CLIENT SERVER AND MULTIMEDIA NOTES

Embed Size (px)

Citation preview

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    1/71

    1

    INTERNET AND MULTIMEDIA( By mr. Mochoge Cleo)

    CLIENT SERVER PROGRAMMING

    Introduction

    Client/server describes the relationship between two computer programs in which one

    program, the client, makes a service request from another program, the server, whichfulfills the request. Although the client/server idea can be used by programs within a

    single computer, it is a more important idea in a network. In a network, the client/server

    model provides a convenient way to interconnect programs that are distributed efficiently

    across different locations. Computer transactions using the client/server model are verycommon. For example, to check your bank account from your computer, a client program

    in your computer forwards your request to a server program at the bank. That programmay in turn forward the request to its own client program that sends a request to a

    database server at another bank computer to retrieve your account balance. The balance

    is returned back to the bank data client, which in turn serves it back to the client in yourpersonal computer, which displays the information for you.

    The client/server model has become one of the central ideas of network computing. Mostbusiness applications being written today use the client/server model. So does the

    Internet's main program, TCP/IP. In marketing, the term has been used to distinguishdistributed computing by smaller dispersed computers from the "monolithic" centralized

    computing ofmainframe computers. But this distinction has largely disappeared asmainframes and their applications have also turned to the client/server model and become

    part of network computing.

    In the usual client/server model, one server, sometimes called a daemon, is activated andawaits client requests. Typically, multiple client programs share the services of a

    common server program. Both client programs and server programs are often part of a

    larger program or application. Relative to the Internet, your Web browser is a client

    program that requests services (the sending of Web pages or files) from a Web server(which technically is called a Hypertext Transport Protocol or HTTP server) in another

    computer somewhere on the Internet. Similarly, your computer with TCP/IP installed

    allows you to make client requests for files from File Transfer Protocol (FTP) servers in

    other computers on the Internet.

    Other program relationship models included master/slave, with one program being in

    charge of all other programs, and peer-to-peer, with either of two programs able toinitiate a transaction.

    1) In information technology, a server is a computer program that provides services to

    other computer programs (and their users) in the same or other computers.

    2) The computer that a server program runs in is also frequently referred to as a server

    (though it may be used for other purposes as well).

    3) In the client/server programming model, a server is a program that awaits and fulfillsrequests from client programs in the same or other computers. A given application in a

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    2/71

    2

    computer may function as a client with requests for services from other programs andalso as a serverof requests from other programs.

    Specific to the Web, a Web server is the computer program (housed in a computer) that

    serves requested HTML pages or files. A Web clientis the requesting program

    associated with the user. The Web browser in your computer is a client that requests

    HTML files from Web servers.

    ( By mr. Mochoge Cleo)

    THE SURVIVAL PLAN

    Client/server survival guideIt will help you survive, but it wont be easy. Nobody, unfortunately, has that

    magic map with all the correct paths. I will share with you my insights, which whencombined with yours-may help you take the least treacherous path.

    A survival guide is just more than a map. It contains instructions for how to find

    food, build shelter, navigate in strange terrain, and protect yourself from snakes and

    scorpions. There are five leading technologies for developing client/server applications: Database servers

    TP monitors Groupware

    Distributed objects The Web

    What is Client/Server?As the name implies, client and server are separate logical entities that work

    together over a network to accomplish a task.

    Characteristics

    All client/server systems have the following distinguishing characteristics:-

    1. Service-Client/server is primarily a relationship between processes running onseparate machines

    2. Shared resources-A server can service many clients at the same time and

    regulate their access to shared resources.

    3. Asymmetrical protocols-There is a many-to-one relationship between clients and

    server. Clients always initiate the dialog by requesting a service. Servers are

    passively waiting requests from the clients. Note that in some cases a client maypass a reference to a callback object when it invokes a service. This lets the server

    call back the client. So the client becomes a server.4. Transparency of location-The server is a process that can reside on the same

    machine as the client or on a different machine across the network. Client/server

    software usually masks the location of the server from the clients by redirecting

    the server calls when needed. A program can be a client, a server or both.

    5. Mix-and-match-The ideal client/server software is independent of hardware oroperating system software platforms. You should be able to mix-and-match client

    and server platforms.

    6. Message-based exchange-Clients and servers are loosely coupled systems that

    interact through a message-passing mechanism. The message is the delivery

    mechanism for the service request and replies.

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    3/71

    3

    7. Encapsulation of service-The server is a specialist. A message tells a serverwhat service is requested; it is then up to the server to determine how to get thejob done. Servers can be upgraded without affecting the clients as long as the

    published message interface is not changed.

    8. Scalability-Client/sever systems can be scaled horizontally or vertically.

    Horizontal scaling means adding or removing client workstations with only a

    slight performance impact. Vertical scaling means either migrating to a larger and

    faster server machine or distributing the processing load across multiple servers.

    9. Integrity-The server code and server data is centrally managed, which results in

    cheaper maintenance and guarding of shared data integrity. At the same time, the

    clients remain personal and independent.

    The client/server characteristics described above allow intelligence to be easilydistributed across a network.

    CLIENTS, SERVERS, AND OPERATING SYSTEMS:

    What does a server need from an operating system?

    In distributed computing environment, operating systems functions are either baseor extended services. The base services are part of the standard operating system, whilethe extended services are add-on modular software components that are layered on top of

    the base services. Functionality equivalent extended services are usually provided bymore than one vendor.

    Base servicesServer programs exhibit a high level of concurrency. Ideally, a separate task will be

    assigned to each of the clients the server is designed to concurrently support. Taskmanagement is best done by multitasking operating system. Multitasking is the natural

    way to simplify the coding of complex application that can be divided into a collection ofdiscrete and logically distinct, concurrent tasks.

    Servers also require a high level of concurrency within a single program. Servercode will run more efficiently if tasks are allocated to parts of the same program rather

    than to separate programs (these tasks are called co-routines or threads).

    Server Operating System Requirements:-

    1. Task preemption

    An operating system with preemptive multitasking must allot fixed timeslots ofexecution to each task. Without preemptive multitasking, a task must voluntarily

    agree to give up the processor before another task can run.

    2. Task priority

    An operating system must dispatch tasks based on their priority. This feature

    allows servers to differentiate the level of service based on their clients priority.

    3. SemaphoresAn operating system must provide simple synchronization mechanisms for

    keeping concurrent tasks from bumping into one another when accessing shared

    resources these mechanisms, known as semaphores, are used to synchronize theactions of independent server tasks and alert them when some significant event

    occurs.

    4. Interprocess communications (IPC)

    An OS must provide the mechanisms that allow independent processes toexchange and share data.

    5. Local/Remote Interprocess communication

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    4/71

    4

    An OS must allow the transparent redirection of interprocess calls to a remoteprocess over a network without the application being aware of it. The extension ofthe interprocess co

    mmunication across the machine boundaries is the key to the development of

    application when resources and processes can be easily moved across machines.

    6. Threads

    These are units of concurrency provided within a program itself. Threads are used

    to create event-driven server programs. Each waiting event can be assigned to athread that blocks until the event occurs. In the meantime, other threads can use

    the CPUs cycles productively to perform useful work.

    7. Intertask protection

    The OS must protect tasks from interfering with each others resources. A singletask must not be able to bring down the entire system.

    8. Multiuser High-performance File SystemThe file system must support multiple tasks and provide the locks that protect

    integrity of the data. Server programs typically work on many files without too

    much deterioration in performance.9. Efficient memory management

    The memory system must be efficient to support very large programs and very large data

    objects.

    10. Dynamically Linked Run-Time ExtensionsThe OS services should be extendable. The mechanism must be provided to allow

    services to grow at run time without recompiling the operating system.

    11. Extended services

    Extended services provide the advanced system software that exploit the

    distributed potential of networks, provide flexible access to shared information,and make the system easier to manage and maintain.

    Extended services include:-

    a) Ubiquitous Communications

    The Os extensions must provide a rich set of communications protocol

    stacks that allow the server to communicate with the greatest number of clientplatforms.

    b) Network Operating System ExtensionsThe operating system extensions must provide facilities for extending

    the file and print services over the network.

    c) Binary Large Objects

    Images, video,graphics, intelligent documents, and databasessnapshots are about to test the capabilities of our operating systems, databases,

    and networks.

    d) Global Directories and Network Yellow PagesThe operating system extension must provide a way for clients to

    locate servers and their services on the network using a global directoryservice. Network resources must be found by name.

    e) Authentication and Authorization ServicesThe OS extensions must provide a way for clients to prove to the

    server that they are who they claim to be. The authorization systemdetermines if the authenticated client has

    the permission to obtain a remote service.

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    5/71

    5

    f) System ManagementThe OS extension must provide an integrated network and system

    management platform. The system should be managed as a single server

    or as multiple servers assigned to domains.

    g) Network Time

    The OS extensions must provide a mechanism for clients and servers

    to synchronize their

    clocks. This time must be coordinated with some universal timeauthority.

    h) Database and Transaction ServicesThe OS extensions must provide a robust multi-user Database

    Management System(DBMS). The DBMS ideally support SQL for decision support and

    server-stored procedures for transactions services.

    i) Internet Services

    The Internet is a huge growth opportunity for servers e.g. HTTP

    daemons, secure sockets layer (SSL), firewalls, Domain Name Service,HTML-based file systems etc.

    j) Object-oriented Services

    This is an area where extended services will flourish for a longtime to come. Services are becoming more object-oriented. The OS will

    provide object broker services that allow any object to interact with any otherobject across the network.

    WILL THE REAL CLIENT SERVRER PLEASE STAND UP?

    Many systems with very different architectures been called client/server systemvendors often use client/server as if the term can only be applied to their specific

    packages. For example, file sever vendors swear they first invented the term, anddatabase server vendors are known in some circles solely as the client/server vendors.

    The idea of splitting an application along client/server lines has been used over

    the last twelve years to create various forms of networked software solutions. Typically

    these solutions are built on top of off-the-shelf middleware software packages.

    Middleware is a vague term that covers all the distributed software needed tosupport interactions between client/server systems.

    Each of these solutions, however, is distinguished by the nature of the service it

    provides to its clients, as shown below:-

    File Servers

    With a file server, the client typically a PC) passes requests for file records over anetwork to the file server. This is a very primitive form of data service that necessitates

    many message exchanges over the network to find the requested data.File servers are useful for sharing files across a network. They are indispensable for

    creating shared repositories of documents, images, engineering drawings, and other largedata objects.

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    6/71

    6

    Database ServersWith a database server, the client passes SQL requests as messages to the database

    server. The results of each SQL command are returned over the network. The code thatprocesses the SQL request and the data reside on the same machine. The server uses its

    own processing power to find the requested data instead of passing all the records back toa client and then letting it to find its own data, as was the case for file server.

    Transaction Servers

    With a transaction server, the client invokes remote procedures (or services) thatreside on the server with SQL database engine. These remote procedures on the server

    execute a group of SQL statements.The network exchange consists of a single request/reply message (as opposed to

    single/reply message for each SQL statement in a transaction). The SQL statements eitherall succeed or fail as a unit. These grouped SQL statements are called transactions.

    DBMS

    server

    ServerSQL Calls

    Applicatio

    n

    Application

    DBMS

    server

    ServerTransactions

    Application

    Application

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    7/71

    7

    Groupware Servers

    Groupware addresses the management of semi-structured information such as text,image, mail, bulletin boards, and the flow of work. These client/server systems place

    people in direct contact with other people.Lotus Notes and Microsoft Exchange are leading examples of such systems,

    although a number of other applications do exist.Most cases applications are created using a scripting language and a form based

    interfaces provided by the vendor. Typically the communication middleware between theclient and the server is vendor-specific. However, many groupware products now use e-

    mail as their standard messaging middleware.

    Object Application ServersWith an object server, the client/server is written as a set of communicating objects.

    Client objects communicate with server objects using an Object Request Broker (ORB).

    The client invokes a method on a remote object. The ORB locates an instance of thatobject server class, invokes the requested method, and returns the results to the client

    object.

    Groupware messagesServer

    Application

    Application

    Remote Method

    invocation

    ORBORB

    Application

    DBMS

    server

    ServerTransactions

    Application

    ApplicationTP Monitors

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    8/71

    8

    objects

    object

    Web Application Server

    The World Wide Web is the first truly intergalactic client/server application. This newmodel of client/server consists of thin, portable, universal clients that talk to super fast

    servers.

    CGI

    Internet

    HTML Documents

    Web Browser

    FAT SERVERS OR FAT CLIENTS?

    Client/server applications can also be differentiated by how the distributed application

    is split between the client and the server.The fat server model places more functions on the server. The fat client model does

    the reverse.

    Groupware, transaction, and Web servers are examples of fat servers; database and

    file servers are examples of fat clients.

    Fat client

    Client

    HTMLForms

    Java

    Server Application

    HTTP

    Over

    TCP/IP

    GUI Application Data

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    9/71

    9

    2-TIER VERSUS 3-TIERHigh-brow client/server pundits prefer to use terms like 2-tier, 3-tier, and N-tier

    client/server architectures instead of fat clients and fat servers. But its the same basic

    idea.

    Its all about how you split the client/server application into functional units that you

    can assign either to the client or to one or more severs. The most typical functional unitsare:-

    The use interface

    The business logic

    The shared dataThere are many variations of multi-tier architectures depending on how you split the

    application and the middleware you use to communicate between tiers.In the 2-tier client/sever architecture, the application logic is buried either inside the

    user interface on the client or within the database on the server (or both). Examples of 2-

    tier systems are:- File servers and Database servers with stored procedures

    Let's suppose I'm going to write a piece of software that students at a school can useto find out what their current grade is in all their classes. I structure the program so

    that a database of grades resides on the server, and the application resides on theclient (the computer the student is physically interacting with).

    When the student wants to know his grades, he manipulates my program (by clicking

    buttons, menu options, etc). The program fires off a query to the database, and thedatabase responds with all the student's grades. Now my application uses all this data

    to calculate the student's grade, and displays it for him.

    This is an example of a 2-tier architecture. The two tiers are:

    1. Data server: the database serves up data based on SQL queries submitted by the

    application.

    2. Client application: the application on the client computer consumes the data and

    presents it in a readable format to the student.

    Now, this architecture is fine, if you've got a school with 50 students. But suppose theschool has 10,000 students. Now we've got a problem. Why?

    Because every time a student queries the client application, the data server has toserve up large queries for the client application to manipulate. This is an enormous

    drain on network resources.

    So what do we do? We create a 3-tier architecture by inserting another program at theserver level. We call this the server application. Now the client application no longer

    directly queries the database; it queries the server application, which in turn queriesthe data server.

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    10/71

    10

    What is the advantage to this? Well, now when the student wants to know his finalgrade, the following happens:

    1. The student asks the client application.

    2. The client application asks the server application.

    3. The server application queries the data server.

    4. The data server serves up a recordset with all the student's grades.

    5. The server application does all the calculations to determine the grade.6. The server application serves up the final grade to the client application.

    7. The client application displays the final grade for the student.

    It's a much longer process on paper, but in reality it's much faster. Why? Notice step6. Instead of serving up an entire recordset of grades, which has to be passed over a

    network, the server application is serving up a single number, which is a tiny amountof network traffic in comparison.

    There are other advantages to the 3-tier architecture, but that at least gives you ageneral idea of how it works.Incidentally, this website is a 3-tier application. The client application is your web

    browser. The server application is the ASP code which queries the database (the thirdtier) for the question-and-answer you requested.

    GUI & Applications

    DBMS,Legacy,

    Resource Managers

    Tier 1

    In the 3-tier client/server systems, the application logic (process) lives in the middle

    tier; it is separated from the data and user interface. Examples of 3-tier client/server

    systems are:- TP monitors

    Object Transaction monitors andWeb application servers.

    Resource managerApplication

    DBMS

    SQL File

    I/O HTTP

    RPC,ORBC

    MOM

    HTTP

    SQLDATA

    ACCESS

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    11/71

    11

    servicesLegacy

    Browser/Beans/ActiveX

    Tier 2

    Tier 1

    Tier 3

    The benefits of the 3-tier model are as follows:

    Scalability: The key 3-tier benefit is improved scalability since the application serverscan be deployed on many machines. Also, the database no longer requires a connection

    from every client -- it only requires connections from a smaller number of applicationservers. In addition, TP monitors or ORBs can be used to balance loads and dynamically

    manage the number of application server(s) available.Better Re-use: The same logic can be initiated from many clients or applications. If an

    object standard like COM/DCOM or CORBA is employed (as discussed in tooldependence), then the specific language implementation of the middle tier can be made

    transparent.Improved Data Integrity: since all updates go through the middle tier, the middle tier

    can ensure that only valid data is allowed to be updated in the database and the risk of arogue client application corrupting data is removed.

    Improved Security: Security is improved since it can be implemented at multiple levels

    (not just the database). Security can be granted on a service-by-service basis. Since the

    client does not have direct access to the database, it is more difficult for a client to obtain

    unauthorized data. Business logic is generally more secure since it is placed on a moresecure central server.

    Reduced Distribution: Changes to business logic only need to be updated on the

    application servers and do not have to be distributed to all the clients.

    Improved Availability: mission-critical applications can make use of redundant

    application servers and redundant database servers. With redundant servers, it is possible

    to architect an application so that it can recover from network or server failures.Hidden Database Structure: since the actual structure of the database is hidden from the

    caller, it is possible that many database changes can be made transparently. Therefore, a

    service in the middle tier that exchanges information/data with other applications couldretain its original interface while the underlying database structure was enhanced during a

    new application release.

    INTRODUCTION TO INTERNET

    Introduction:

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    12/71

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    13/71

    13

    The rest, as they say, is history in the making. The Internet has been improved through

    the developments of such services as Gopher and the World Wide Web.Even though the Internet is predominantly thought of as a research oriented network, it

    continues to grow as an informational, creative, and commercial resource every day and

    all over the world.

    Who Pays for the Internet?

    There is no clear answer to this question because the Internet is not one "thing", it's many

    things. No one central agency exists that charges individual Internet users. Rather,individuals and institutions who use the Internet pay a local or regional Internet service

    provider for their share of services. And in turn, those smaller Internet service providersmight purchase services from an even larger network. So basically, everyone who uses

    the Internet in some way pays for part of it.

    2-what makes the internet work?

    The unique thing about the Internet is that it allows many different computers to connect

    and talk to each other. This is possible because of a set of standards, known as protocols,

    that govern the transmission of data over the network: TCP/IP (Transmission Control

    Protocol/Internet Protocol). Most people who use the Internet aren't so interested in

    details related to these protocols. They do, however, want to know what they can do on

    the Internet and how to do it effectively.

    The Client/Server Model:

    The most popular Internet tools operate as client/server systems. You're running a

    program called a Web client. This piece of software displays documents for you andcarries out your requests. If it becomes necessary to connect to another type of service--

    say, to set up a Telnet session, or to download a file--your Web client will take care of

    this, too. Your Web client connects (or "talks") to a Web server to ask for information on

    your behalf.

    The Web server is a computer running another type of Web software which provides

    data, or "serves up" an information resource to your Web client.

    All of the basic Internet tools--including Telnet, FTP, Gopher, and the World Wide Web-

    -are based upon the cooperation of a client and one or more servers. In each case, you

    interact with the client program and it manages the details of how data is presented to youor the way in which you can look for resources. In turn, the client interacts with one ormore servers where the information resides. The server receives a request, processes it,

    and sends a result, without having to know the details of your computer system, becausethe client software on your computer system is handling those details.

    The advantage of the client/server model lies in distributing the work so that each toolcan focus or specialize on particular tasks: the server serves information to many users

    while the client software for each user handles the individual user's interface and other

    details of the requests and results.

    The Use of Local Clients:

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    14/71

    14

    Every computer should be equipped with basic client software packages that allow you toperform functions such as electronic mail, Telnet, Gopher, and FTP.

    Internet and World Wide Web

    Internet is the worlds largest computer network, the network of networks, scattered all

    over the world.

    A network of networks, or Internet, is a group of two or more networks that are: Interconnected physically

    Capable of communicating and sharing data with each other

    Able to act together as a single network

    Machines on one network can communicate with machines on the other networks, andsend data, files, and other information back and forth.

    For this work, the networks and machines that are part of the Internet have to agree eitherto speak the same language or use an interpreter. This language is software that

    enables the different types of machines on separate networks to communicate and

    exchange information.To be used by different types of machines and yet be understood by all of them, thesoftware must follow a set of rules or protocol. The Internet, with a capital I, is the

    networks of networks, which either uses the TCP/IP protocol or interacts with TCP/IPnetworks via gateways (the interpreters). The Internet presents these networks as one

    seamless network for its users.The Internet covers the globe and includes large, international networks as well as many

    smaller, local-area networks (LANs).The Internet offers access to data, graphics, sound, software, text, and people through a

    variety of services and tools for communication and data exchange:- Remote login (Telnet)

    File transfer protocol (FTP) Electronic mail (e-mail

    News (USENET or network news)

    Hypertext (WWW)

    WHATS SPECIAL ABOUT INTERNETThere are three obvious reasons. Internet is the cheapest and fastest means to:

    Get information

    Provide information

    Compile information

    Getting Information on the InternetThe amount of information available through the Internet is staggering. To make all of it

    more easily available to users, programs such as the gopher were developed to help

    present material in some logical fashion. The most recent and very successful attempt atpresenting information over the Internet is the World Wide Web (WWW). You could get

    ( By mr. Mochoge Cleo)

    the information about people, products, organizations, research data, electronic versions

    of printed media etc. from the Internet.Providing Information on the Internet

    Most of what you want to provide could be considered as advertising. While that maysound somewhat commercial, it is the best and the most inexpensive way to let people

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    15/71

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    16/71

    16

    You can also get a dedicated line called a T-1 or T-3. A T-1 (Tee-one) line can handle1280 kilobytes per second. A T-3 line can handle ten times that speed.

    How Do I Connect to the Internet?

    Computer

    Connection

    Phone Line, Cable, DSL, Wireless, ...

    Modem Network Software - TCP/IP

    Application Software - Web Browser, Email, ... Internet Service Provider (ISP)

    Internet Basics

    For most people who are new to the Internet, the first experience is quite overwhelming.

    However as one gets the feel of the Internet, it becomes clear that Internet is similar toany medium of information and or/ communication.

    Once you know how to send and receive electronic mail, subscribe to mailing lists, joinand participate in discussion groups and Internet chats, your power to communicate with

    people anywhere in the world increases dramatically.

    What Should I Do?Before you can decide how you want to use the Internet, you should get an idea about

    what all you can do and what is there in the cyber space. For beginners, use one of thepowerful web browsers like Internet Explorer or Netscape Navigator.

    ( By mr. Mochoge Cleo)

    Web browsers are mainly used to access pages of the World Wide Web.By clicking on the hypertext links on a page it is possible to jump from one Internet site

    to another, regardless of its location. Hypertext links are usually highlighted or differentcolored text, images or icons.

    Given below is a list of activities that you could do with a web browser:-

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    17/71

    17

    Visit Web sites Send and receive electronic mail Read and post articles in newsgroups

    Download files to your PC.

    Chat with other users on-line

    Play games with others on-line

    Access on-line multimedia including radio and video broadcasts

    Search the Internet for Information Subscribe to electronic newsletters, e-zines etc.

    Do on-line shopping

    Post your resumes on the Internet

    Create your own web sites Create an e-mail ID and account for you

    Find a persons details Send flowers or gifts to others

    INTERNET PROTOCOLSv The most commonly used protocols are:-v Transmission Control Protocol/Internet Protocol (TCP/IP)

    v File Transfer Protocol (FTP)v Hyper Text Transfer Protocol (HTTP)

    v Telnetv Gopher

    v Wide Area Information Service (WAIS)

    Transmission Control Protocol/Internet ProtocolTCP/IP is actually a collection of protocols or rules, that govern the way data travels

    from one machine to another across networks.

    IP-The IP does the following:

    Envelopes addresses the data

    Enables the network to read the envelope and forward the data to its

    destination.

    Defines how much data can fit in a single envelope (a packet).

    TCP- The TCP component does the following:

    Breaks data up into packets that the network can handle efficiently.

    Verifies whether all the packets have arrived at their destination.

    Reassembles the data.

    File Transfer Protocol (FTP)FTP stands for File Transfer Protocol, and is part of the TCP/IP protocol suit. It is the

    protocol, or set of ruled, which enables the files to be transferred between computers.FTP works on the client/server principle. The basic steps to use FTP are:-

    ( By mr. Mochoge Cleo)

    Connect to the FTP server Navigate the file structure to find the file you want

    Transfer the file.

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    18/71

    18

    The specifics of each step will vary depending on the client program being used and thetype of Internet connection. There are a wide variety of files that are publicly availablethrough anonymous FTP.

    Shareware-software that you can use for free for a trial period but then pay a fee for

    Freeware-completely free software, for example fonts, clipart and games.

    Upgrades & Patches-upgrades to current software and fixes for software problems.

    Documents-examples include research papers, articles and Internet documentation.

    Hypertext Transfer Protocol (HTTP)HTTP is short for Hypertext Transfer Protocol. It is a set of rules, or protocol, that

    governs the transfer of hypertext between two or more computers.

    Hypetext is text that is specifically coded using a standard system called HypertextMarkup Language (HTML). The HTML codes are used to create links.

    HTTP is based on the client/server principle. HTTP allows a computer A to establish aconnection with a computer B (the server) and make a request.

    HYPERTEXTIn a hypertext document, certain words within the text are marked as links to other areasof the current document or to other documents

    The user moves to a related area by moving his or her mouse pointer to the link andclicking once with the mouse button

    Links are used to point to another part of the same document, in which case clicking thelink will cause the browser to move to a new part of the currently displayed document

    Telnet

    Telnet is a protocol, or set of rules that enables one computer to connect to anothercomputer. This process is also referred to s remote login

    The users computer, which initiates the connection, is referred to as the local computer,and the machine being connected to, which accepts the connection, is referred to as the

    remote, or host computer.

    Telnet is the protocol used to establish a login session on a remote computer on the

    network. While many computers on the Internet require users to have authorization,

    others are open to the public and can be logged onto with telnet. Telnet is not a method to

    transfer files from one machine to another, but rather is a way to remotely connect to

    another system with privileges to run specific programs on that system. Some uses of the

    Telnet protocol include:

    connecting to a library catalog to search that library's collection connecting to a location

    that allows public priveleges to search its campus information system connecting to alocation that gives you an up-to-the minute weather report

    ( By mr. Mochoge Cleo)

    Basic Telnet Commands

    open - establishes a connection to the specified host.

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    19/71

    19

    close - closes an open connection and leaves you in the telnet software quit - closes anyopen telnet sessions and exits the telnet software. When using a telnet program likeNCSA Telnet, you invoke these commands by way of pull-down menus or command

    keys.

    Gopher

    Gopher is a protocol that is designed to search, retrieve, and display documents fromremote sites on the Internet.

    It is also possible to initiate on-line connections with other systems via Gopher.

    Information accessible via Gopher is stored on many computers all over the Internet.

    These computers are called Gopher servers.

    Users interact with Gopher via a hierarchy of menus and can use full-text searchingcapabilities of Gopher to identify desired documents.

    Gopher can work with the following internet tools or systems:- Search local WAIS idiocies; query remote WAIS servers and funnel the results to

    Gopher clients.

    Query remote FTP sites and funnel the results to Gopher clients Be queried by WWW clients either using native HTTP querying.

    Gopher is a client/server system that allows you to access many Internet resources simply

    by making selections from a sequence of menus. Each time you make a selection, Gopher

    carries out your request to the computer that contains the information and "serves" it up.For example, if you select a menu item that represents a text file, Gopher will get that

    file--wherever it happens to be--and display it for you. As you use Gopher, some menuitems lead to other menus. If you choose one of these, Gopher will retrieve the new menuand display it for you. Thus you can move from menu to menu, using only a few key

    strokes or a mouse to navigate. The power of Gopher is that the resources listed in a

    menu may be anywhere on the Internet. As Gopher connects to computers to comply withyour menu selection, you don't need to be preoccupied with the behind-the-scenes work

    of connecting to and disconnecting from these various computers. Gopher does this for

    you without your even needing to be aware of it. This automatic connecting makesGopher popular and useful.

    Where did Gopher come from?

    "Born" in April 1991, gopher began as a project at the Microcomputer, Workstation, and

    Networks Center at the University of Minnesota to help people on campus get answers tocomputer-related questions. At the time, the computer center staff had accumulated

    answers to thousands of questions regarding computers and software.

    What was needed was an easy and efficient way to deliver this information to students,

    faculty and staff. Thus, the creation of Gopher reaffirms the adage that necessity is themother of invention.

    Why is it called Gopher?

    The name "Gopher" is appropriate for three reasons:

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    20/71

    20

    1. Just as a real gopher successfully navigates beneath the prairie, the InternetGopher tunnels

    through the invisible paths of the Internet to help you find the information

    you want.

    2. The name refers to someone who fetches things or provides service for other

    people.

    3. The Golden Gopher is the mascot of the University of Minnesota.

    INTERNET ADDRESSINGIn general, Internet addressing is a systematic way to identify people, computers and

    Internet resources.

    IP Address

    If you want to connect to another computer, transfer files to or from another computer, or

    send an e-mail message, you first need to know where the other computer is-you need thecomputers address.An IP (Internet Protocol) address is an identifier for a particular machine on a particular

    network e.g 202.54.1.6The IP addresses have the following characteristics in common:-

    IP addresses are unique

    No two machines can have the same IP number.

    IP addresses are also global and standardized

    All machines connected to the Internet agree to use the same scheme forestablishing an address.

    Domain Name

    A domain name is a way to identify and locate computers connected to the internet. Notwo organizations can have the same domain name e.g Microsoft.com, ibm.com,nasa.gov etc.

    The major categories for top-level domain names are:-

    com-commercial entities

    edu-educational institutions

    net-organisations directly involved on Internet operations

    org-miscellaneous organizatons that dont dont fit any other category, such as non-profitgroups

    gov-united states Federal Government entities

    mil-United states military

    Introduction to the World Wide Web

    The World Wide Web (also referred to as WWW or W3) is the fastest growing area ofthe Internet. While gopher was an important step in allowing users to "browse" through

    the Internet's vast resources, the World Wide Web has raised excitement about the

    Internet to new heights.What makes the World Wide Web appealing and innovative is its use of hypertext as a

    way of linking documents to each other. A highlighted word or phrase in one documentacts as a pointer to another document that amplifies or relates to the first document. When

    looking at a WWW document, the reader doesn't have to follow every pointer, or link(also called a hypertext link), only those that look interesting or useful. In this way, the

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    21/71

    21

    user tailors the experience to suit his or her needs or interests. The other very appealingaspect of the World Wide Web is the use of graphics and sound capabilities. Documentson the WWW include text, but they may also include still images, video, and audio for a

    very exciting presentation. People who create WWW documents often include a

    photograph of themselves along with detailed professional information and personal

    interests. (This is often called a person's home page.)

    What makes the WWW work?WWW is another example of client/server computing. Each time a link is followed, the

    client is requesting a document (or graphic or sound file) from a server (also called a Web

    server) that's part of the World Wide Web that "serves" up the document. The server uses

    a protocol called HTTP or HyperText Transport Protocol. The standard for creatinghypertext documents for the WWW is HyperText Markup Language or HTML. HTML

    essentially codes plain text documents so they can be viewed on the Web.Uniform Resource Locator(URL)

    A URL identifies a particular Internet resource; for example a Web Page, a Gopher

    server, a library catalog, an image, or a text file. URLs represent a standardizedaddressing scheme for Internet resources, and help the users to locate these resources byindicating exactly where they are. Every resource via the World Wide Web has a unique

    URL.

    URLs consists of letters, numbers, and punctuation. The basic structure of a URL ishierarchical, and the hierarchy moves from left to right:

    Protocol://server-name.domain-name.top-level-domain:port/directory/filename

    A URL (Uniform Resource Locator) (pronounced "you-are-EL" or, in some quarters,

    "earl") is the address of a file or other resource accessible on the Internet

    URL structure

    protocol://host.domain[:port]/path/file.extension [?optional stuff]

    http://www.hellohelpme.com/index.html

    http: protocol

    //www. host

    hellohelpme.com domain

    /index.html the individual document

    the extension html shows that it was coded with html (web documents frequently havethe extension html or htm)

    Protocol might be - http, file, gopher, wais, news, telnet, https, ....

    The CASE of URLs may be important! Use only lower case in URLs that youbuild!

    "optional stuff" - after a ? - is usually search parameters or values for variables. Often

    used to pass parameters

    Example includes:

    http://www.lnl.net/alexis/index.html

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    22/71

    22

    gopher://gopher.state.edu

    WEB BROWSERSA browser is a piece of software that acts as an interface between the user and the inner

    workings of the Internet, specifically the World Wide Web. Browsers are also referred as

    web clients, or Universal clients because in the client/server model, the browser functions

    as the client program.

    The browser acts on behalf of the user. The browser: Contacts a web server and sends a request for information.

    Receives the information and then displays it on the users computer.

    A browser can be graphical or text-based and can make the Internet easier to use and

    more intuitive. A text-based shows the user only the textual matter. A graphical browserallows the user to see more of what the WWW has to offer such as graphics, photographs

    and multimedia.A browser program enables your computer to extract information from remote computers

    working on any platform through the WWW. The program on your computer is called

    WWW client. The WWW program [usually] on another computer that the browser"talks" to is called the serverTechnically, a Web browser is a client program that uses the Hypertext Transport Control

    Protocol (HTTP) to make requests of Web servers throughout the Internet on behalf ofthe browser user

    Examples of the browsers

    Microsoft Internet Explorer Netscape Navigator

    WEB BROWSING

    Internet browsing or net surfing, as it is often called, is the process of visiting differentweb sites on the Internet hosted by various companies, organizations, educational

    institutions, magazines, individuals, etc. the Internet contains a wealth of information that

    can help your business. Armed with a good Internet browser, you can easily get around to

    a myriad of sites, gathering competitive information, conducting market research, reading

    publications, and staying in touch with whats happening at your business associations.

    Chatting:Internet Relay Chat (IRC), the other method for Internet conversation, is less common

    than talk because someone must set up the Chat before others can join in. Chat sessions

    allow many users to join in the same free-form conversation, usually centered around a

    discussion topic. When users see a topic that interests them, they type a command tojoin and then type another command to choose a nickname. Nicknames allow people in

    the session to find you on IRC Networks or Channels.

    Search Engines

    A web search engine is an interactive tool to help people locate information available viathe World Wide Web. Web search engines are actually databases that contain references

    to thousands of resources. Users interact with database, submitting questions that ask thedatabases if it contains that match a specific criteria.

    There are many web search engines available on the web. A web search engine providesan interface between the user and the underlying database. The interface presents the user

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    23/71

    23

    with a place to type in a search string, which may be a word, a phrase a date or someother criterion and a way to submit the request.The web search engines runs the search string against a database, returns a list of

    resources that match the criteria and displays the results to the user.

    Some of the most popular search engines are:

    AltaVista (http://www.altavista.digital.com)

    Excite (http://www.excite.com)

    Lycons (http://www.lycons.com)Yahoo! (http://www.yahoo.com)

    A look at search engines:

    The World Wide Web is "indexed" through the use of search engines, which are also

    referred to as"spiders," "robots," "crawlers," or "worms". These search engines comb through the Web

    documents, identifying text that is the basis for keyword searching. Each search engine

    works in a different way. Some engines scan for information in the title or header of thedocument; others look at the bold "headings" on the page for their information. The factthat search engines gather information differently means that each will probably yield

    different results. Therefore, it's wise to try more than one search engine when doing Websearching.

    The list below lists several search engines and how each one gathers information, plus

    resources that evaluate the search engines.

    Selected Search Engines (listed alphabetically)

    Alta Vista

    Alta Vista, maintained by The Digital Equipment Corp., indexes the full text of over 16

    million pages including newsgroups. Check out the Alta Vista Tips page.

    Excite Netsearch

    Excite includes approximately 1.5 million indexed pages, including newsgroups. Check

    out the Excite NetSearch handbook.

    InfoSeek Net Search

    Indexes full text of web pages, including selected newsgroups and electronic journals.Just under one-half million pages indexed. Check out the InfoSeek Search Tips.

    Inktomi

    As of December 1995, the Inktomi search engine offers a database of approximately 2.8million indexed Web documents and promises very fast search retrievals. Results are

    ranked in order of how many of your searched terms are used on the retrieved pages.

    Lycos

    Lycos indexes web pages (1.5 million +), web page titles, headings, subheadings, URLs,

    and significant text.

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    24/71

    24

    Search results are returned in a ranked order.

    MagellanMagellan indexes over 80,000 web sites. Search results are ranked and annotated.

    Open Text Index

    Indexes full text of approximately 1.3 million pages. Check out the Open Text Help

    pages for tips on using this search engine.

    WebCrawlerMaintained by America Online, WebCrawler indexes over 200,000 pages on

    approximately 75,000 web servers. URLs, titles, and document content are indexed.

    WWWW -- World Wide Web Worm

    Approximately 250,000 indexed pages; indexed content includes hypertext, URLs, and

    document titles.

    YahooA favorite directory and search engine, Yahoo has organized over 80,000 Web sites(including newsgroups) into 14 broad categories. Yahoo also maintains a comprehensive

    list of links to Yahoo - Computers and Internet:Internet:World Wide Web: Searching the

    Web other web search engines, indexes, and guides.

    Finally the internet is a huge source of information in all fields of knowledge.Datum will take your hand through this incredible world of information to get what you

    need in a fast, reliable and professional way.

    Advantages and Disadvantages of the InternetInternet has been perhaps the most outstanding innovation in the field of communication

    in the history of mankind. As with every single innovation, internet has its ownadvantages and disadvantages. But usually, greater magnitude of advantages outweighs

    its disadvantages.

    During his evolution journey from Neanderthals to Homo erectus and then to Homo

    sapiens, man has come long way. Because of his continuous quest for more and more

    amenities and facilities, the nineties have seen a major turn around with the invention ofcomputers. 10 years ago, the term internet was practically anonymous to most of the

    people. And today internet has become the most ever powerful tool for man throughout

    the world. The internet is a collection of various services and resources.

    Although, many people still think e-mail and World Wide Web as the principle

    constituents of internet, there is lot more in store than e-mail, chat rooms, celebrity websites and search engines. It also became the best business tool of modern scenario. Today

    internet has brought a globe in a single room. Right from news across the corner of the

    world, wealth of knowledge to shopping, purchasing the tickets of your favorite movie-

    everything is at your finger tips. Internet has great potential and lot to offer however,

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    25/71

    25

    like every single innovation in science and technology, internet has its own advantagesand disadvantages.

    Advantages

    Communication:

    The foremost target of internet has always been the communication. And internet has

    excelled beyond the expectations .Still; innovations are going on to make it faster, morereliable. By the advent of computers Internet, our earth has reduced and has attained the

    form of a global village.

    Now we can communicate in a fraction of second with a person who is sitting in the otherpart of the world. Today for better communication, we can avail the facilities of e-mail;

    we can chat for hours with our loved ones. There are plenty messenger services inoffering. With help of such services, it has become very easy to establish a kind of global

    friendship where you can share your thoughts, can explore other cultures of different

    ethnicity.

    Information

    Information is probably the biggest advantage internet is offering. The Internet is a virtualtreasure trove of information. Any kind of information on any topic under the sun is

    available on the Internet. The search engines like Google, yahoo is at your service on theInternet. You can almost find any type of data on almost any kind of subject that you are

    looking for. There is a huge amount of information available on the internet for just aboutevery subject known to man, ranging from government law and services, trade fairs and

    conferences, market information, new ideas and technical support, the list is end less.

    Students and children are among the top users who surf the Internet for research. Today,it is almost required that students should use the Internet for research for the purpose of

    gathering resources. Teachers have started giving assignments that require research on

    the Internet. Almost every coming day, researches on medical issues become much easier

    to locate. Numerous web sites available on the net are offering loads of information for

    people to research diseases and talk to doctors online at sites such as, Americas Doctor.During 1998 over 20 million people reported going online to retrieve health information.

    Entertainment

    Entertainment is another popular raison d'tre why many people prefer to surf the

    Internet. In fact, media of internet has become quite successful in trapping multifaceted

    entertainment factor. Downloading games, visiting chat rooms or just surfing the Web aresome of the uses people have discovered. There are numerous games that may be

    downloaded from the Internet for free. The industry of online gaming has tasted dramatic

    and phenomenal attention by game lovers. Chat rooms are popular because users canmeet new and interesting people. In fact, the Internet has been successfully used by

    people to find life long partners. When people surf the Web, there are numerous thingsthat can be found. Music, hobbies, news and more can be found and shared on the

    Internet.

    Services

    Many services are now provided on the internet such as online banking, job seeking,

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    26/71

    26

    purchasing tickets for your favorite movies, guidance services on array of topicsengulfing the every aspect of life, and hotel reservations. Often these services are notavailable off-line and can cost you more.

    E-CommerceEcommerce is the concept used for any type of commercial maneuvering, or business

    deals that involves the transfer of information across the globe via Internet. It has become

    a phenomenon associated with any kind of shopping, almost anything. You name it and

    Ecommerce with its giant tentacles engulfing every single product and service will makeyou available at your door steps. It has got a real amazing and wide range of products

    from household needs, technology to entertainment.

    Disadvantages

    Theft of Personal informationIf you use the Internet, you may be facing grave danger as your personal information

    such as name, address, credit card number etc. can be accessed by other culprits to make

    Your problems worse.

    Spamming:

    Spamming refers to sending unwanted e-mails in bulk, which provide no purpose andneedlessly obstruct the entire system. Such illegal activities can be very frustrating for

    you, and so instead of just ignoring it, you should make an effort to try and stop theseactivities so that using the Internet can become that much safer.

    Virus threat

    Virus is nothing but a program which disrupts the normal functioning of your computersystems. Computers attached to internet are more prone to virus attacks and they can end

    up into crashing your whole hard disk, causing you considerable headache.

    Pornography:

    This is perhaps the biggest threat related to your childrens healthy mental life. A very

    serious issue concerning the Internet. There are thousands of pornographic sites on the

    Internet that can be easily found and can be a detrimental factor to letting children use theInternet.

    Though, internet can also create havoc, destruction

    Spamming

    Sometimes having an e-mail account can be very frustrating. People will fill up yourmailbox with advertisement, forwarded messages, product details, business offers, and all

    sorts of unwanted junk.

    Separating the messages you really want from the hundreds of unwanted mails is adaunting task. This process is called spamming, makes people hate e-mail.

    INTERNET SECURITY

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    27/71

    27

    Internet security involves the protection of a computer's internet account and files from

    intrusion of an unknown user. Basic security measures involve protection by well

    selected passwords, change of file permissions and back up of computer's data.

    Security concerns are in some ways peripheral to normal business working, but serve to

    highlight just how important it is that business users feel confident when using IT

    systems. Security will probably always be high on the IT agenda simply because cyber

    criminals know that a successful attack is very profitable. This means they will always

    strive to find new ways to circumvent IT security, and users will consequently need to be

    continually vigilant. Whenever decisions need to be made about how to enhance a

    system, security will need to be held uppermost among its requirements.

    Internet security professionals should be fluent in the four major aspects:

    Penetration testing

    Intrusion Detection

    Incidence Response

    Legal / Audit Compliance

    Some apparently useful programs also contain features with hidden malicious intent.

    Such programs are known as Malware, Viruses, Trojans, Worms, Spyware and Bots.

    Bots are programs that take over and use the resources of a computer system over

    a network \without consent, and communicate those results to others who may control

    the Bots.

    The above concepts overlap and they can obviously be combined. The terminology is

    evolving.

    Antivirus programs and Internet security programs are useful in protecting a computer or

    programmable device / system from malware.

    Such programs are used to detect and usually eliminate viruses. Anti-virus software can

    be purchased or downloaded via the internet. Care should be taken in selecting anti-virussoftware, as some programs are not as effective as others in finding and eliminating

    viruses or malware. Also, when downloading anti-virus software from the Internet, one

    should be cautious as some websites say they are providing protection from viruses with

    their software, but are really trying to install malware on your computer by disguising it

    as something else.

    Malware is the most general name for any malicious software designed for

    example to infiltrate, spy on or damage a computer or other programmable device or

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    28/71

    28

    system of sufficient complexity, such as a home or office computer system, network,

    mobile phone, PDA, automated device or robot.

    Viruses are programs which are able to replicate their structure or effect by

    integrating themselves or references to themselves, etc into existing files or structureson a penetrated computer. They usually also have a malicious or humorous payload

    designed to threaten or modify the actions or data of the host device or system

    without consent. For example by deleting, corrupting or otherwise hiding information

    from its owner.

    A computer virus is a small program written to alter the way a computer operates,

    without the permission or knowledge of the user. A virus executes itself. It often

    places its own code in the path of executable files with a copy of the virusinfected file.

    Virus can infect desktop computers and network servers alike. Some viruses are

    programmed to damage the computer by damaging programs, deleting files, orreformatting the hard disk.

    Viruses can be transmitted as attachments to an e-mail note or in a downloadedfile, or be present on a diskette or CD. The immediate source of the e-mail note,

    downloaded file, or diskette you've received is usually unaware that it contains avirus. Some viruses wreak their effect as soon as their code is executed; other

    viruses lie dormant until circumstances cause their code to be executed by thecomputer. Some viruses are benign or playful in intent and effect ("Happy

    Birthday, Ludwig!") and some can be quite harmful, erasing data or causing yourhard disk to require reformatting. A virus that replicates itself by resending itself

    as an e-mail attachment or as part of a network message is known as a worm.

    Trojans (Trojan Horses) are programs which may pretend to do one thing, but in

    reality steal information, alter it or cause other problems on a such as a computer or

    programmable device / system.

    Spyware includes programs that surreptitiously monitor keystrokes, or other

    activity on a computer system and report that information to others without consent.w

    Worms are programs which are able to replicate themselves over a (possibly

    extensive) computer network, and also perform malicious acts that may ultimately

    affect a whole society / economy.

    Worms are programs that replicate themselves from system to system without

    the use of a host file. This is in contrast to the viruses which require the spreadingof an infected host file. In a computer, a worm is a self-replicating virus that does

    not alter files but resides in active memory and duplicates itself. Worms use partsof an operating system that are automatic and usually invisible to the user. It is

    common for worms to be noticed only when their uncontrolled replicationconsumes system resources, slowing or halting other tasks.

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    29/71

    29

    In computing the system software, hardware and information is always under threat ofeither being altered, destroyed, accessed illegally and stolen. These threats can be caused

    by errors and by accidents, natural hazards, and crimes against information technology

    crime using information technology or worms and viruses. Due to these threats there is a

    great need to protect the computer system and its resources.

    Measures and controls that ensure confidentiality, integrity, and availability of theinformation processed and stored by a computer.

    PRIVATE KEY CRYPTOGRAPHY

    In private key cryptography the same key is used by both parties. The sender uses this

    key and an encryption algorithm to encrypt data; the receiver uses the same key and thecorresponding encryption algorithm to decrypt the data.

    In symmetric-key cryptography, the algorithm used for decryption is the inverse ofthe algorithm used for encryption. This means that if the encryption algorithm uses a

    combination of additions and multiplication, the decryption algorithm uses a combinationof division and subtraction.

    Symmetric-key algorithms are efficient; it takes less time to encrypt a message using a

    symmetric-key algorithm than it takes to encrypt using a public- key algorithm. The

    reason is that the key is usually smaller. For this reason symmetric-key algorithms are

    used to encrypt and decrypt long messages.

    Symmetric algorithms has two major disadvantages. Each pair of users must have aunique symmetric key. This means that if N people in the world want to use this method,

    there needs to be N (N-1)/2 symmetric keys. For example, for 1 million people to

    communicate, 500 billion symmetric keys are needed. The distribution of the keysbetween two parties can be difficult

    PUBLIC-KEY CRYPTOGRAPHY

    In public-key cryptography, there are two keys: a private key and a public key. Theprivate key is kept by the receiver. The public key is announced to the public.

    In public-key encryption/decryption, the public key that is used for encryption is

    different from the private key that is used for decryption. The public key is available tothe public; the private key is available only to an individual.

    Public key encryption/decryption has two advantages. First it removes the restriction

    of a shared symmetric key between two entities (eg persons ) who need to communicatewith each other. A shared symmetric key is shared by the two parties and cannot be usedwhen one of them wants to communicate with a third party. In public-key

    encryption/decryption, each entity creates a pair of keys; the private one is kept, and thepublic one is distributed. Each entity is independent, and the pair of keys created can be

    used to communicate with any other entity. The second advantage is that the number of

    keys needed is reduced tremendously. In this system, for 1 million users to communicate,

    only two million keys are needed, not 500 billion, as was the case in symmetric-key

    cryptography.

    Public-key cryptography also has two disadvantages. The big disadvantage is the

    complexity of the algorithm. If we want the method to be effective, the algorithms needs

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    30/71

    30

    large numbers. Calculating the cipher text from plain text using the long keys takes a lotof time. That is the main reason that public-key cryptography is not recommended forlarge amounts of text.

    Security can be enforced through:

    Access control

    Before using the computer resources a user can be required to use his or her credit card,debit card or ATM card. These cards are used for identification purposes. The users can

    also be given unique identification characters like pin, password or digital signatures.

    Biometrics can also be used for identification purposes. This is where the characteristics

    of an individual like fingerprints and voice are used.

    Data encryptionThis is where data is altered before storage or sending via the internet. In this state it

    cannot be used until it is changed in to a form that can be read and understood.

    Use of firewallsThis is a system of both hardware and software that blocks unauthorized users and

    outside the organization from entering the intranet. The firewall all internets and othernetwork activity, a firewall identifies unauthorized users, searches for viruses and

    implements other security measures.Is a combination of hardware and software that enforces a boundary between two or more

    networks for example between a corporate network and the internet to which it isconnected.

    A firewall protects networks from unwanted traffic. The primary goal of a firewall is tolet good traffic pass though which bad traffic gets blocked. The most important part of a

    firewalls its access control features that distinguish between goal and bad traffic. ItProvides a single point of entry and exist from the network to another.

    PROXIY SERVER

    A proxy server is a form of application server that works differently from firewall. Proxy

    Service change the network addresses of the nodes on the other network.For example in the internet would not know that other node exits behind the proxy server

    nor the addresses of those nodes.

    Audit control

    This is a program which keeps a record of what computers are used, and the files that

    are opened and who uses them. This creates a record of how transaction was carried outfrom the input to the output stage. The record is also known as audit trail.

    Recovery strategiesWhen the computer crashes or resources are lost suddenly special software can be used

    to recover the lost resources.

    BackupAll programs and data in the computer should also be backed up. This where copies of

    others are also stored in a secondary device.

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    31/71

    31

    HACKERIs a person who gains unauthorized access to computers or telecommunications

    systems, for a reason only known to themselves. It is a threat to organizations information

    is always punishable by law.

    CRACKERS

    Is a person who illegally breaks into computers for malicious purposes. It can be for

    financial gain, to shutdown hardware, pirate software or to destroy or alter data. It is alsopunishable by law.

    ELECTRONIC MAIL

    Finding an E-mail AddressHow do you go about finding someones e-mail address? You can find a person only if he

    has taken the pains to register his details.

    Although there is no comprehensive directory of e-mail or Internet addresses, there areseveral search and reference tools you can consult. Some of them are:-Lookup! Directory services (http://www.lookup.com)

    Netfind (http://www.nova.edu)netPages (www.aldea.com)

    etc

    Free E-mail AccountsYou can have your personal e-mail account free of cost. All you need to access your

    mailbox is an Internet connection.There are many companies, which offer this service, absolutely free. All you have to do is

    register, choose an e-mail ID and give a password.Some of these sites, which offer this service, are:-

    Microsoft Hotmail (http//://www.hotmail.com)

    MailCity (http://www.mailcity.com)

    Yahoo! Mail (http://www.mail.yahoo.com)

    MAILING LISTSElectronic mail is far more flexible and powerful than you might at first imagine.

    E-mail can be used to run a program in a remote computer and have the results sent back

    to you.

    E-mail also offers a great way to stay in touch with special interest groups. A mailing list

    is a way to share information via electronic mail with many people, usually on a specifictopic or for a special purpose.People choose to be part of mailing list by subscribing to the list. Once you have joined

    the list (or subscribing to the list), you will receive regular information by e-mail aboutthe subject that particular list is concerned with.

    Mailing lists provide a way of keeping up with the developments and happenings in aparticular field of interest with minimum effort and cost.

    How Does Mailing List Work?

    This is how a mailing list works;A message is sent to a single e-mail address, which is referred to as the mailing list

    address.

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    32/71

    32

    This same message is then redistributed or reflected to all of the people subscribed tothe list.

    The single, central e-mail address for the list is also referred to as a mail reflector.

    Mailing lists originated on a network called BITNET. BITNET was created to connect

    universities in the united states.

    NEWSGROUPSNewsgroups on the internet have little to do with news, but everything to do with

    discussion and debate.

    Newsgroups are essentially public e-mail discussion forums where participants post

    their messages to be seen by all readers of the newsgroup.Anyone reading the message can chose to reply either publicly (to the newsgroup) or

    privately (to the originator of the message).Newsgroups provide a forum for interested people to discuss topics of common interest.

    Mailing Lists vs NewsgroupsBoth mailing lists and newsgroups offer a forum of discussion on the Internet, but theyoperate in different ways.

    Mailing lists relay the messages to your e-mail address. So you need to subscribe to themto read the messages.

    But messages posted on a newsgroup could be viewed by anyone as long as the serviceprovides supplies the newsgroup.

    Newsgroups Classifications:news-Groups concerned with news network.

    comp-Computer oriented groups dealing with topic like technical advice, game hints,software information etc.

    alt-alternative group dealing with a wide range of subjectsmisic-newsgroups that are difficult to classify.

    biz-business newsgroups dealing with business subjects like marketing & advertising.

    sci-groups devoted to scientific debate and research and development

    Businesses must do their research and find out what people want, or figure out how tomake people want a product they are producing.

    This needs to capture and record information about what people want has led to many IT-

    based databases and data warehouses of which businesses are now boasting.

    Types of discussion lists:

    Moderated vs. Unmoderated Lists

    Mailing lists can be moderated or unmoderated. The distinction is whether messages are

    automatically forwarded to all subscribers (unmoderated) or whether a moderator (ahuman being) first screens and perhaps combines similar messages before sending them

    to subscribers (moderated).

    Open vs. Closed Lists

    Electronic discussions can also be "open" or "closed." Anyone can subscribe to an open

    discussion, but a closed discussion is limited to a particular group of persons, forexample, those in a particular professional field.

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    33/71

    33

    Introduction to network news:Network News (sometimes referred to as Usenet News) is a service comprised of severalthousand electronic discussions providing users an effective way to share information

    with others on just about any topic.

    If you're unclear about the concept of Network News, it's helpful to think about a bulletin

    board that you might see on campus.

    Here, one might find posted messages advertising a futon for sale, asking for students to

    join a math study group. In the newsgroup environment, the same kind of process take

    place:

    User X may access a newsgroup on a particular topic and post a message, question, orrespond to a previously posted message, and anyone accessing that newsgroup would

    then be able to see User X's message.

    Network News newsgroups provide this same kind of forum online, where users have

    access to the messages posted by all other users of that newsgroup.Network News has been described as an "international meeting place" where you're likelyto find a discussion going on just about anything.

    How Does Network News work?Messages posted on Network News newsgroups are sent from host computer to host

    computer all over the world, using the network news transfer protocol.Because Network News newsgroups are located on one server, Network News is a very

    efficient way to share information that might otherwise be disseminated to severalindividual users.

    This way, several people can read a given newsgroup message, but the host system storesonly one copy of it.

    E-MAIL ETHICSe-mail messages are a lot like letters. Simplicity, directness, and brevity will make people

    read your messages. Our e-mails says a lot about our values, our attention to detail, and

    the reputation of the organization we represent. Like any form of communication there

    are certain manners that you should follow when using the e-mail. Here are someguidelines, which will help you in getting the most out of your electronic mailing system.

    Let your messages have a personal touch. Write it the way you would say it. Useeveryday language. Vary your sentence length.

    Be friendly, use humor to break up the tension of what you have to say.

    Be succinct and considerate of the recipients time and online charges, especiallywith services that charge by the hour or by the size of the messages. E-mail

    messages work best if they are short and to the point.

    Know your recipient. Different people have different ideas of what is acceptable.

    Find out and respect each persons wishes.

    Avoid sarcasm, unless youre sure it will work, and think carefully before using e-mail to express anger. With e-mail, once its sent, its gone.

    .Be careful about your use of irony or even some forms of humor, which can bemisinterpreted. Unlike face-to-face meetings or phone conversations, there are no

    visual or oral clues to provide a sense of what is going on.

    Be brief. This not only saves bandwidth but also cuts down on eyestrain.

    Make the subject line precise.

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    34/71

    34

    Dont copy the full text of along message into your response. Copy only parts youneed to refer to.

    Dont assume that everyone likes emoticons (emotional icons). Some people findthem annoying.

    Look sharp. Good writing is 90% clarity, and half of clarity is appearance. No onelikes facing a long unbroken block of text characters. Put a blank line betweenparagraphs to help you organize your thinking.

    Use your technology. A memory-resident spellchecker or thesaurus will help youavoid the embarrassment of a misspelled word or a word used incorrectly.

    Compose your messages off-line. A regular word processor is much morepowerful than the text editors used on most e-mail systems.

    Read the message before sending it, like your title and company name or other e-

    mail addresses you have crept in.

    Most e-mail programs these days let you insert whats called a signature at the

    bottom of the message. This can be anything from a clever quote to some

    additional information about you, like your title and company name or other e-mail addresses you have.

    Configure your e-mail client to check all your accounts in one shot.

    If security is not a concern, configure your e-mail client to remember passwords.

    Get a free-mail account for personal e-mail or mailing lists.

    If you are sending large files as attachments, use some compression utility likepkzip, WinRAR, before sending them.

    Dont send copies of e-mail to people unless they need to be copied. In addition tocluttering up their mailboxes, it can place them in an awkward position, makingthem feel as if they have to do something with the information. It can also be

    intimidating to the main recipient.

    Stay on the topic if you are posting to a public bulletin board, forum or newsgroup. Most are focused on a specific topic, and messages that stray too far from

    the topic can be annoying.

    Briefly describe who you are if the recipient doesnt already know.

    Be aware that e-mail can be archived and, under certain circumstances, may not

    be secure. On-line services and public e-mail providers protect the confidentialityof their subscribers e-mail, but some companies consider employee e-mail sent

    over the office network to be company property and subject to security.

    Avid Urgent or Priority unless it really is.

    Avoid using all capital letters. ITS THE EQUIVALENT OF SHOUTING! Also,it is harder to read.

    You should check your mail regularly. Unlike a fax or normal mail, an e-mailmessage in the most cases is not automatically delivered to your desk. You have

    to log on to check your mail.

    INTERNET CODE OF CONDUCTThe Internet relies on the cooperation of its constituents- users with users, service

    providers with other service providers, and users and service providers with one another.The following guidelines for conduct were developed from an Internet Society (ISOC)

    document available at http://www.isoc.org.

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    35/71

    35

    Mailing Lists, Newsgroups and Bulletin Boardsv Post within the forums scope/topic.

    v Avoid redundant, empty, or stupid postings.

    v Respect the opinions of other participants.

    v Be careful about the lack of social cues and possible ambiguities in text

    communications.

    v Use common courtesy when posting critical, negative comments (avoid flaming).v Be sensitive to the forums standards in respect to obscenity.

    v Do not use expressions that are considered sexually harassing, racial, or in some

    way discriminatory.

    Advertising

    v Do not post to lists or boards or newsgroups whose purpose states no advertising.Use browsing services such as WAIS, Gopher and WWW to list products and services.

    v Use e-mail enabled information services like mailing lists to which users can

    subscribe or send email to obtain information.Privacy

    v Do not invade the personal privacy of others.

    v Do not forward e-mail without permission.v Do not deliberately break into computer systems.

    Securityv Systems break-ins or aiding others to break into systems is illegal.

    v Getting passwords or other access information fraudulently is unacceptableIntellectual Property

    v Copying or making available copies of protected works without the authorspermission is illegal.

    HOW WEB BROWSERS AFFECT YOUR WORKHypertext Markup Language (HTML) is an authoring language used to create documents

    on the World Wide Web.

    The Beginnings of HTMLThe World Wide Web (www) grew out of experiments that were carried out at the CERN

    laboratories in Switzerland. Tim Berners Lee, along with a team of developers, took time

    out to investigate and build a way of transmitting information in a way, in a format that

    became known as Hypertext transport Protocol, or just HTTP.

    Using a markup language designed for simplicity and with a flexible structure, HypertextMarkup Language (HTML), allowed text and graphics to be displayed in web browser or

    other suitably enabled application. Certain parts of the document could become

    hyperlinks, which when clicked caused a different page or a different section of the pageto be displayed.

    A markup language is simply a series of elements, each delimited with special characters,that define how text or other items enclosed within the elements should be displayed e.g

    this is some emphasized text.HTML is a markup language broadly based on the standard Generalized Markup

    Language (SGML). SGML is a way of describing languages, and is not itself a languageused to create pages.

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    36/71

    36

    From these simple beginnings, extra feature were added to build version 4.0 of HTMLthat we use today. These extra features provided for more flexible text styling (such asthe element), and more control over the final layout of the page (such as the use

    of tables and frames).

    As far as serving up these pages of information, text files and graphics can be delivered

    to the user by a web server application, which simply reads them from the disk and

    converts the output to the correct HTTP protocol for transmission across the network. At

    the client user end, the browser takes the incoming stream and converts it into a page thatcan be displayed.

    The great strength of HTML and HTTP, besides university, is that the document can

    contain information about the meaning of the content, and the way that writer intended it

    to be perceived. It can be read by applications that dont actually display visually: e.g,blind people can use special application that converts it into speech.

    HYPERTEXT & HYPERMEDIA

    The basic concept of the World Wide Web, and the most revolutionary idea envisioned

    by Berner-Lee, is the use of hypertext to link information on related topics over theInternet.

    Hypertext is a non-linear way of organizing information on related topics over theInternet. When using Hypertext system, you can jump from one related topic to another,

    quickly find information that interests you, and return to your starting point or move ontoanother related topic of interest.

    On the web clickable hyperlinks, which can be either text or images, can connect you toanother web page or allow you to download a file, such as a sound, image, movie or

    executable file. Therefore hypermedia is the linking of different types of media on theWorld Wide Web.

    HTML AS A MARKUP LANGUAGEA markup language is a structured language that lets you identify common sections of a

    document such as headings, paragraphs, and lists. An HTML file includes text and

    HTML markup elements that identity these sections.

    Browser ChaosAs different browsers tried to attract market share, a set of proprietary HTML elements

    evolved that centered around the use of each particular browser. E.g. and

    elements, which specifically developed for Netscape browser.

    Adding to this confusing compatibility issue are the elements that are strictly proprietary,

    such as (Internet Explorer only) which creates scrolling text and for (Netscape Navigator), which makes text to blink on and off. These

    elements work only within the browser for which they were designed and are ignored by

    other browsers.

    XML: AN OPEN STANDARD FOR STRUCTRING

    XML is a subset of SGML. Unlike HTML, XML is a meta-language, not a languageitself, but a language that lets you describe other languages.

    As a meta-language, XML allows you to create your own elements to meet yourinformation needs, which significantly distinguishes it from the predefined elements of

  • 8/7/2019 CLIENT SERVER AND MULTIMEDIA NOTES

    37/71

    37

    HTML. XML provides a format of describing structured data that can be shared bymultiple applications across multiple platforms.

    XML Describes DataThe power of data representation in XML comes from separating display and style from

    the structure of data and structure only and not presentation. Where HTML contains

    elements that describe a word as bold or italic, XML declares an element to be a book

    t