Networks 2 Key Revision Points.

Slides:



Advertisements
Similar presentations
Csc333 Data communication & Networking Credit: 2.
Advertisements

Forensic and Investigative Accounting
Copyright © Texas Education Agency, All rights reserved.1 Web Technologies Web Administration.
Chapter 7: Using Windows Servers to Share Information.
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Computer networks 2 A Informatica prof.sse ALLEMANI e CARUSO.
NETWORK SERVERS Oliver Topping (with a little help from my Mum)
Mr C Johnston ICT Teacher
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
TCP/IP Transport and Application (Topic 6)
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Networking Basics CCNA 1 Chapter 11.
INTRANETS MR ROSS UNIT 3 IT APPLICATIONS. DEFINITION An intranet is an internal, secured environment that has a similar look and feel to the Internet,
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Networks Part 2: Infrastructure + Protocols NYU-Poly: HSWP Instructor: Mandy Galante.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
Connection Establishment and Termination. Tcpdump tcpdump is a common packet analyzer that runs under the command line. It allows the user to intercept.
Communications & Networks National 4 & 5 Computing Science.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
LO2 Understand the key components used in networking.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Component 1 Network Protocols.
Chapter 7: Using Windows Servers
Dibyajit Computer Security Hacking dibyajit
3.1 Types of Servers.
The Client-Server Model
Networks 1 Key Revision Points.
System Architecture & Hardware Configurations
People used to install software on their computers
3.1 Types of Servers.
Video Conferencing Video conferencing is a form of communication where users with computers and web cams communicate using both audio and video over the.
3.1 Types of Servers.
System Architecture & Hardware Configurations
Virtual Private Networks (VPN)
Definition, DIS/Advantages & Services
CHAPTER 2 Application Layer.
Introduction to Computers
Web Development & Design Chapter 1, Sections 4, 5 & 6
Client-Server Computing
Providing Network Services
TASK 4 Guideline.
The “Internet”.
Diskless network security
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Client-Server and Peer to Peer networks
I. Basic Network Concepts
Web Design & Development
Network Models, Hardware, Protocols and number systems
CS4470 Computer Networking Protocols
Syara Hamdani Sandi Reza Fitroh
TRANSMISSION CONTROL PROTOCOL
Lecture 2: Overview of TCP/IP protocol
Lecture 3: Secure Network Architecture
Communications & Computer Networks Resource Notes - Introduction
ICT Computing Lesson 4: Computing Network.
Protocols 2 Key Revision Points.
GCSE OCR 3 A451 Computing Client-server and peer-to-peer networks
Online software and backups
Protocol Application TCP/IP Layer Model
INFORMATION FLOW ACROSS THE INTERNET
Objectives Explain the role of computers in client-server and peer-to-peer networks Explain the advantages and disadvantages of client- server and peer-to-peer.
Communication and the Internet
Computer Networks Protocols
WJEC GCSE Computer Science
Transport Layer 9/22/2019.
Presentation transcript:

Networks 2 Key Revision Points

Client-Sever Model Server = The computer that holds all the data and software Client (computer) = The networked computer the user works on There are two models of client server network:

Thick Client Each client computer has its own software and does its own processing. The network connection is used only to send data to the server, connect to the Internet or send output to the printer

Thick Client +/- Benefits If the network connection fails the clients can still function offline. Work can be saved locally until the network connection is restored Flexible – each client can have different software Central server doesn’t have to be as powerful as it does little processing Drawbacks The client computers have to be modern and powerful enough for all the processing tasks. This makes the client computers expensive to purchase

Thin Client All software is held on the server and all processing is done by the server Clients are often “dumb terminals” – little more than a keyboard, mouse and monitor

Thin Client +/- Benefits Clients do little or no processing so older, cheaper and less powerful computers can be used Drawbacks If the network fails for any reason the client computers are unusable Only suitable for online working

Web Applications

Web Applications A web application e.g. online shopping uses the web browser of a client computer to run an applications stored on a server In a business employees might access software through a web application e.g. Office 365 Both examples of a client server network

Protocols and Handshaking If two computers communicate they must send/receive data in an agreed format The agreed communication method that both computers understand is called a protocol The Internet uses two common protocols:

IP/TCP IP – Internet Protocol IP is the communication system that gives every computer on the Internet an address. IP ensures information is sent to the right address TCP – Transmission Communication Protocol TCP ensures the computers send each other blocks of data in a secure and orderly way Other Protocols All other protocols used on the Internet use TCP/IP to do specific tasks HTTP, HTTPS, POP3, IMAP, SMPTP

3 Step Handshake There are a number of problems/risks when running web applications: The client and server must use the same communications protocol They must be able to identify each other Security may be a risk when sending information To prevent problems a process called the 3 STEP TCP HANDSHAKE takes place BEFORE the client and server begin to share information This allows the computers to recognise each other and confirm the protocol (e.g. https) and connection BEFORE data is communicated

3 Step Handshake Client sends a SYN signal – this asks the server to establish a connection The server goes into an SYN RECEIVED state and sends back a SYN-ACK signal which agrees to make the connection The client goes into an ESTABLISHED state and sends back an ACK signal The server then goes into an ESTABLISHED state Once both computers are in an established state communication can go ahead Either computer can send a FIN signal to end the communication

3 Step Handshake

Advantages There are a number of advantages to using the client server model for web applications: System can be used by many different customers/employees on different types of computer Security – customers/employees only have access to their own data Accessible anywhere 24/7 e.g. Office365/Google Docs Applications can be updated easily