Internet Relay Chat David Holl IS 373. Overview Introduction Standards Body History Specifications Advantages and Disadvantages Privacy Security Pervasiveness.

Slides:



Advertisements
Similar presentations
Applicability of Instant Messaging in the Military Command and Control Systems Author: Juha Vermaja Superviser: Jorma Jormakka Instructor: Marko Luoma,
Advertisements

MASK. Agenda Introduction –IRC prelude –What is IRC? –How does IRC work? Architecture –Client/Server –IRC commands –3 major types of communication on.
Ethan Kim. o Websites o Youtube, Hulu, Fox, NBC, etc. o Media Players o Windows Media Player, Real Player o Video Conferencing o Skype, MSN Messenger,
Peer-to-Peer vs. Client/Server Network Operating Systems Instructor: Dr. Najla Al-Nabhan
8.
Chapter 12 Network Security.
SSH: An Internet Protocol By Anja Kastl IS World Wide Web Standards.
By: Jeason Mejia. History Of NNTP The Network News Transport Protocol (NNTP) is published by RFC 977 and was first implemented by Phil Lapsley for BSD.
Introduction to Service-Oriented Architecture. Outline Definition Features Examples of SOA Web Service Standards Example Pros and Cons Integration with.
Bots and Botnets CS-431 Dick Steflik. DDoS ● One of the most common ways to mount a Distributed Denial of Service attacks is done via networks of zombie.
Chat applications and IRC Presented by Tyler Maciolek.
1 Chapter 19 Networks. 2 What’s Inside and on the CD? In this chapter you’ll learn: –Basic network terminology –To identify network components –About.
Telnet/SSH Tim Jansen, Mike Stanislawski. TELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the.
Introduction to Web Pages. Slide 2 Lecture Overview Evolution of the Internet and Web Web Protocols.
Circuit & Application Level Gateways CS-431 Dick Steflik.
Introduction to client/server architecture
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Free Powerpoint Templates Page 1 Free Powerpoint Templates Peer-2-Peer File Sharing Kenie Moses TECH621Social Internet Spring 2011.
SERVER CLIENT GATEWAY DISCOVERY EMBEDDED Virtual Interoperability Workshop Overview.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Blogger & KidBlog By Whitney Alley & Jorden Dickmeyer.
OU Passwords What they all mean. What is a password Webster’s Online Dictionary describes a password as “a sequence of characters required for access.
Computer Skills Preparatory Year Presented by: L.Obead Alhadreti.
? INTERNET WHAT, WHY, HOW. DEFINITION The Internet is a massive public spiderweb of computer connections. It connects personal computers, laptops, tablets,
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Operating Systems : Tasks and Examples Instructor: Dr. Najla Al-Nabhan
 Introduction  VoIP  P2P Systems  Skype  SIP  Skype - SIP Similarities and Differences  Conclusion.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
LIGHT WEIGHT DIRECTORY ACCESS PROTOCOL Presented by Chaithra H.T.
What is a Network?. Definition of a computer network A computer network is a system in which computers are connected to share information and resources.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
Networking Basics Lesson 1 Introduction to Networks.
SAMANVITHA RAMAYANAM 18 TH FEBRUARY 2010 CPE 691 LAYERED APPLICATION.
DCOM (Overview) by- Jeevan Varma Anga.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
Page 1 of 9 NFS Vendors Conference October 25, 2000 PC Solutions to Network File Systems.
Remote Access Using Citrix Presentation Server December 6, 2006 Matthew Granger IT665.
Chapter 17 Internetworking: Concepts, Architecture, and Protocols
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
2.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 2: Examining.
May 1998 Page 1 SOLIANT Internet Systems SGCP - Simple Gateway Control Protocol Christian Huitema
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 14 How Internet Chat and IM Work.
A Scalable Virtual Registry Service for jGMA Matthew Grove DSG Seminar 3 rd May 2005.
Lesson 1—Networking BASICS1 Networking BASICS Introduction to Networking Unit 1 Lesson 1.
Communications & Networks National 4 & 5 Computing Science.
An Analysis of XMPP Security Team “Vision” Chris Nelson Ashwin Kulkarni Nitin Khatri Taulant Haka Yong Chen CMPE 209 Spring 2009.
2/18/2016Fatimah AlAkeel - Network 11 Introduction to Networks.
File Transfer And Access (FTP, TFTP, NFS). Remote File Access, Transfer and Storage Networks For different goals variety of approaches to remote file.
HNC COMPUTING - Network Concepts 1 Network Concepts Network Concepts Network Operating Systems Network Operating Systems.
Netprog: Chat1 Chat Issues and Ideas for Service Design Refs: RFC 1459 (IRC)
Chapter Eight Internetworking with Remote Access.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 09 Network Services.
By: Joshua Wiegand. Overview ● What is the cloud computing? ● History of Mobile Computing ● Service Models ● Deployment Models ● Architecture ● Security.
Security Issues with Domain Name Systems
CT1503 Network Operating System
Web Development Web Servers.
Cryptography and Network Security Chapter 16
File Transfer Protocol
A BRIEF INTRODUCTION TO UNIX OPERATING SYSTEM
Chat Refs: RFC 1459 (IRC).
An Introduction to Cloud Computing
Architecture Competency Group
COMPUTER NETWORKS AND INTERNET. Introduction to computer networks and networking concepts, general understanding and examples, brainstorming, group work.
Course Name : Network Operating System Course Code: CNET 332 These slides are only meant for course delivery. For all your Exams refer to your text book.
Course Name : Network Operating System Course Code: CNET 332
Computer Networks Topic :User datagram protocol Transmission Control Protocol -Hemashree S( )
Presentation transcript:

Internet Relay Chat David Holl IS 373

Overview Introduction Standards Body History Specifications Advantages and Disadvantages Privacy Security Pervasiveness Reliability Robustness Interoperability Support of the community Maintainability Ease of use Application of IRC Conclusion

Introduction What is Internet Relay Chat? Multi-user chat program Users interact in channels Servers connect to each other to create networks Limited file sharing capabilities

Standards Body Created by volunteers RFCs with the IETF

History Created by Jarkko Oikarinen of Oulu University in Finland in IRC used in Gulf War and Russian Coup attempt RFC 1459 published in 1993 “Great Split” in 1996 RFC’s 2810 – 2813 published in 2000

Specifications RFC 1459 – first specification RFC 2810 – IRC architecture RFC 2811 – IRC channel management RFC 2812 – Client protocol RFC 2813 – Server protocol

Pros and Cons Pros Basic standard is widely used and most clients can connect to most servers Lightweight and flexible chat system Loose standard leads to wide variety of clients and servers Cons Somewhat primitive Very loose standard leads to incompatibility between servers, dividing up networks

Privacy Anything in a channel may be logged by any user IRSeek Generally IPs are concealed but are still recorded by the server and can be viewed To ensure private one-on-one communication use Direct Client-to-Client

Security Standard only briefly discusses security Authentication is done server side based on server-recorded passwords and DNS lookup Additional security up to extra features outside of the standard Primary security threat through filesharing Some server or client implementations may have security holes

Pervasiveness Implementations of the standard for nearly every OS with TCP/IP 500,000 to 750,000 users daily Hundreds of networks and servers Generally small, niche online communities

Reliability and Robustness Generally dependent on implementation Netsplits between servers disrupts networks; frequency is server-based Larger IRC networks fairly reliable

Interoperability Loose coupling Clients and servers meet minimum requirements of the standard to communicate Some servers cannot

Support of the Community IRC has a relatively small but active community Design differences cause passionate divisions (see “Great Split”) Community isn’t really active in further development

Maintainability Standard essentially hasn’t been updated since 2000 New standards unlikely to be written due to entrenched variations in implementations

Ease of Use Major clients are fairly easy to use Setting up a server requires both a UNIX system and some skill with it

Application of IRC Collaboration on software projects freenode General communications Avoiding communication blackout such as in the 1991 Russian coup attempt File sharing Direct Client-to-Client communication

Conclusion Useful chat program if somewhat primitive in appearance or functionality Loose standard causes some security concerns and reduces reliability and robustness Tightening the standard would meet resistance and might damage or destroy small but dedicated communities

Resources Number=194218&Searchpage=2&Main=36021&Words=Wikipedia&topic=0&Se arch=true#Post