Clients and Servers.ppt

Mohammed Ilyas
Mohammed IlyasAsst. Professor at College Of Engineering, Cherthala em College Of Engineering, Cherthala
How Clients and Servers
Work Together
2
Objectives
• Learn about the interaction of clients and servers
• Explore the features and functions of Web servers
• Examine how e-mail server and client software work
• Use FTP to transfer files
• Initiate and use a Telnet session
• Subscribe to and use newsgroups
• Learn about gophers and gopher space
3
• A server can be software that provides a service to
other software or the computer on which the server
software is running.
• Consider a server as a software application that must
be installed and managed by someone with the title
of system administrator, network administrator, or, for
Web servers, Webmaster.
Understanding How Clients and Servers
Interact
4
User Interfaces: GUI Versus Command-
Driven
• In a command-driven interface, you type
commands into a user interface to perform a task and
achieve a desired result.
• A graphical user interface (GUI) has icons or
menus that you can select to perform a function or
run a program.
5
User Interfaces: GUI Versus Command-
Driven (Continued)
• Applications that run on computers and servers can
also be controlled by configuration or initialization
files.
• An initialization file (INI file) is an ASCII text file with
a .ini file extension.
6
Client/Server Sessions
• TCP (Transmission
Control Protocol)
manages the three-
way handshake that
establishes a
session to be used
by application
protocols, such as
HTTP or FTP.
7
Tracking Information in Log Files
• Servers and client applications often track information
about their activities in log files.
• These are text files that administrators can use to
troubleshoot problems with the software, to track
activities to analyze traffic patterns or user
preferences, or to look for clues indicating that
hackers are using the server.
8
All-in-One Clients
• As the number of applications that use the Internet
grows, the need for client software on computers to
use these applications also grows.
• One solution to the growing number of Internet
applications is an all-in-one client or universal
client.
• These clients can handle several applications and
adjust appropriately, changing buttons and functions
to accommodate each application.
• Microsoft Internet Explorer is a good example of an
all-in-one client.
9
Exploring the Features and Functions of
Web Servers
• A wide variety of Web servers are available, many of
which you can download for free.
• Some popular Web servers include the following:
– Apache Web Server
– Microsoft Internet Information Services (IIS)
– Border Manager
– Netscape Enterprise Server (NES)
10
Ability to Support Virtual Servers and
Virtual Hosts
• A Web server should be able to support virtual
servers and virtual hosting.
• Most virtual hosts handle multiple domain names on
the same server by having the Uniform Resource
Locator (URL) serve as a path to a file.
• Figure 3-10 illustrates the difference between virtual
servers and virtual hosting.
11
Ability to Support Virtual Servers and
Virtual Hosts (Continued)
12
Protocols Supported
• All Web servers support HTTP, and some also
support FTP so developers can send files to the site
from remote locations.
• If you want to use your Web server for e-mail, the
server must support e-mail protocols.
13
Access Control
• Based on the user’s IP address or user ID, access
control allows the Web server to limit to which files a
user can read or write. User Ids are associated with
passwords to verify a user’s identity.
• Another method of access control is changing the
port at which a server is listening.
• Port 80 is the default port for Web servers.
• Apache Web Server controls access to its resources
via a process known as authentication, which
requires a user to enter a valid user ID and password
to access a Web site.
14
Access Control (Continued)
15
Encrypting Protocols
• A secure protocol used by Web servers is SSL
(Secure Sockets Layer).
• When you see a URL with https: at the beginning
instead of http:, you know that this Web server is
using the SSL protocol for security.
16
Chroot Mode
• Chroot mode restricts the portion of the file system
that the server occupies.
• Running in chroot mode offers security because all
private files can be kept outside of the server area.
17
Server Side Scripting
• A script is a short list of instructions that certain
software can perform.
• The instructions must be written in a format called a
scripting language.
• Popular scripting languages include Perl, VBScript,
and JavaScript.
18
Standard CGI-Based Scripts
• Common Gateway Interface (CGI) is the set of
specifications that defines how a Web server passes
a Web user’s input to an application program running
on the server, receives a response, and passes data
back to the user.
• One advantage of CGI scripts is that they are
consistent among operating systems.
19
Server-Side Include (SSI)
• Server-Side Include (SSI) is a simple form of
scripting that allows you to include variable values in
HTML code before it is sent to the browser.
• SSI scripts insert a line in the HTML file that indicates
a variable value needs to be entered before the file is
sent to the browser.
20
Database Interfaces
• Before selecting a Web server or a virtual hosting
service, find out what databases the server supports
and what tools can exchange information with the
database.
• Popular databases are MS Access, MySQL, Oracle,
and SQL Server.
21
Ability to Monitor Performance
• Microsoft IIS uses Performance Monitor, a program
that comes with Windows Server 2003 and Windows
2000 Server, to monitor performance.
• Other utility programs are Microsoft Web Capacity
Analysis Tool (WCAT) and Server Check Pro by
NetMechanic.
22
Web Server Protocols
• HTTP and TCP/IP are the two main protocols used
with Web servers.
• HTTP methods used for browser requests are GET,
POST, HEAD, PUT, and DELETE.
• The most frequently used method is GET, which
requests files from the Web server.
• A dialog is a series of commands from the sender to
the receiver and replies from the receiver to the
sender.
23
Starting and Using Apache
• You can start Apache from the Windows Start menu
or from a Command Prompt window.
• If you start Apache from a Command Prompt window,
you can see error messages if they arise.
• The home page of your Apache Web Server can be
accessed from another computer on your local area
network.
• Follow the instructions to start and use Apache
shown on pages 145 and 146.
24
Apache Log Files
• You can look at the log files that Apache generates to
help troubleshoot problems with the Web site.
• The two log files provided by Apache are the error log
file and the access log file (access.log).
• Figure 3-17 shows a snapshot of the access log,
which includes many GET methods where clients
have requested Web pages.
25
Apache Log Files (Continued)
26
Examining E-Mail Client and Server
Software
• The sender’s computer and e-mail server both use
SMTP (Simple Mail Transfer Protocol) to send an
e-mail message to its destination.
• After the message arrives at the destination e-mail
server, it remains there until the recipient requests
delivery.
• The recipient’s e-mail server uses one of two
protocols to deliver the message: POP (Post Office
Protocol) or IMAP4 (Internet Message Access
Protocol, version 4).
27
Examining E-Mail Client and Server
Software (Continued)
• Internet protocols are described and defined in an
RFC (Request for Comments) sent to the Internet
development community.
• When e-mail experts speak of error messages
created during e-mail transactions, they sometimes
call these messages 822 messages.
28
Managing Your E-Mail Clients
• E-mail client software communicates with an e-mail server when
it sends and receives e-mail.
• Some of the most common e-mail clients are Eudora, Outlook
Express, Outlook, and Pegasus Mail.
• When you configure your e-mail client software for the first time,
you need to enter the addresses of your e-mail servers.
• The three e-mail protocols are SMTP, POP, and IMAP.
29
SMTP
• SMTP is the protocol used to send e-mail over the
Internet.
• SMTP is typical of many client/server protocols in the
TCP/IP protocol suite in that character-based
commands are issued from the client and the server
replies with numeric codes.
• An SMTP transaction begins when an e-mail client
program sends an e-mail message to a recipient.
30
SMTP (Continued)
• SMTP is considered a stateful protocol because it
can recognize and interpret the nature of the material
being sent, such as commands or data.
• In contrast, TCP is considered a stateless protocol
because it is not concerned with what is being sent.
• TCP establishes the session but does not interpret
the transmissions that occur during the session.
31
POP
• POP is used when a client downloads its e-mail
messages from a server.
• First, the client sends the user ID and password to
the server.
• The server verifies that the user has an e-mail
account with the server.
• Then a session is established between the client and
the server.
32
POP (Continued)
• Next, transactions occur as the client requests the
mail, and then the session is closed.
• This process contains three states:
– Authentication
– Transaction
– Update
33
IMAP
• IMAP is expected to replace POP because it offers
these additional functions:
– Messages can be archived in folders on the server.
– Mailboxes can be shared, so multiple users can access
the same mail.
– Users can easily access multiple mail servers.
– Users can choose to read only the header information
about an attached file without opening the file.
– Attached files need not be downloaded with every
message.
34
E-Mail Server Software
• An ISP or large business using the Internet or having
an intranet is responsible for providing an e-mail
server for its subscribers or employees.
• E-mail servers most likely are installed on UNIX,
Linux, Windows 2000 Server, or Windows Server
2003.
35
Microsoft Exchange Server
• Protocols supported by Exchange Server include
HTTP, MAPI, POP3, IMAP4, and NNTP protocols.
• NNTP (Network News Transfer Protocol) is the
protocol used by newsgroups.
• MAPI (Messaging Application Programming
Interface) is a specification that allows an application
to interact with an e-mail client to send and receive
e-mail.
• Microsoft Exchange Server supports hot backups and
dynamic rerouting.
36
IBM Lotus Domino
• Lotus Domino by IBM is designed for large
companies and ISPs.
• It can be run on a variety of server platforms,
such as Windows NT Server, Windows 2000
Server, Windows Server 2003, Sun Solaris,
IBM OS/400, and several flavors of Linux.
• Domino provides a useful feature that allows
administrators to remotely manage the e-mail
server from the Web browser on any
computer in their network.
37
Novell GroupWise
• This product is designed for medium to large
companies running NetWare or Windows
Server platforms.
• To run GroupWise, you must set up Novell
Directory Services.
38
E-Mail Client Support for HTML
• For most of the time e-mail has existed, e-
mail messages have consisted of text only.
• Recently, HTML e-mail has become very
popular.
• Eudora, Outlook Express, and Outlook
clients now support HTML in the body of e-
mail messages.
39
Using FTP to Transfer Files
• Web servers (using HTTP) and e-mail software
(using SMTP) must encode data so it appears as text
when it travels over the Internet.
• FTP (File Transfer Protocol) offers an alternative.
• FTP can transfer binary files over the Internet without
the encoding and decoding overhead, making it a
popular protocol for moving files over the Internet.
• An FTP site is a computer running an FTP server
application.
40
Using FTP to Transfer Files (Continued)
• Large organizations might maintain several FTP sites
in different parts of the world to speed up download
time across the globe.
• These are called mirror sites.
• A mirror site is a server that contains the same set
of files as a heavily used server to off-load some of
the burden of providing the files to the community
using them.
• Mirror sites also serve as a backup for the main
server in case the main server fails.
41
How FTP Works
• An FTP server identifies users on an FTP site by their
user IDs.
• FTP client and server software create a session after
you are logged on.
• The FTP client has access to the file system on the
server.
• The local computer (the client) issues character-like
commands, and the remote computer (the server)
replies with numbers that are interpreted by the local
computer.
42
FTP Via a Web Browser
• Download software from a Web site
• The protocol changes from http:// to ftp:// in
the Web browser’s Address box.
43
FTP from a Command Prompt
• Most operating systems, including Windows 9x,
Windows NT, Windows 2000, and Windows XP, offer
FTP client software that runs from a command
prompt.
• A batch file is a file with a .bat file extension that
contains a list of DOS-like commands that can be
executed as a group.
44
FTP from a Command Prompt
(Continued)
• Another protocol similar to FTP is TFTP (Trivial
FTP).
• TFTP has fewer commands than FTP and can be
used only to send and receive files.
• It can be used for multicasting in which a file is sent
to more than one client at the same time using the
UDP (User Datagram Protocol).
45
Initiating and Using Telnet Sessions
• A Telnet window on a computer is a command
window to a remote computer in which any command
can be executed just as though the user were sitting
at the computer console.
• Telnet is a protocol used to pass commands and
replies between the client the the UNIX computer.
• All UNIX systems support some form of Telnet.
46
Subscribing to and Using Newsgroups
• A newsgroup is a service on the Internet or private
network where a group of people can post articles
and responses to those articles so information can be
shared among the members of the group.
• A newsgroup uses NNTP.
• This protocol works much like SMTP, whereby
commands are issued from the client or requesting
server as character-based words followed by
arguments, and replies come from the news server in
the form of numeric codes followed by descriptive
text.
47
Understanding Gophers and Gopher
Space
• A gopher is a distribution service for text files on the
Internet that runs on a UNIX computer using the
Gopher protocol.
• A gopher service runs on a UNIX computer, tracking
the documents available on the server in the form of
a hierarchical site menu called gopher space.
• When you access the service, you can browse the
gopher space by searching these top-down lists.
1 de 47

Recomendados

Module 5 Application and presentation Layer .pptx por
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxAASTHAJAJOO
19 visualizações156 slides
1. web technology basics por
1. web technology basics1. web technology basics
1. web technology basicsJyoti Yadav
327 visualizações66 slides
Hypertexttransferprotocolhttp 131012171813-phpapp02 por
Hypertexttransferprotocolhttp 131012171813-phpapp02Hypertexttransferprotocolhttp 131012171813-phpapp02
Hypertexttransferprotocolhttp 131012171813-phpapp02Nidhitransport
72 visualizações19 slides
WEB-DBMS A quick reference por
WEB-DBMS A quick referenceWEB-DBMS A quick reference
WEB-DBMS A quick referenceMarc Dy
4.5K visualizações96 slides
Web & HTTP por
Web & HTTPWeb & HTTP
Web & HTTPMansiSingh269494
18 visualizações12 slides
HyperText Transfer Protocol (HTTP) por
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)Gurjot Singh
82.6K visualizações19 slides

Mais conteúdo relacionado

Similar a Clients and Servers.ppt

Web technology por
Web technologyWeb technology
Web technologySelvin Josy Bai Somu
40.8K visualizações130 slides
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10 por
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10Waqas Ahmed Nawaz
138 visualizações21 slides
How the internet_works por
How the internet_worksHow the internet_works
How the internet_worksarun nalam
3K visualizações30 slides
Unit v por
Unit v Unit v
Unit v APARNA P
43 visualizações15 slides
1-1.pdf por
1-1.pdf1-1.pdf
1-1.pdfssusera99a83
4 visualizações7 slides
Web essentials clients, servers and communication – the internet – basic inte... por
Web essentials clients, servers and communication – the internet – basic inte...Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...smitha273566
2K visualizações37 slides

Similar a Clients and Servers.ppt(20)

CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10 por Waqas Ahmed Nawaz
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
Waqas Ahmed Nawaz138 visualizações
How the internet_works por arun nalam
How the internet_worksHow the internet_works
How the internet_works
arun nalam3K visualizações
Unit v por APARNA P
Unit v Unit v
Unit v
APARNA P43 visualizações
1-1.pdf por ssusera99a83
1-1.pdf1-1.pdf
1-1.pdf
ssusera99a834 visualizações
Web essentials clients, servers and communication – the internet – basic inte... por smitha273566
Web essentials clients, servers and communication – the internet – basic inte...Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...
smitha2735662K visualizações
unit 1(chapter1).pdf por ArunArun542872
unit 1(chapter1).pdfunit 1(chapter1).pdf
unit 1(chapter1).pdf
ArunArun5428723 visualizações
Web-Server & It's Architecture.pptx por AlokKumar250045
Web-Server & It's Architecture.pptxWeb-Server & It's Architecture.pptx
Web-Server & It's Architecture.pptx
AlokKumar25004513 visualizações
Lecture 11 client_server_interaction por Serious_SamSoul
Lecture 11 client_server_interactionLecture 11 client_server_interaction
Lecture 11 client_server_interaction
Serious_SamSoul1.1K visualizações
Application layer protocols por FabMinds
Application layer protocolsApplication layer protocols
Application layer protocols
FabMinds638 visualizações
Presentation 1 por aisadhsa
Presentation 1Presentation 1
Presentation 1
aisadhsa377 visualizações
applayer.pptx por ssuser8b4eb21
applayer.pptxapplayer.pptx
applayer.pptx
ssuser8b4eb213 visualizações
pdf to ppt window configuration .pptx por TadeseBeyene
pdf to ppt window configuration .pptxpdf to ppt window configuration .pptx
pdf to ppt window configuration .pptx
TadeseBeyene11 visualizações
0_Leksion_Web_Servers (1).pdf por Zani10
0_Leksion_Web_Servers (1).pdf0_Leksion_Web_Servers (1).pdf
0_Leksion_Web_Servers (1).pdf
Zani1013 visualizações
CNIT 129S - Ch 3: Web Application Technologies por Sam Bowne
CNIT 129S - Ch 3: Web Application TechnologiesCNIT 129S - Ch 3: Web Application Technologies
CNIT 129S - Ch 3: Web Application Technologies
Sam Bowne963 visualizações
window configuration & Administration.pptx por TadeseBeyene
window   configuration  & Administration.pptxwindow   configuration  & Administration.pptx
window configuration & Administration.pptx
TadeseBeyene8 visualizações
Configuring and administrate server por Gera Paulos
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate server
Gera Paulos1K visualizações
MODULE-5_CCN.pptx por DrShivashankar1
MODULE-5_CCN.pptxMODULE-5_CCN.pptx
MODULE-5_CCN.pptx
DrShivashankar1141 visualizações
Multimedia- How Internet Works por sambhenilesh
Multimedia- How Internet WorksMultimedia- How Internet Works
Multimedia- How Internet Works
sambhenilesh3.3K visualizações

Último

Berry country.pdf por
Berry country.pdfBerry country.pdf
Berry country.pdfMariaKenney3
75 visualizações12 slides
12.5.23 Poverty and Precarity.pptx por
12.5.23 Poverty and Precarity.pptx12.5.23 Poverty and Precarity.pptx
12.5.23 Poverty and Precarity.pptxmary850239
381 visualizações30 slides
DISTILLATION.pptx por
DISTILLATION.pptxDISTILLATION.pptx
DISTILLATION.pptxAnupkumar Sharma
65 visualizações47 slides
Volf work.pdf por
Volf work.pdfVolf work.pdf
Volf work.pdfMariaKenney3
89 visualizações43 slides
Education of marginalized and socially disadvantages segments.pptx por
Education of marginalized and socially disadvantages segments.pptxEducation of marginalized and socially disadvantages segments.pptx
Education of marginalized and socially disadvantages segments.pptxGarimaBhati5
43 visualizações36 slides
MUET Newsletter Vol-IX, Issue-III, 2023 por
MUET Newsletter Vol-IX, Issue-III, 2023MUET Newsletter Vol-IX, Issue-III, 2023
MUET Newsletter Vol-IX, Issue-III, 2023Mehran University of Engineering & Technology, Jamshoro
139 visualizações16 slides

Último(20)

Berry country.pdf por MariaKenney3
Berry country.pdfBerry country.pdf
Berry country.pdf
MariaKenney375 visualizações
12.5.23 Poverty and Precarity.pptx por mary850239
12.5.23 Poverty and Precarity.pptx12.5.23 Poverty and Precarity.pptx
12.5.23 Poverty and Precarity.pptx
mary850239381 visualizações
DISTILLATION.pptx por Anupkumar Sharma
DISTILLATION.pptxDISTILLATION.pptx
DISTILLATION.pptx
Anupkumar Sharma65 visualizações
Volf work.pdf por MariaKenney3
Volf work.pdfVolf work.pdf
Volf work.pdf
MariaKenney389 visualizações
Education of marginalized and socially disadvantages segments.pptx por GarimaBhati5
Education of marginalized and socially disadvantages segments.pptxEducation of marginalized and socially disadvantages segments.pptx
Education of marginalized and socially disadvantages segments.pptx
GarimaBhati543 visualizações
Class 9 lesson plans por TARIQ KHAN
Class 9 lesson plansClass 9 lesson plans
Class 9 lesson plans
TARIQ KHAN82 visualizações
Guess Papers ADC 1, Karachi University por Khalid Aziz
Guess Papers ADC 1, Karachi UniversityGuess Papers ADC 1, Karachi University
Guess Papers ADC 1, Karachi University
Khalid Aziz99 visualizações
Create a Structure in VBNet.pptx por Breach_P
Create a Structure in VBNet.pptxCreate a Structure in VBNet.pptx
Create a Structure in VBNet.pptx
Breach_P86 visualizações
Parts of Speech (1).pptx por mhkpreet001
Parts of Speech (1).pptxParts of Speech (1).pptx
Parts of Speech (1).pptx
mhkpreet00146 visualizações
JRN 362 - Lecture Twenty-Three (Epilogue) por Rich Hanley
JRN 362 - Lecture Twenty-Three (Epilogue)JRN 362 - Lecture Twenty-Three (Epilogue)
JRN 362 - Lecture Twenty-Three (Epilogue)
Rich Hanley41 visualizações
Retail Store Scavenger Hunt.pptx por jmurphy154
Retail Store Scavenger Hunt.pptxRetail Store Scavenger Hunt.pptx
Retail Store Scavenger Hunt.pptx
jmurphy15452 visualizações
NodeJS and ExpressJS.pdf por ArthyR3
NodeJS and ExpressJS.pdfNodeJS and ExpressJS.pdf
NodeJS and ExpressJS.pdf
ArthyR348 visualizações
EILO EXCURSION PROGRAMME 2023 por info33492
EILO EXCURSION PROGRAMME 2023EILO EXCURSION PROGRAMME 2023
EILO EXCURSION PROGRAMME 2023
info33492202 visualizações
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE... por Nguyen Thanh Tu Collection
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...
Nguyen Thanh Tu Collection89 visualizações
UNIDAD 3 6º C.MEDIO.pptx por MarcosRodriguezUcedo
UNIDAD 3 6º C.MEDIO.pptxUNIDAD 3 6º C.MEDIO.pptx
UNIDAD 3 6º C.MEDIO.pptx
MarcosRodriguezUcedo146 visualizações
Narration lesson plan por TARIQ KHAN
Narration lesson planNarration lesson plan
Narration lesson plan
TARIQ KHAN75 visualizações
Meet the Bible por Steve Thomason
Meet the BibleMeet the Bible
Meet the Bible
Steve Thomason78 visualizações
11.30.23A Poverty and Inequality in America.pptx por mary850239
11.30.23A Poverty and Inequality in America.pptx11.30.23A Poverty and Inequality in America.pptx
11.30.23A Poverty and Inequality in America.pptx
mary850239130 visualizações

Clients and Servers.ppt

  • 1. How Clients and Servers Work Together
  • 2. 2 Objectives • Learn about the interaction of clients and servers • Explore the features and functions of Web servers • Examine how e-mail server and client software work • Use FTP to transfer files • Initiate and use a Telnet session • Subscribe to and use newsgroups • Learn about gophers and gopher space
  • 3. 3 • A server can be software that provides a service to other software or the computer on which the server software is running. • Consider a server as a software application that must be installed and managed by someone with the title of system administrator, network administrator, or, for Web servers, Webmaster. Understanding How Clients and Servers Interact
  • 4. 4 User Interfaces: GUI Versus Command- Driven • In a command-driven interface, you type commands into a user interface to perform a task and achieve a desired result. • A graphical user interface (GUI) has icons or menus that you can select to perform a function or run a program.
  • 5. 5 User Interfaces: GUI Versus Command- Driven (Continued) • Applications that run on computers and servers can also be controlled by configuration or initialization files. • An initialization file (INI file) is an ASCII text file with a .ini file extension.
  • 6. 6 Client/Server Sessions • TCP (Transmission Control Protocol) manages the three- way handshake that establishes a session to be used by application protocols, such as HTTP or FTP.
  • 7. 7 Tracking Information in Log Files • Servers and client applications often track information about their activities in log files. • These are text files that administrators can use to troubleshoot problems with the software, to track activities to analyze traffic patterns or user preferences, or to look for clues indicating that hackers are using the server.
  • 8. 8 All-in-One Clients • As the number of applications that use the Internet grows, the need for client software on computers to use these applications also grows. • One solution to the growing number of Internet applications is an all-in-one client or universal client. • These clients can handle several applications and adjust appropriately, changing buttons and functions to accommodate each application. • Microsoft Internet Explorer is a good example of an all-in-one client.
  • 9. 9 Exploring the Features and Functions of Web Servers • A wide variety of Web servers are available, many of which you can download for free. • Some popular Web servers include the following: – Apache Web Server – Microsoft Internet Information Services (IIS) – Border Manager – Netscape Enterprise Server (NES)
  • 10. 10 Ability to Support Virtual Servers and Virtual Hosts • A Web server should be able to support virtual servers and virtual hosting. • Most virtual hosts handle multiple domain names on the same server by having the Uniform Resource Locator (URL) serve as a path to a file. • Figure 3-10 illustrates the difference between virtual servers and virtual hosting.
  • 11. 11 Ability to Support Virtual Servers and Virtual Hosts (Continued)
  • 12. 12 Protocols Supported • All Web servers support HTTP, and some also support FTP so developers can send files to the site from remote locations. • If you want to use your Web server for e-mail, the server must support e-mail protocols.
  • 13. 13 Access Control • Based on the user’s IP address or user ID, access control allows the Web server to limit to which files a user can read or write. User Ids are associated with passwords to verify a user’s identity. • Another method of access control is changing the port at which a server is listening. • Port 80 is the default port for Web servers. • Apache Web Server controls access to its resources via a process known as authentication, which requires a user to enter a valid user ID and password to access a Web site.
  • 15. 15 Encrypting Protocols • A secure protocol used by Web servers is SSL (Secure Sockets Layer). • When you see a URL with https: at the beginning instead of http:, you know that this Web server is using the SSL protocol for security.
  • 16. 16 Chroot Mode • Chroot mode restricts the portion of the file system that the server occupies. • Running in chroot mode offers security because all private files can be kept outside of the server area.
  • 17. 17 Server Side Scripting • A script is a short list of instructions that certain software can perform. • The instructions must be written in a format called a scripting language. • Popular scripting languages include Perl, VBScript, and JavaScript.
  • 18. 18 Standard CGI-Based Scripts • Common Gateway Interface (CGI) is the set of specifications that defines how a Web server passes a Web user’s input to an application program running on the server, receives a response, and passes data back to the user. • One advantage of CGI scripts is that they are consistent among operating systems.
  • 19. 19 Server-Side Include (SSI) • Server-Side Include (SSI) is a simple form of scripting that allows you to include variable values in HTML code before it is sent to the browser. • SSI scripts insert a line in the HTML file that indicates a variable value needs to be entered before the file is sent to the browser.
  • 20. 20 Database Interfaces • Before selecting a Web server or a virtual hosting service, find out what databases the server supports and what tools can exchange information with the database. • Popular databases are MS Access, MySQL, Oracle, and SQL Server.
  • 21. 21 Ability to Monitor Performance • Microsoft IIS uses Performance Monitor, a program that comes with Windows Server 2003 and Windows 2000 Server, to monitor performance. • Other utility programs are Microsoft Web Capacity Analysis Tool (WCAT) and Server Check Pro by NetMechanic.
  • 22. 22 Web Server Protocols • HTTP and TCP/IP are the two main protocols used with Web servers. • HTTP methods used for browser requests are GET, POST, HEAD, PUT, and DELETE. • The most frequently used method is GET, which requests files from the Web server. • A dialog is a series of commands from the sender to the receiver and replies from the receiver to the sender.
  • 23. 23 Starting and Using Apache • You can start Apache from the Windows Start menu or from a Command Prompt window. • If you start Apache from a Command Prompt window, you can see error messages if they arise. • The home page of your Apache Web Server can be accessed from another computer on your local area network. • Follow the instructions to start and use Apache shown on pages 145 and 146.
  • 24. 24 Apache Log Files • You can look at the log files that Apache generates to help troubleshoot problems with the Web site. • The two log files provided by Apache are the error log file and the access log file (access.log). • Figure 3-17 shows a snapshot of the access log, which includes many GET methods where clients have requested Web pages.
  • 25. 25 Apache Log Files (Continued)
  • 26. 26 Examining E-Mail Client and Server Software • The sender’s computer and e-mail server both use SMTP (Simple Mail Transfer Protocol) to send an e-mail message to its destination. • After the message arrives at the destination e-mail server, it remains there until the recipient requests delivery. • The recipient’s e-mail server uses one of two protocols to deliver the message: POP (Post Office Protocol) or IMAP4 (Internet Message Access Protocol, version 4).
  • 27. 27 Examining E-Mail Client and Server Software (Continued) • Internet protocols are described and defined in an RFC (Request for Comments) sent to the Internet development community. • When e-mail experts speak of error messages created during e-mail transactions, they sometimes call these messages 822 messages.
  • 28. 28 Managing Your E-Mail Clients • E-mail client software communicates with an e-mail server when it sends and receives e-mail. • Some of the most common e-mail clients are Eudora, Outlook Express, Outlook, and Pegasus Mail. • When you configure your e-mail client software for the first time, you need to enter the addresses of your e-mail servers. • The three e-mail protocols are SMTP, POP, and IMAP.
  • 29. 29 SMTP • SMTP is the protocol used to send e-mail over the Internet. • SMTP is typical of many client/server protocols in the TCP/IP protocol suite in that character-based commands are issued from the client and the server replies with numeric codes. • An SMTP transaction begins when an e-mail client program sends an e-mail message to a recipient.
  • 30. 30 SMTP (Continued) • SMTP is considered a stateful protocol because it can recognize and interpret the nature of the material being sent, such as commands or data. • In contrast, TCP is considered a stateless protocol because it is not concerned with what is being sent. • TCP establishes the session but does not interpret the transmissions that occur during the session.
  • 31. 31 POP • POP is used when a client downloads its e-mail messages from a server. • First, the client sends the user ID and password to the server. • The server verifies that the user has an e-mail account with the server. • Then a session is established between the client and the server.
  • 32. 32 POP (Continued) • Next, transactions occur as the client requests the mail, and then the session is closed. • This process contains three states: – Authentication – Transaction – Update
  • 33. 33 IMAP • IMAP is expected to replace POP because it offers these additional functions: – Messages can be archived in folders on the server. – Mailboxes can be shared, so multiple users can access the same mail. – Users can easily access multiple mail servers. – Users can choose to read only the header information about an attached file without opening the file. – Attached files need not be downloaded with every message.
  • 34. 34 E-Mail Server Software • An ISP or large business using the Internet or having an intranet is responsible for providing an e-mail server for its subscribers or employees. • E-mail servers most likely are installed on UNIX, Linux, Windows 2000 Server, or Windows Server 2003.
  • 35. 35 Microsoft Exchange Server • Protocols supported by Exchange Server include HTTP, MAPI, POP3, IMAP4, and NNTP protocols. • NNTP (Network News Transfer Protocol) is the protocol used by newsgroups. • MAPI (Messaging Application Programming Interface) is a specification that allows an application to interact with an e-mail client to send and receive e-mail. • Microsoft Exchange Server supports hot backups and dynamic rerouting.
  • 36. 36 IBM Lotus Domino • Lotus Domino by IBM is designed for large companies and ISPs. • It can be run on a variety of server platforms, such as Windows NT Server, Windows 2000 Server, Windows Server 2003, Sun Solaris, IBM OS/400, and several flavors of Linux. • Domino provides a useful feature that allows administrators to remotely manage the e-mail server from the Web browser on any computer in their network.
  • 37. 37 Novell GroupWise • This product is designed for medium to large companies running NetWare or Windows Server platforms. • To run GroupWise, you must set up Novell Directory Services.
  • 38. 38 E-Mail Client Support for HTML • For most of the time e-mail has existed, e- mail messages have consisted of text only. • Recently, HTML e-mail has become very popular. • Eudora, Outlook Express, and Outlook clients now support HTML in the body of e- mail messages.
  • 39. 39 Using FTP to Transfer Files • Web servers (using HTTP) and e-mail software (using SMTP) must encode data so it appears as text when it travels over the Internet. • FTP (File Transfer Protocol) offers an alternative. • FTP can transfer binary files over the Internet without the encoding and decoding overhead, making it a popular protocol for moving files over the Internet. • An FTP site is a computer running an FTP server application.
  • 40. 40 Using FTP to Transfer Files (Continued) • Large organizations might maintain several FTP sites in different parts of the world to speed up download time across the globe. • These are called mirror sites. • A mirror site is a server that contains the same set of files as a heavily used server to off-load some of the burden of providing the files to the community using them. • Mirror sites also serve as a backup for the main server in case the main server fails.
  • 41. 41 How FTP Works • An FTP server identifies users on an FTP site by their user IDs. • FTP client and server software create a session after you are logged on. • The FTP client has access to the file system on the server. • The local computer (the client) issues character-like commands, and the remote computer (the server) replies with numbers that are interpreted by the local computer.
  • 42. 42 FTP Via a Web Browser • Download software from a Web site • The protocol changes from http:// to ftp:// in the Web browser’s Address box.
  • 43. 43 FTP from a Command Prompt • Most operating systems, including Windows 9x, Windows NT, Windows 2000, and Windows XP, offer FTP client software that runs from a command prompt. • A batch file is a file with a .bat file extension that contains a list of DOS-like commands that can be executed as a group.
  • 44. 44 FTP from a Command Prompt (Continued) • Another protocol similar to FTP is TFTP (Trivial FTP). • TFTP has fewer commands than FTP and can be used only to send and receive files. • It can be used for multicasting in which a file is sent to more than one client at the same time using the UDP (User Datagram Protocol).
  • 45. 45 Initiating and Using Telnet Sessions • A Telnet window on a computer is a command window to a remote computer in which any command can be executed just as though the user were sitting at the computer console. • Telnet is a protocol used to pass commands and replies between the client the the UNIX computer. • All UNIX systems support some form of Telnet.
  • 46. 46 Subscribing to and Using Newsgroups • A newsgroup is a service on the Internet or private network where a group of people can post articles and responses to those articles so information can be shared among the members of the group. • A newsgroup uses NNTP. • This protocol works much like SMTP, whereby commands are issued from the client or requesting server as character-based words followed by arguments, and replies come from the news server in the form of numeric codes followed by descriptive text.
  • 47. 47 Understanding Gophers and Gopher Space • A gopher is a distribution service for text files on the Internet that runs on a UNIX computer using the Gopher protocol. • A gopher service runs on a UNIX computer, tracking the documents available on the server in the form of a hierarchical site menu called gopher space. • When you access the service, you can browse the gopher space by searching these top-down lists.