
Self Study

ER/CORP/CRS/OS41/003

Ver. No.: 4.0

Copyright 2008, Infosys Technologies Ltd.

Comparison of Topology

Feature

Mesh

Star
Low

Ring
Low Variable (1 to n-1 hops) Low

Bus
Low Low

Installation cost High

Communication Low Low cost (1 hop) ( 2 hops) Reliability High Poor

Low

Copyright 2008, Infosys Technologies Ltd.

47

TCP/IP Reference Model


HTTP, TFTP, Telnet, FTP, SMTP, DNS

Application

TCP, UDP

Transport
routing and delivery of data across networks. IP, ICMP. IGMP, DHCP, RIP, OSPF

Internet

Network Access

MAC Protocols: Ethernet (CSMA/CD) CSMA/CA, Token ring, Token Bus, ARP

Combination of data link and physical layers


Copyright 2008, Infosys Technologies Ltd.

48

Education and Research


We enable you to leverage knowledge anytime, anywhere!

Appendix 2
Self Study (The following slides are not included for assessment)

ER/CORP/CRS/OS41/003

Ver. No.: 4.0

Copyright 2008, Infosys Technologies Ltd.

Sub-Networking
Creating sub-networks within a given IP address range
Extends the network portion of IP address into the Host Part Converts the rigid boundary to arbitrary

Uses the Subnet mask to decide the no. of bits representing Physical Network ID and host ID
Default IP Address Definition
Internet ID Host ID

1 0 0 0 0 0 1 0 1 1 0 0 0 0 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 0 1 Internet ID Host ID

Sub-Netting
Physical Network

Copyright 2008, Infosys Technologies Ltd.

50

Sub-Networking (Contd)
130 IP Address
1 0 0 0 0 0 1 0 1 1 0 0 0 0 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 0 1 Internet ID
Physical Network

195

128

25

Host ID

Subnet Mask

1 1 1 1 1 1 1 1 1 1 1 11 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 3 Bits 5 Bits

255

255

224

Copyright 2008, Infosys Technologies Ltd.

51

Das könnte Ihnen auch gefallen