COS 338_day22_23 - Ecom and COS classes
Download
Report
Transcript COS 338_day22_23 - Ecom and COS classes
COS 338
Day 22
DAY 22 Agenda
Spring 2006 Book List
Lab 7 corrected
Due Dec 5 (last one)
Will drop lowest grade
Exam 3 Graded
Due Dec 1
Assignment 8 Posted
1 A, 1 C, 3 F’s and 1 non-submit
Assignment 7 Posted
Http://perleybrook.umfk.maine.edu/sp2000bl.htm
2 A’s,3 B’s and 1 F
Today (and the next class) we will discuss Network Management and
Networked Applications
2
Schedule for last 4 weeks
Today
Finish Chap 10 and begin chapter 11
Assignment 8 posted
Due Dec 5
Dec 8
Dec 1
Assignment 7 Due
Finish Chapter 111
Dec 12
Dec 5
Assignment 8 Due
Lab 8
Due Dec 12
Discussion on Final Group Lab
Build on SOHO Network in OMS
5 desktops
1 Server
1 Printer
Internet connections
Firewall and/or router
Networked applications
Lab 8 Due
Part 2 of Final Lab
Dec 15
Exam 4
Capstone Progress Report Due
Part 1 of Final lab
Planning
Part 3 of Final Lab
Dec 19
10-12 noon
Capstones due
10 min presentation of Capstone projects
3
Figure 10-16: Simple Network
Management Protocol (SNMP)
Simple Network Management Protocol (SNMP)
Standard for managing remote devices in a network
Collects information from remote devices to give the
network administrator an overview of the network
Optionally, allows the network administrator to
reconfigure remote devices
Potential for strong labor cost savings
4
Figure 10-16: Simple Network Management
Protocol (SNMP)
Network Management
Software (Manager)
Managed
Device
Manager manages multiple
managed devices from a central
location
RMON Probe
5
Figure 10-16: Simple Network Management
Protocol (SNMP)
Network Management
Software (Manager)
Network
Management
Agent (Agent),
Objects
Network
Management
Agent (Agent),
Objects
Manager talks to an network
management agent on each
managed device
RMON Probe
6
Figure 10-16: Simple Network Management
Protocol (SNMP)
Network Management
Software (Manager)
Network
Management
Agent (Agent),
Objects
Network
Management
Agent (Agent),
Objects
RMON (remote monitoring) probe is
a special agent that collects data
about multiple devices in a region of
in the network. It is like a local
manager that can be queried by the
main manager.
RMON Probe
7
Figure 10-16: Simple Network Management
Protocol (SNMP)
Network Management
Software (Manager)
Management
Information
Base (MIB)
Management
Information
Base (MIB)
MIB stores data about devices.
MIB on manager stores all.
MIB on device stores local information
Management
Information
Base (MIB)
RMON Probe
8
Figure 10-16: Simple Network Management
Protocol (SNMP)
Network Management
Software (Manager)
Management
Information
Base (MIB)
Simple Network
Management Protocol (SNMP)
Management
Information
Base (MIB)
Command (Get, Set, etc.)
Response
Management
Information
Base (MIB)
Trap
RMON Probe
9
Figure 10-17: SNMP Object Model
SNMP Object Model
Management
Information
Base (MIB)
The MIB database schema
Defines objects (parameters) about which
information is stored for each managed device
SNMP System Objects
System name
System description
System contact person
System uptime (since last reboot)
10
Figure 10-17: SNMP Object Model
SNMP IP Objects
Management
Information
Base (MIB)
Forwarding (for routers). Yes if forwarding (routing),
No if not
Subnet mask
Default time to live
Traffic statistics
Number of discards because of resource limitations
11
Figure 10-17: SNMP Object Model
SNMP IP Objects (Continued)
Management
Information
Base (MIB)
Number of discards because could not find route
Number of rows in routing table
Rows discarded because of lack of space
Individual row data in the routing table
12
Figure 10-17: SNMP Object Model
SNMP TCP Objects
Management
Information
Base (MIB)
Maximum / minimum retransmission time
Maximum number of TCP connections allowed
Opens / failed connections / resets
Segments sent
Segments retransmitted
Errors in incoming segments
No open port errors
Data on individual connections (sockets, states)
13
Figure 10-17: SNMP Object Model
SNMP UDP Objects
Error: no application on requested port
Traffic statistics
Management
Information
Base (MIB)
SNMP ICMP Objects
Number of errors of various types
14
Figure 10-17: SNMP Object Model
Management
Information
Base (MIB)
SNMP Interface Objects (One per Port)
Type (e.g., 69 is 100Base-FX; 71 is 802.11)
Status: up / down / testing
Speed
MTU (maximum transmission unit—the maximum
packet size)
Traffic statistics: octets, unicast / broadcast /
multicast packets
Errors: discards, unknown protocols, etc.
15
Remote Switch and Router
Management
Figure 10-12: Network Management
Utilities
Remote Switch and Router Management
Telnet
Web interfaces
SSH
TFTP
Saves money compared to traveling to device
17
Figure 10-18: Telnet, Web Management,
SSH, and TFTP
Telnet
Remotely log into managed device as a dumb
terminal
Poor security
Weak password authentication
Passwords are sent in the clear, making them
vulnerable to sniffers
No encryption of traffic
18
Figure 10-18: Telnet, Web Management,
SSH, and TFTP
Web Interfaces
Managed device contains a webserver
Administrator connects to the managed device with
a browser
Can use SSL/TLS but typically does not
Set-up on normally unused port
http://darouter:8888
19
Figure 10-18: Telnet, Web Management,
SSH, and TFTP
SSH
Secure shell protocol
Similar to Telnet but highly secure
Widely installed on Unix computers (including Linux
computers)
Software must be added to Windows devices
20
Figure 10-18: Telnet, Web Management,
SSH, and TFTP
TFTP
Trivial File Transfer Protocol
Similar to file transfer program but simpler
Simple enough to implement on switches and
routers
Often used to download configurations to a switch or
router from a server
21
Figure 10-18: Telnet, Web Management,
SSH, and TFTP
TFTP
No password is needed
Can be used by hackers to download attack
programs
Poor security makes TFTP very dangerous
22
Traffic Management
Figure 10-19: Traffic Management Methods
Traffic Management
Capacity is expensive; it must be used wisely
Especially in WANs
24
Figure 10-19: Traffic Management Methods
Traditional Approaches
Overprovisioning
In Ethernet, install much more capacity than is
needed most of the time
This is wasteful of capacity
Does not require much ongoing management
labor
25
Figure 10-19: Traffic Management Methods
Traditional Approaches
Priority
In Ethernet, assign priority to applications based
on sensitivity to latency
In momentary periods of congestion, send highpriority frames through
Substantial ongoing management labor
26
Figure 10-19: Traffic Management Methods
Traditional Approaches
QoS Reservations
In ATM, reserve capacity on each switch and
transmission line for an application
Allows strong QoS guarantees for voice traffic
Highly labor-intensive
Data gets the scraps—capacity that is not
reserved for voice
27
Figure 10-19: Traffic Management Methods
Traffic Shaping
The Concept
Control traffic coming into the network at access
switches
Filter out unwanted applications
Give a maximum percentage of traffic to other
applications
28
Figure 10-19: Traffic Management Methods
Traffic Shaping
Advantages and Disadvantages
Traffic shaping alone reduces traffic coming into
the network to control costs
Very highly labor intensive
Creates political battles (as do priority and QoS
reservations to a lesser degree)
29
Topics Covered
Topics Covered
Cost
Exploding demand, slow budget growth
Hardware, software, labor costs
Fully-configured hardware versus base prices
Total cost of ownership: cost over entire life cycle
Network Simulation
Model the network on a computer
Explore alternatives
Cheaper than building alternatives
31
Topics Covered
IP Subnet Planning
Organization is given its network part
Divides remaining bits of IP address into subnet and
host part
Must balance number of subnets with hosts per
subnet
Directory Servers
Hierarchical data storage
LDAP
32
Topics Covered
Configuring Routers
Time-consuming; important skill
Cisco IOS is the dominant router operating system
Command-line interface (CLI)
Network Management Utilities
Both network managers and hackers love them
Host diagnostic tools. Is the connection working?
127.0.0.1
Windows XP: Connection Properties
33
Topics Covered
Network Management Utilities
Packet capture and display programs
Traffic summarization program (Etherpeek)
Netstat to show active connections
Route analysis: Ping and Tracert
Network mapping tools (nmap)
34
Topics Covered
Simple Network Management Protocol (SNMP)
Manager, managed devices, agents
Get and set commands
MIB
RMON probe
SNMP object model (MIB schema)
35
Topics Covered
Remote Switch and Management Utilities
Saves money compared to traveling to device
Telnet
Web interfaces
SSH
TFTP
36
Topics Covered
Traffic Management
Capacity is expensive on WANs
Overprovisioning is too wasteful on WANs
Priority is good but expensive to manage
QoS reservations only allow strong guarantees for
some services; rest get the scraps
Traffic shaping: only select certain type of traffic
Drop certain traffic or limit it to a certain amount
37
Networked Applications
Chapter 11
Copyright 2004 Prentice-Hall
Panko’s Business Data Networks and Telecommunications
5th edition
Application Architectures
Figure 11-1: Simple Terminal-Host System
All Processing is
Done on the Host
Slow Response Time
Monochrome Text
Little Graphics
Dumb
Terminal
Modem
Dumb
Terminal
Telephone
Network
Modem
Host
40
Figure 11-2: Client/Server Computing
File Server Program Access
1.
Program
Stored on
File Server
File Server
2.
Program
Downloaded to
Client PC
When Called
3.
Program
Executed on
Client PC Client PC!
Only useful for small programs (e-mail, word processing, etc.)
Because clients do not get very large
41
Figure 11-2: Client/Server Computing
Client/Server Processing with Request-Response Cycle
Request Message
Client Program
Response Message
Does Light I/O and
Post-Download
Processing
Client PC
Server Program
Does Heavy
Database
and Other Heavy
Processing
Server
Highly scalable: Use larger server as number of clients increases
42
Figure 11-3: Web-Enabled Application (E-Mail)
HTTP Request Message
Client is Browser
HTTP Response Message
Server Program
Almost all client PCs
now have browsers.
No need to install new software.
Client PC
E-Mail Server
43
E-Mail
Figure 11-4: E-Mail
Importance of E-Mail
Universal service on the Internet
Attachments make e-mail a general file delivery
mechanism
Viruses, worms, and spam, and other abuses
45
Figure 11-5: E-Mail Standards
SMTP
To Send
SMTP
To Send
Sender’s Mail
Server
Sending
E-Mail
Client
Receiver’s Mail
Server
Simple Mail Transfer Protocol
(SMTP) to transmit mail in real
time to a user’s mail server or
between mail servers
Receiving
E-Mail
Client
Sender-initiated
46
Figure 11-5: E-Mail Standards
Sender’s Mail
Server
Sending E-Mail
Client
Receiver’s Mail
Server
POP or IMAP to download mail to
receiver when the receiver is next
capable of downloading mail.
POP or
IMAP
To Receive
Receiving
E-Mail
Client
Receiver-initiated
47
Figure 11-4: E-Mail
E-Mail Standards
Downloading mail to client
Post Office Protocol (POP): Simple and widely
used
Internet Message Application Program (IMAP):
More powerful, can manage messages on the
receiver’s mail host, less widely used
48
Figure 11-5: E-Mail Standards
Sender’s Mail
Server
Receiver’s Mail
Server
Message Body Format Standard
Sending
E-Mail
Client
Message
RFC 822 or 2822
HTML body
UNICODE
Receiving
E-Mail
Client
49
Figure 11-4: E-Mail
E-Mail Standards
Message body standards
Receiver must understand sender’s message
RFC 822 and RFC 2822 for all-text bodies
HTML bodies with fancy text and graphics
UNICODE for non-English languages
50
Figure 11-6: Interactions in the Simple
Mail Transfer Protocol (SMTP)
Actor
Command
Comment
When a TCP connection
is opened, the receiver
signals that is is ready.
Sender asks to begin
HELO Voyager.cba.Hawaii.edu Sending a message.
Gives own identity.
Receiver signals that it
250 Mail.Panko.Com
Is ready to begin
Receiving a message.
Receiving SMTP
220 Mail.Panko.Com Ready
Process
Sending SMTP
Process
Receiver
51
Figure 11-6: Interactions in the Simple
Mail Transfer Protocol (SMTP)
Actor
Command
Comment
Sender
MAIL FROM: Panko@
voyager.cba.hawaii.edu
Sender identifies the sender
(mail author, not SMTP
process).
Receiver 250 OK
Accepts author. However,
May reject mail from others.
Sender
Identifies first mail recipient.
RCPT TO: [email protected]
Receiver 250 OK
Accepts first recipient
52
Figure 11-6: Interactions in the Simple
Mail Transfer Protocol (SMTP)
Actor
Command
Sender
RCPT TO:[email protected]
Comment
Sender
DATA
Identifies second mail
Recipient.
Does not accept second
Recipient. However will
deliver to first recipient.
Message will follow.
Receiver
354 Start mail input; end with
<CRLF>.<CRLF>
Gives permission to send
message.
Receiver 550 No such user here
53
Figure 11-6: Interactions in the Simple
Mail Transfer Protocol (SMTP)
Actor
Sender
Command
Comment
When in the course …
The message. Multiple lines
Of text. Ends with line
Containing only a single
Period: <CRLF>.<CRLF>
Receiver 250 OK
Receiver accepts message.
Sender
QUIT
Requests termination of
Session.
Receiver
221 Mail.Panko.Com Service
Closing transmission channel
End of transmission.
54
Figure 11-4: E-Mail
Viruses, Worms, and Trojan Horses
Widespread Problems
Often delivered by e-mail attachments
Use of antivirus software is almost universal but
not fully effective
55
Figure 11-4: E-Mail
Viruses, Worms, and Trojan Horses
Where to Do Scanning?
On client PCs
But users often turn off their software,
Fail to download virus definitions regularly
Or let their contracts lapse
On the corporate mail server or application
firewall
Users cannot turn off
56
Figure 11-4: E-Mail
Viruses, Worms, and Trojan Horses
Where to Do Scanning?
At an antivirus outsourcing company
Before mail ever reaches the company
High level of expertise
Defense in Depth
Do it in at least two places
57
Figure 11-4: E-Mail
Spam
Unsolicited commercial e-mail
Why filter?
Potential sexual harassment suits
Time consumed by users deleting them
Time consumed by staff to delete them
Bandwidth and storage consumed
Legitimate messages lost because overlooked
58
Figure 4-11: E-Mail
Spam
Separating SPAM from legitimate e-mail is difficult
Many spam messages get through to users
Some legitimate messages are deleted
Some firms merely mark messages as probable
spam
59
COS 338
Day 23
DAY 23 Agenda
Spring 2006 Book List
Http://perleybrook.umfk.maine.edu/sp2000bl.htm
Assignment 7 Due
Assignment 8 Posted
Due Dec 5 (last one)
Will drop lowest grade
Two labs left to grade (13 & 14)
Will drop the lowest grade
Today we will discuss Network Applications
61
Schedule for last 3 weeks
Today
Assignment 7 Due
Finish Chapter 111
Dec 5
Dec 8
Assignment 8 Due
Lab 8
Due Dec 12
Discussion on Final Group Lab
Build SOHO Network in OMS
5 Toshiba desktops
XP Pro and Linux?
1 Toshiba Server
Server 2003
1 HP 4SI Printer
JetDirect Office-connect
170x Print Server
Internet connections
Cisco Firewall and/or Router
Networked applications
Web Server
DHCP
??
Lab 8 Due
Part 2 of Final Lab
Dec 15
Dec 12
Exam 4
Capstone Progress Report Due
Part 1 of Final lab
Planning
Part 3 of Final Lab
Dec 19
10-12 noon
Capstones due
10 min presentation of Capstone
projects
62
HTML and HTTP
Figure 11-7: HTML and HTTP
Webserver
Application
Browser
HTTP Request
HTTP Response
Client PC
HTML Document
Webserver
64
Figure 11-8: Downloading a Complex
Webpage with Two Graphics Files
HTML Document
Browser
Client PC
Webserver
Application
Webserver
As
Displayed
2
Graphics
Files
Webpage Consists of Three Files
Rendered as a Single Page On-Screen
65
Figure 11-8: Downloading a Complex
Webpage with Two Graphics Files
HTML Document
HTML Document
Browser
Client PC
As
Displayed
Webserver
Application
2
Graphics
Files
Webserver
Download Requires 3
HTTP Request-Response Cycles;
Downloads HTML Page First
It has Tags to Identify Other Files
66
Figure 11-8: Downloading a Complex
Webpage with Two Graphics Files
Browser
Client PC
As
Displayed
Webserver
Application
2
Graphics
Files
Webserver
Based on Tags in HTML Document,
Browser Requests Downloads of
Remaining Graphics or Other Files
Browser Renders Combined Webpage on Screen
67
Figure 11-8: Downloading a Complex Webpage
with Two Graphics Files
Quiz: Your browser downloads a webpage with
three graphics images, a sound sequence,
and a Java applet. How many files will your
browser have to download?
68
Figure 11-9: Examples of HTTP Request and
Response Messages
HTTP Request Message
GET /panko/home.htm HTTP/1.1[CRLF]
Host: voyager.cba.hawaii.edu[CRLF]
69
Figure 11-9: Examples of HTTP Request and
Response Messages
HTTP Response Message
HTTP/1.1 200 OK[CRLF]
Date: Tuesday, 20-JAN-2004 18:32:15 GMT[CRLF]
Server: name of server software[CRLF]
MIME-version: 1.0[CRLF]
Content-type: text/plain[CRLF]
[CRLF]
File to be downloaded
70
Actual Response
=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2005.12.01 13:32:02 =~=~=~=~=~=~=~=~=~=~=~=
GET /start.htm
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Main Page</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<link href="cos.css" rel="stylesheet" type="text/css" />
</head>
<body background="ClearDay.jpg">
<p><img src="umfkb.gif" width="640" class="box1" /></p>
<p>
<h1 align="left" class="big">Tony Gauvin's Web Site
<img src="best_ne_seal_trans.gif" width="180" height="173" hspace="50" align="absmiddle" /></h1>
</p>
<p class="title">Textbook Lists</p>
<ul>
<li><a href="sp2006BL.htm" target="_blank">Spring 2006</a>
</li>
</ul>
<p class="title">Presentations</p>
<p class="dingbat" >Miscellaneous Presentations </p>
<ul>
<li>
<a href="http://perleybrook.umfk.maine.edu/slides/Tony%20Gauvin%20resume.ppt">Tony
Gauvin's Resume </a>
</li>
<li><a href="http://perleybrook.umfk.maine.edu/slides/hum%20102.ppt">Advice for
new UMFK Business Students </a>
</li>
<li><a href="http://perleybrook.umfk.maine.edu/slides/hum102Comp.ppt">Introduction to UMFK Academics For eCommerce Students</a>
</li>
<li><a href="http://perleybrook.umfk.maine.edu/slides/hum102FP.ppt">Introduction to Information Technologies at UMFK</a>
</li>
<li>
71
MIME
Multipurpose Internet Mail Extensions (MIME)
System for identifying format of a file.
Used in e-mail attachments
Used in HTTP downloads and other applications
Examples (Top-Level Media Type/Specific Type)
Text/Plain (plain ASCII text)
Image/JPEG (JPEG graphic file)
Octet/Stream (un-interpreted bytes for application)
Application/Postscript (Postscript application data)
72
E-Commerce
Figure 11-10: Electronic Commerce
Functions
Browser
Webserver
Application
E-Commerce
Server
Customer
PC
External
Bank
Internal
Warehouse
Database
74
Figure 11-10: Electronic Commerce
Functions
Webserver Functionality, Plus…
E-Commerce functionality
Online catalog
Shopping cart
Checkout, including payment
Customer resource management
Links to External Systems
Credit card number checking
Bank settlement
75
Figure 11-10: Electronic Commerce
Functions
E-Commerce functionality
Links to internal systems
Accounting
Pricing
Warehousing (Product Availability)
Shipment
Etc.
76
Figure 11-11: Application Server (3-Tier
Architecture
Client PC
with
Browser
1.
Form
Webserver
Application
2.
Server
Data
Mainframe
Server of
External Company
Database
Server
77
Figure 11-11: Application Server (3-Tier
Architecture
Client PC
with
Browser
Webserver
3.
Mainframe
Query and
Application
Response
Server
Mainframe
Mainframe CICS and other matters (3)
Database
Server
Server of
External Company
78
Figure 11-11: Application Server (3-Tier
Architecture
Client PC
with
Browser
Webserver
Application
Server
4.
DB Server Mainframe
Query and
Response
5. External Query/
Response
Database Sever Interactions (4, 5)
Application program interfaces (API)
Both internal and external database hosts
Database
Server
Server of
External Company
79
Figure 11-12: E-Commerce Security
Subnet for
Internal Hosts
(Little or No Access
From Outside)
Ethernet
Switch
DMZ
Subnet
(Easy Access from Outside)
Customer
DMZ: Subnet for
Externally-Facing
Servers
Marketing
Client
Accounting
Server
E-Commerce
Server
80
Figure 11-12: E-Commerce Security
SSL/TLS
SSL/TLS provides
protection against
eavesdroppers
Customer
E-Commerce
Server
81
82
83
Web Services
Figure 11-13: Ordinary Webservice versus
Web Service
Ordinary Webservice
HTTP Request
Browser
HTTP Response
Webserver
Application
Webserver
Client PC
HTML Document
Ordinary webservice was created to download documents
85
Figure 11-13: Ordinary Webservice versus
Web Service
Web Service
HTTP Request
Client PC
SOAPCapable
Browser
HTTP Response
SOAP Message
Using XML Syntax
Web
Service
Webserver
-Interface
Properties
Methods
Web services are objects (programs)
Clients send them commands and data
Web services send back results
86
Figure 11-13: Ordinary Webservice versus
Web Service
Web Service
HTTP Request
Client PC
SOAPCapable
Browser
HTTP Response
SOAP Message
Using XML Syntax
Web
Service
Webserver
-Interface
Properties
Methods
Web service requests are sent via FTP
They are sent as SOAP messages written in XML
87
Figure 11-13: Ordinary Webservice versus
Web Service
Web Service
HTTP Request
Client PC
SOAPCapable
Browser
HTTP Response
SOAP Message
Using XML Syntax
Web
Service
Webserver
-Interface
Properties
Methods
Web services have interfaces that will accept commands
Commands contain methods and properties (parameters)
88
Figure 11-14: Simple SOAP Request and Response
Simple Object Access Protocol (SOAP)
Carried in HTTP request or response message
Formatted using XML Syntax
Similar to HTML syntax but
the sender and receiver can
create new tags that
they can then use in
transactions, such as
<price>$33</price>
HTTP Header
SOAP
Body
89
Figure 11-14: Simple SOAP Request and Response
Situation
There is a pricing object that returns the price if
another object sends the part number, quantity, and
shipping type (rush, etc.) on an interface
Objects can be on different computers
Request
(PartNum, Quantity, ShippingType)
Sending
Object
Pricing
Object
Response
(Price)
90
Figure 11-14: Simple SOAP Request and Response
SOAP Request Message
HTTP Request Header pointing to program
<?xml version=“1.0”>
<BODY>
<QuotePrice xmlns=“QuoteInterface”>
<PartNum>QA78d</PartNum>
<Quantity>47</Quantity>
<ShippingType>Rush</ShippingType>
</QuotePrice>
</BODY>
Note: xmlns specifies an XML namespace for the object
91
Figure 11-14: Simple SOAP Request and Response
SOAP Response Message
HTTP Response Header
<?xml version=“1.0”>
<BODY>
<QuotePrice xmlns=“QuoteInterface”>
<Price>$750.33</Price>
</QuotePrice>
</BODY>
92
Web Services: A More Complex Example
New
Not in Book
Service
Via HTTP:
SOAP +
XML
Client PC
With
Browser
Web service
1
(Object)
Server
Service Via HTTP:
SOAP + XML
Web service
2
(Object)
New: Not
In Book
Service Via HTTP:
SOAP + XML
Web service
3
(Object)
Mainframe
Minicomputer
93
Figure 11-15: Universal Description, Discovery, and
Integration (UDDI) Server for Web Services
UDDI Functions:
Client PC
2.
Web Service Interaction
1.
UDDI
Request for
Information,
Response
UDDI Server
Server with
Web Service
Interaction Between
UDDI Servers
to Fulfill a Request
White Pages
By name
Yellow Pages
By type
Green Pages
Details of how
to use,
payment, etc.
UDDI Server
94
Web Service Description Language (WSDL)
Protocol for asking a corporate
webserver about the company’s
SOAP-compliant services
Client PC
New: Not
In Book
WSDL
Request-Response Cycle
Corporate
Webserver
95
Perspective on Web Services
Benefits of Web Services
New: Not
In Book
Offers a way to standardize interactions between
objects over the Internet
Can make distributed computing far simpler once
Web services standards are fully developed
Concerns
High overhead (very chatty)
Standards immaturity
Security is embryonic
96
Peer-to-Peer Computing
Figure 11-16: Traditional Client/Server Application
Client PC
Client PC
Advantage:
Central Control
Client PC
Client PC
Client PC
Disadvantages:
Network Overload at Server
Underused Client Power
Central Control
Server Does Heavy Processing Work
98
Figure 11-17: Simple Peer-to-Peer (P2P) Application
Request
Client PC
Response
Benefits:
End User Freedom
No Network Bottleneck at Serve
Uses Client Capacity Better
Client PC
Problems:
Transient Presence of Clients
Transient Client IP Addresses
Security (No Central Control)
99
P2P Applications
Direct service, although some P2P systems
use facilitating servers for some of the work
Peer
Peer
Peer
Peer
Peer
Peer
100
Figure 11-18: Gnutella: Pure P2P with Viral
Networking
Gnutella
Client (ABC)
1. Init or
Search
Message
2.
Init or Search
Message
2. Init or
Search
Message
Gnutella
Client
(Carol)
3.
Init or Search
Message
Gnutella
Client (DEF)
3. Init or
Search
Message
3. Init or
Search
Message
4.
P2P File Download
HTTP Request-Response Gnutella
Cycle
Client (XYZ)
Gnutella
Client (GHI)
101
Gnutella
Gnutella uses viral networking for initial
identification messages
To announce a client’s presence and see what
other users are available
Time-to-live limited to 5-7 hops to moderate load on
network
Gnutella uses viral networking for searches
Gnutella uses direct interaction for file
download
102
Figure 11-19: Napster
Napster
Index Server
1.
Uploads List
Of Available Files
When Connects
Client PC
2.
Search Query
3.
Response
File List
List of
Available
Files
From All
Current Clients
Client PC
4.
Large P2P
Download
Client PC
103
Figure 11-20: Use of Servers in Instant Messaging
Pure P2P IM
Ongoing
Communication
Client PC A
Client PC B
In pure P2P IM, there are no servers
The clients communicate directly
Finding each other can be difficult because of DHCP
104
Figure 11-20: Use of Servers in Instant Messaging
Use of a Presence Server
1.
Presence
Information
Client PC C
3.
Ongoing
Communication
2.
Presence
Information
Client PC D
Clients register with presence servers
Presence servers notify other clients as appropriate
Clients use this information to communicate directly
105
Figure 11-20: Use of Servers in Instant Messaging
Use of a Relay Server
All Communication
Goes through the
Relay Server
Client PC E
Presence
Information
Client PC F
Relay servers route all IM messages.
This permits security filtering and other services.
It limits privacy because the relay server sees everything.
106
How Grid Computing Works
Using many (>100 and more like 10000)
ordinary computers connected together over a
network to perform a single task or a series of
related tasks
Examples
Seti@home
Beowulf
Factoring large numbers
107
Figure 11-21: SETI@Home Client PC Processor
Sharing
1. I am idle. Give me work.
2. Here is work to do
3. I am busy now. Here are my results.
Idle Client PC
With SETI@home
Screen Saver Program
SETI@home
Server
No Interaction
Busy Client PC
With SETI@home
Screen Saver Program
108
Seti@home
109
Largest number ever factored
110
Perspective on Application Architectures
Driven primarily by the evolution of client
processing power
Terminal-Host: Client processing power was
uneconomical
Client/Server: Client PCs could handle some
of the load
P2P: Clients have rich power to do most
things
111
Topics Covered
Application Architectures
Terminal-Host Computing
Host does all the work
Client/Server Computing
File server program access: client executes the program
Client/server processing: both the client and the server both
do considerable work
Peer-to-Peer (P2P)
The client PCs do most or all of the work
If servers are present, they facilitate the PCs
113
Application Architectures
E-Mail
SMTP to send
POP or IMAP to download
Web-based e-mail uses HTTP
E-Mail Bodies
RFC 822 and RFC 2822 for pure-text messages
HTML bodies
UNICODE for international alphabets
114
Topics Covered
Viruses, Worms, and Trojan horses
Thwarted by antivirus scanning
Where to do the scanning
Spam
HTML and HTTP
HTTP – sending and receiving messages
HTML – body format
Most pages have text, graphics, etc.
Multiple request-response cycles per webpage
115
Topics Covered
HTTP Request and Response Messages
All-text formats
MIME
Standard for describing file formats
116
Topics Covered
E-Commerce
Functionality beyond webservice
Links to other systems
Application server integrates information
Web Services
Generalized way to send commands to remote
programs and get responses
Formatted in SOAP format which uses XML syntax
UDDI and WSDL
117
Topics Covered
P2P Computing
Exploits the growing processing power of client
PCs
May use servers to facilitate what is primarily a P2P
application
File sharing
Gnutella does not use facilitating servers
Napster (the original) did use facilitating servers
118
Topics Covered
P2P Computing
Instant Messaging (IM)
Pure P2P
Presence servers
Relay servers
Processor Sharing (e.g., SETI@home)
119