Framework Presentation

Slides:



Advertisements
Similar presentations
.Net Remoting by James Stone. What is.Net Remoting? RemotingRemoting is a technology that allows.NET applications to communicate. Remoting Same machine,
Advertisements

Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—1-1 Building a Simple Network Understanding the TCP/IP Transport Layer.
.NET Remoting. .Net Remoting Replaces DCOM (Distributed Component Object Model – a proprietary Microsoft technology for communication among software components.
Introduction to the Internet and World Wide Web Design.
Negotiating Unsolicited Connections to a Service Listening Behind a Firewall Ben Stroud CS525 Spring 10.
Design and Programming Patterns Associated with Java Networking by Margaret Toews cs843, Spring 2003.
1 Java Networking – Part I CS , Spring 2008/9.
CS490T Advanced Tablet Platform Applications Network Programming Evolution.
Davide Rossi 2002 Using Sockets in Java. 2Davide Rossi 2002 TCP/IP  A protocol is a set of rules that determine how things communicate with each other.
Project Name Group Name: Customer: Name of Customer Project Manager: Student Name1 Project Facilitator: Student Name1 Customer Liaison/Domain Expert:Student.
Slide 5.1 Curtis/Cobham © Pearson Education Limited 2008 Chapter 5 The Internet and the World Wide Web.
Software Engineering 3156 Fall 2001 Section 1 24-Sep-01 #5: Project, OOA, UML Phil Gross.
Circuit & Application Level Gateways CS-431 Dick Steflik.
R R R CSE870: Advanced Software Engineering: Cheng (Sp 2001)CSE870: Advanced Software Engineering: Cheng (Sp 2001)1 Mini Project An Overview.
Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen Dr. Mark Stamp SJSU - CS 265 Spring 2003 STEM is proposed as a solution to network vulnerabilities,
Software Engineering CSE470: Cheng and McUmber Software Engineering CSE470 (Fall 2001) Instructors: Dr. B. Cheng (Sect. 1-3) Dr. W. McUmber (Sect. 4-6)
Smart Home Current Progress Summary. Main Processor – Stellaris.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 20 RADIUS and Internet Authentication Service.
FTP File Transfer Protocol. Introduction transfer file to/from remote host client/server model  client: side that initiates transfer (either to/from.
Course 201 – Administration, Content Inspection and SSL VPN
1 Web Server Administration Chapter 9 Extending the Web Environment.
Comp101 Lecture ‘Internet’ abstract 1 What is the Internet? The US military wanted a network that was robust under enemy attack. US academics wanted a.
Module 7: Firewalls and Port Forwarding 1. Overview Firewall configuration for Web Application Hosting Forwarding necessary ports for Web Application.
Greg Van Dyne December 4, Agenda Introduction Technical Overview Protocols Demonstration Future Trends References.
SDK Phase 0 Software simulation environment on PC Assumed underway by Nintendo iReady can provide GB to RS232 adapter –allows GB to be connected to PC.
How computer’s are linked together.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 8 Omar Meqdadi Department of Computer Science and Software Engineering University of.
Module 1: Configuring Routing by Using Routing and Remote Access.
A machine that acts as the central relay between computers on a network Low cost, low function machine usually operating at Layer 1 Ties together the.
Reflecting Proxies Mini != Small Jon Babbage Tony Lambert Michael Malinak Paul Middlin CSE870 Advanced Software Engineering, Spring 2001 Instructor: Dr.
Web application architecture1 Based on Jim Conallen: Web Applications with UML.
Networks Overview of a Network Web Ftp Newsgroups.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Socket Programming Introduction. Socket Definition A network socket is one endpoint in a two-way communication flow between two programs running over.
1 Firewall Rules. 2 Firewall Configuration l Firewalls can generally be configured in one of two fundamental ways. –Permit all that is not expressly denied.
Advanced UNIX programming Fall 2002, lecture 16 Instructor: Ashok Srinivasan Acknowledgements: The syllabus and power point presentations are modified.
Module 10: Windows Firewall and Caching Fundamentals.
Cisco Discovery Semester 1 Chapter 6 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—3-1 Lesson 3 Cisco PIX Firewall Technology and Features.
Intro to Web Services Dr. John P. Abraham UTPA. What are Web Services? Applications execute across multiple computers on a network.  The machine on which.
CSE 451: Operating Systems Spring 2012 Module in 9 slides Ed Lazowska Allen Center 570.
FlowLevel Client, server & elements monitoring and controlling system Message Include End Dial Start.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
The Aerospace Clinic 2002 Team Members Nick Hertl (Project Manager) Will Berriel Richard Fujiyama Chip Bradford Faculty Advisor Professor Michael Erlinger.
Team members: Project Manager: Keyur Patel Facilitator: Tony Cooke Customer Liason: Ben Blaut Configuration Manager: Luan Tran Customer: Mr. Anthony Torre,
1 Framework Presentation Project Participants: Karun Biyani Manish Mehta Pradeep Vincent CSE870 Advanced Software Engineering, Spring 2001 Instructor:
WHAT’S A WIRELESS AP? AND WHY DO I NEED ONE? Network Components & How They Work.
Enumeration.
Client-Server Model and Sockets
CompTIA Server+ Certification (Exam SK0-004)
Working at a Small-to-Medium Business or ISP – Chapter 7
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Team members: Project Manager: Facilitator: Customer Liason:
Chapter 4 Core TCP/IP Protocols
Packet Switching To improve the efficiency of transferring information over a shared communication line, messages are divided into fixed-sized, numbered.
I. Basic Network Concepts
Kayra Hopkins Loretta Macklem
CSE 451: Operating Systems Spring 2005 Module in 9 slides
IS 4506 Server Configuration (HTTP Server)
Team Members: Member1, … Spring 2013
Hyperlinks and Protocols
Unit 36: Internet Server Management
CSE 451: Operating Systems Autumn 2009 Module in 9 slides
CSE 451: Operating Systems Autumn 2010 Module in 9 slides
Advanced Computer Networks
Computer Networks Protocols
15. Proxy SE2811 Software Component Design
Exceptions and networking
Presentation transcript:

Framework Presentation Project Participants: Kirit Patel Arun Subramanian CSE870 Advanced Software Engineering, Spring 2001 Instructor: Dr. B. Cheng

Overview Proxy Domain Description Framework Overview Sample Application Highlights Demonstration Discussion

Proxy Domain Port Forwarding Proxies (PFP) PFPs are used to forward protocol data from the local system:port to a remote system:port Useful for ftp, http, telnet, and other types of servers Also useful, to bypass existing firewalls Could be used to connect two dissimilar networks together over a bridge

Application Highlights The three PFP’s are: A Dodgy Java TCP Proxy PlugProxy v1.03 The Quick and Dirty Port Forwarder All three proxies can forward protocol data from the local machine to a remote IP:port

Application Highlights (cont.) Describe how you extend/instantiate the framework presented in the previous slide

Framework Overview This is the UML case diagram for our final framework

Demonstration of our proxies Here is a demonstration of the our three proxies. Kirit is a loser

Discussion Java is not as bad as I thought Frameworks can help you better reuse your code. Easier to create families of related applications