Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
World Wide Web
Dr.T.Abirami, Associate Professor , Department of IT, Kongu
Engineering College,Perundurai
World Wide Web
• Web was first proposed by Tim Berners-Lee in 1989 at CERN†, the European Organization
for Nuclear Research
• Web is a repository of information is distributed all over the world and related
documents are linked together
• Web can be related to in the above statement:
1. distributed and two terms
2. linked.
• Distribution allows the growth of the Web. Each web server in the world can add a new
web page to the repository and announce it to all Internet users without overloading a
few servers.
• Linking allows one web page to refer to another web page stored in another server
somewhere else in the world. The linking of web pages was achieved using a concept
called hypertext,
Dr.T.Abirami, Associate Professor , Department of IT, Kongu
Engineering College,Perundurai
Architecture
the service provided is distributed
over many locations called sites.
Each site holds one or more web
pages
Dr.T.Abirami, Associate Professor , Department of IT, Kongu
Engineering College,Perundurai
Web Client (Browser)
• display a web page
• Each browser usually consists of three parts:
1. a controller,
2. client protocols, and
3. interpreters.
Dr.T.Abirami, Associate Professor , Department of IT, Kongu
Engineering College,Perundurai
Web Server
• The web page is stored at the server.
• Each time a request arrives, the corresponding document is sent to
the client.
• To improve efficiency, servers normally store requested files in a
cache in memory; memory is faster to access than a disk.
Example
• web servers include Apache and Microsoft Internet Information
Server.
Dr.T.Abirami, Associate Professor , Department of IT, Kongu
Engineering College,Perundurai
Uniform Resource Locator (URL)
• A web page, as a file, needs to have a unique identifier to distinguish it
from other web pages.
• To define a web page, need four identifiers:
1. Protocol : to access the web page. HTTP (HyperText Transfer Protocol)
and FTP (File Transfer Protocol). HTTP protocol is used for accessing the
web page
2. Host: The host identifier can be the IP address of the server or the
unique name given to the server.
3. Port: well-known port number is 80
4. Path: location and the name of the file in the underlying operating
system. http://www.mhhe.com/compsci/forouzan/
defines the web page
Dr.T.Abirami, Associate Professor , Department of IT, Kongu
Engineering College,Perundurai
Web Documents
• Static Documents : fixed-content documents that are created and
stored in a server. The client can get a copy of the document only.
• dynamic document is created by a web server whenever a browser
requests the document. When a request arrives, the web server runs
an application program or a script that creates the dynamic
document.
• Active Documents : need a program or a script to be run at the
client site. run a program that creates animated graphics on the
screen or a program that interacts with the user.
Dr.T.Abirami, Associate Professor , Department of IT, Kongu
Engineering College,Perundurai
TELNET
Dr.T.Abirami, Associate Professor , Department of IT, Kongu
Engineering College,Perundurai
Telnet
• It stands for the TELetype NETwork.
• It helps in terminal emulation.
• It allows Telnet clients to access the resources of the Telnet
server.
• It is used for managing files on the internet.
• It is used for the initial setup of devices like switches.
• The telnet command is a command that uses the Telnet
protocol to communicate with a remote device or system.
• Port number of telnet is 23.
Dr.T.Abirami, Associate Professor , Department of IT, Kongu
Engineering College,Perundurai
Dr.T.Abirami, Associate Professor , Department of IT, Kongu
Engineering College,Perundurai
Local versus Remote Logging
• When a user logs into a local system, it is called local logging.
• when a user wants to access an application program or utility located
on a remote machine, it performs remote logging. Here the TELNET
client and server programs come into use.
• The characters are sent to the TELNET client, which transforms the
characters into a universal character set called Network Virtual
Terminal (NVT) characters
Dr.T.Abirami, Associate Professor , Department of IT, Kongu
Engineering College,Perundurai
Dr.T.Abirami, Associate Professor , Department of IT, Kongu
Engineering College,Perundurai
SECURE SHELL (SSH)
Dr.T.Abirami, Associate Professor , Department of IT, Kongu
Engineering College,Perundurai
Secure Shell (SSH)
• It is a secure application program that can be used today for several
purposes such as remote logging and file transfer
• it was originally designed to replace TELNET.
• There are two versions of SSH: SSH-1 and SSH-2,
Dr.T.Abirami, Associate Professor , Department of IT, Kongu
Engineering College,Perundurai
Components
• SSH Transport-Layer Protocol (SSH-TRANS)
• TCP is not a secured transport-layer protocol, SSH first uses a protocol that
creates a secured channel on top of the TCP.
• Privacy or confidentiality of the message exchanged
• Data integrity, which means that it is guaranteed that the messages
exchanged between the client and server are not changed by an intruder
• Server authentication
• Compression of the messages
• SSH Authentication Protocol (SSH-AUTH)
• is established between the client and the server and the server is
authenticated for the client,
• SSH Connection Protocol (SSH-CONN)
• is established and both server and client are authenticated for each other
Dr.T.Abirami, Associate Professor , Department of IT, Kongu
Engineering College,Perundurai
Applications
• SSH for Remote Logging
• SSH for File Transfer
• Port Forwarding
Dr.T.Abirami, Associate Professor , Department of IT, Kongu
Engineering College,Perundurai

More Related Content

What's hot

Introduction to IETF and Standardisation Process
Introduction to IETF and Standardisation ProcessIntroduction to IETF and Standardisation Process
Introduction to IETF and Standardisation Process
Vinayak Hegde
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structures
Sweta Kumari Barnwal
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
kazim Hussain
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
Maulik Patel
 
Unit 4 UDP
Unit 4 UDPUnit 4 UDP
Unit 4 UDP
Nivetha Palanisamy
 
Flow control in Computer Network
Flow control in Computer NetworkFlow control in Computer Network
Flow control in Computer Network
Ahtesham Ullah khan
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
Joe Christensen
 
Mac adhoc
Mac adhocMac adhoc
Mac adhoc
Nimii Nimo
 
FTP & TFTP
FTP & TFTPFTP & TFTP
FTP & TFTP
NetProtocol Xpert
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
Ujjayanta Bhaumik
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
selvakumar_b1985
 
Congestion control
Congestion controlCongestion control
Congestion control
Nithin Raj
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
Sunita Sahu
 
Error control
Error controlError control
Error control
Bhupendra sahu
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
Peter R. Egli
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
Joe Christensen
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithm
Basit Hussain
 
Mobile IP
Mobile IPMobile IP
Mobile IP
Mukesh Chinta
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
Mshari Alabdulkarim
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
Mohammad Adil
 

What's hot (20)

Introduction to IETF and Standardisation Process
Introduction to IETF and Standardisation ProcessIntroduction to IETF and Standardisation Process
Introduction to IETF and Standardisation Process
 
Computer network switches & their structures
Computer network switches & their structuresComputer network switches & their structures
Computer network switches & their structures
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
 
Unit 4 UDP
Unit 4 UDPUnit 4 UDP
Unit 4 UDP
 
Flow control in Computer Network
Flow control in Computer NetworkFlow control in Computer Network
Flow control in Computer Network
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
Mac adhoc
Mac adhocMac adhoc
Mac adhoc
 
FTP & TFTP
FTP & TFTPFTP & TFTP
FTP & TFTP
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 
Congestion control
Congestion controlCongestion control
Congestion control
 
RPC: Remote procedure call
RPC: Remote procedure callRPC: Remote procedure call
RPC: Remote procedure call
 
Error control
Error controlError control
Error control
 
Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)Overview of SCTP (Stream Control Transmission Protocol)
Overview of SCTP (Stream Control Transmission Protocol)
 
Lecture 15
Lecture 15Lecture 15
Lecture 15
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithm
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
 

Similar to Computer Networks : WWW , TELNET and SSH

MODULE-5_CCN.pptx
MODULE-5_CCN.pptxMODULE-5_CCN.pptx
MODULE-5_CCN.pptx
Dr. Shivashankar
 
Computer Introduction-Lecture07
Computer Introduction-Lecture07Computer Introduction-Lecture07
Computer Introduction-Lecture07
Dr. Mazin Mohamed alkathiri
 
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
Dr. Shivashankar
 
APPLICATION LAYER PROTOCOLS .pptx
APPLICATION LAYER PROTOCOLS         .pptxAPPLICATION LAYER PROTOCOLS         .pptx
APPLICATION LAYER PROTOCOLS .pptx
ArnavPlayz
 
Unit 1 web technology uptu slide
Unit 1 web technology uptu slideUnit 1 web technology uptu slide
Unit 1 web technology uptu slide
Abhishek Kesharwani
 
WPJS-Lesson01-Presentation.pptx
WPJS-Lesson01-Presentation.pptxWPJS-Lesson01-Presentation.pptx
WPJS-Lesson01-Presentation.pptx
ElijahSantos5
 
Module notes artificial intelligence and
Module notes artificial intelligence andModule notes artificial intelligence and
Module notes artificial intelligence and
bhagyavantrajapur88
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
FabMinds
 
INTERNET TECHNOLOGY
INTERNET  TECHNOLOGYINTERNET  TECHNOLOGY
INTERNET TECHNOLOGY
subhradeep mitra
 
Introduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptxIntroduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptx
hishamousl
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
PreethaV16
 
web world wide defination introduction.pptx
web world wide defination introduction.pptxweb world wide defination introduction.pptx
web world wide defination introduction.pptx
ubaidullah75790
 
uniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptxuniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptx
bmit1
 
COMPUTER NW2 (1).pptx
COMPUTER NW2 (1).pptxCOMPUTER NW2 (1).pptx
COMPUTER NW2 (1).pptx
JVenkateshGoud
 
Module 1 Basic.pptx
Module 1 Basic.pptxModule 1 Basic.pptx
Module 1 Basic.pptx
reddragon32
 
applayer.pptx
applayer.pptxapplayer.pptx
applayer.pptx
ssuser8b4eb21
 
Understanding WWW
Understanding WWWUnderstanding WWW
Understanding WWW
BIT DURG
 
An Introduction To World Wide Web
An Introduction To World Wide WebAn Introduction To World Wide Web
An Introduction To World Wide Web
Abhishek Kharbanda
 
Computer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxComputer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptx
SmithaV19
 
Basic of it definations
Basic of it definationsBasic of it definations
Basic of it definations
tangemjoy
 

Similar to Computer Networks : WWW , TELNET and SSH (20)

MODULE-5_CCN.pptx
MODULE-5_CCN.pptxMODULE-5_CCN.pptx
MODULE-5_CCN.pptx
 
Computer Introduction-Lecture07
Computer Introduction-Lecture07Computer Introduction-Lecture07
Computer Introduction-Lecture07
 
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
21 Scheme_21EC53_MODULE-5_CCN_Dr. ShivaS
 
APPLICATION LAYER PROTOCOLS .pptx
APPLICATION LAYER PROTOCOLS         .pptxAPPLICATION LAYER PROTOCOLS         .pptx
APPLICATION LAYER PROTOCOLS .pptx
 
Unit 1 web technology uptu slide
Unit 1 web technology uptu slideUnit 1 web technology uptu slide
Unit 1 web technology uptu slide
 
WPJS-Lesson01-Presentation.pptx
WPJS-Lesson01-Presentation.pptxWPJS-Lesson01-Presentation.pptx
WPJS-Lesson01-Presentation.pptx
 
Module notes artificial intelligence and
Module notes artificial intelligence andModule notes artificial intelligence and
Module notes artificial intelligence and
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
INTERNET TECHNOLOGY
INTERNET  TECHNOLOGYINTERNET  TECHNOLOGY
INTERNET TECHNOLOGY
 
Introduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptxIntroduction to the Internet and Web.pptx
Introduction to the Internet and Web.pptx
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
 
web world wide defination introduction.pptx
web world wide defination introduction.pptxweb world wide defination introduction.pptx
web world wide defination introduction.pptx
 
uniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptxuniti-websitebasics-230517110223-12e31dbc (1).pptx
uniti-websitebasics-230517110223-12e31dbc (1).pptx
 
COMPUTER NW2 (1).pptx
COMPUTER NW2 (1).pptxCOMPUTER NW2 (1).pptx
COMPUTER NW2 (1).pptx
 
Module 1 Basic.pptx
Module 1 Basic.pptxModule 1 Basic.pptx
Module 1 Basic.pptx
 
applayer.pptx
applayer.pptxapplayer.pptx
applayer.pptx
 
Understanding WWW
Understanding WWWUnderstanding WWW
Understanding WWW
 
An Introduction To World Wide Web
An Introduction To World Wide WebAn Introduction To World Wide Web
An Introduction To World Wide Web
 
Computer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptxComputer Networks notes 5- Module 5.pptx
Computer Networks notes 5- Module 5.pptx
 
Basic of it definations
Basic of it definationsBasic of it definations
Basic of it definations
 

More from Kongu Engineering College, Perundurai, Erode

Introduction to Spring & Spring BootFramework
Introduction to Spring  & Spring BootFrameworkIntroduction to Spring  & Spring BootFramework
Introduction to Spring & Spring BootFramework
Kongu Engineering College, Perundurai, Erode
 
A REST API (also called a RESTful API or RESTful web API) is an application p...
A REST API (also called a RESTful API or RESTful web API) is an application p...A REST API (also called a RESTful API or RESTful web API) is an application p...
A REST API (also called a RESTful API or RESTful web API) is an application p...
Kongu Engineering College, Perundurai, Erode
 
SOA and Monolith Architecture - Micro Services.pptx
SOA and Monolith Architecture - Micro Services.pptxSOA and Monolith Architecture - Micro Services.pptx
SOA and Monolith Architecture - Micro Services.pptx
Kongu Engineering College, Perundurai, Erode
 
Application Layer.pptx
Application Layer.pptxApplication Layer.pptx
Connect to NoSQL Database using Node JS.pptx
Connect to NoSQL Database using Node JS.pptxConnect to NoSQL Database using Node JS.pptx
Connect to NoSQL Database using Node JS.pptx
Kongu Engineering College, Perundurai, Erode
 
Node_basics.pptx
Node_basics.pptxNode_basics.pptx
Navigation Bar.pptx
Navigation Bar.pptxNavigation Bar.pptx
Bootstarp installation.pptx
Bootstarp installation.pptxBootstarp installation.pptx
nested_Object as Parameter & Recursion_Later_commamd.pptx
nested_Object as Parameter  & Recursion_Later_commamd.pptxnested_Object as Parameter  & Recursion_Later_commamd.pptx
nested_Object as Parameter & Recursion_Later_commamd.pptx
Kongu Engineering College, Perundurai, Erode
 
Chapter 3.pdf
Chapter 3.pdfChapter 3.pdf
Introduction to Social Media and Social Networks.pdf
Introduction to Social Media and Social Networks.pdfIntroduction to Social Media and Social Networks.pdf
Introduction to Social Media and Social Networks.pdf
Kongu Engineering College, Perundurai, Erode
 
Dropdown Menu or Combo List.pdf
Dropdown Menu or Combo List.pdfDropdown Menu or Combo List.pdf
Dropdown Menu or Combo List.pdf
Kongu Engineering College, Perundurai, Erode
 
div tag.pdf
div tag.pdfdiv tag.pdf
Dimensions of elements.pdf
Dimensions of elements.pdfDimensions of elements.pdf
CSS Positioning Elements.pdf
CSS Positioning Elements.pdfCSS Positioning Elements.pdf
CSS Positioning Elements.pdf
Kongu Engineering College, Perundurai, Erode
 
Random number generation_upload.pdf
Random number generation_upload.pdfRandom number generation_upload.pdf
Random number generation_upload.pdf
Kongu Engineering College, Perundurai, Erode
 
JavaScript_introduction_upload.pdf
JavaScript_introduction_upload.pdfJavaScript_introduction_upload.pdf
JavaScript_introduction_upload.pdf
Kongu Engineering College, Perundurai, Erode
 
Transport layer services
Transport layer servicesTransport layer services
Application layer : DNS
Application layer : DNSApplication layer : DNS
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
Kongu Engineering College, Perundurai, Erode
 

More from Kongu Engineering College, Perundurai, Erode (20)

Introduction to Spring & Spring BootFramework
Introduction to Spring  & Spring BootFrameworkIntroduction to Spring  & Spring BootFramework
Introduction to Spring & Spring BootFramework
 
A REST API (also called a RESTful API or RESTful web API) is an application p...
A REST API (also called a RESTful API or RESTful web API) is an application p...A REST API (also called a RESTful API or RESTful web API) is an application p...
A REST API (also called a RESTful API or RESTful web API) is an application p...
 
SOA and Monolith Architecture - Micro Services.pptx
SOA and Monolith Architecture - Micro Services.pptxSOA and Monolith Architecture - Micro Services.pptx
SOA and Monolith Architecture - Micro Services.pptx
 
Application Layer.pptx
Application Layer.pptxApplication Layer.pptx
Application Layer.pptx
 
Connect to NoSQL Database using Node JS.pptx
Connect to NoSQL Database using Node JS.pptxConnect to NoSQL Database using Node JS.pptx
Connect to NoSQL Database using Node JS.pptx
 
Node_basics.pptx
Node_basics.pptxNode_basics.pptx
Node_basics.pptx
 
Navigation Bar.pptx
Navigation Bar.pptxNavigation Bar.pptx
Navigation Bar.pptx
 
Bootstarp installation.pptx
Bootstarp installation.pptxBootstarp installation.pptx
Bootstarp installation.pptx
 
nested_Object as Parameter & Recursion_Later_commamd.pptx
nested_Object as Parameter  & Recursion_Later_commamd.pptxnested_Object as Parameter  & Recursion_Later_commamd.pptx
nested_Object as Parameter & Recursion_Later_commamd.pptx
 
Chapter 3.pdf
Chapter 3.pdfChapter 3.pdf
Chapter 3.pdf
 
Introduction to Social Media and Social Networks.pdf
Introduction to Social Media and Social Networks.pdfIntroduction to Social Media and Social Networks.pdf
Introduction to Social Media and Social Networks.pdf
 
Dropdown Menu or Combo List.pdf
Dropdown Menu or Combo List.pdfDropdown Menu or Combo List.pdf
Dropdown Menu or Combo List.pdf
 
div tag.pdf
div tag.pdfdiv tag.pdf
div tag.pdf
 
Dimensions of elements.pdf
Dimensions of elements.pdfDimensions of elements.pdf
Dimensions of elements.pdf
 
CSS Positioning Elements.pdf
CSS Positioning Elements.pdfCSS Positioning Elements.pdf
CSS Positioning Elements.pdf
 
Random number generation_upload.pdf
Random number generation_upload.pdfRandom number generation_upload.pdf
Random number generation_upload.pdf
 
JavaScript_introduction_upload.pdf
JavaScript_introduction_upload.pdfJavaScript_introduction_upload.pdf
JavaScript_introduction_upload.pdf
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Application layer : DNS
Application layer : DNSApplication layer : DNS
Application layer : DNS
 
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
 

Recently uploaded

AWS-Architecture-Icons-Deck_For-Dark-BG_04282023.pptx
AWS-Architecture-Icons-Deck_For-Dark-BG_04282023.pptxAWS-Architecture-Icons-Deck_For-Dark-BG_04282023.pptx
AWS-Architecture-Icons-Deck_For-Dark-BG_04282023.pptx
kriangkb1
 
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdfOCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
Muanisa Waras
 
Press Tool and It's Primary Components.pdf
Press Tool and It's Primary Components.pdfPress Tool and It's Primary Components.pdf
Press Tool and It's Primary Components.pdf
Tool and Die Tech
 
一比一原版(csulb文凭证书)美国加州州立大学长滩分校毕业证如何办理
一比一原版(csulb文凭证书)美国加州州立大学长滩分校毕业证如何办理一比一原版(csulb文凭证书)美国加州州立大学长滩分校毕业证如何办理
一比一原版(csulb文凭证书)美国加州州立大学长滩分校毕业证如何办理
feoud
 
Net Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK EmpireNet Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK Empire
Global Network for Zero
 
Research Experience during my undergraduate study.pptx
Research Experience during my undergraduate study.pptxResearch Experience during my undergraduate study.pptx
Research Experience during my undergraduate study.pptx
gxz1691543945
 
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model SafeBangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
bookhotbebes1
 
PMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOCPMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOC
itssurajthakur06
 
( Call  ) Girls Vasant Kunj Just 9873940964 High Class Model Shneha Patil
( Call  ) Girls Vasant Kunj Just 9873940964 High Class Model Shneha Patil( Call  ) Girls Vasant Kunj Just 9873940964 High Class Model Shneha Patil
( Call  ) Girls Vasant Kunj Just 9873940964 High Class Model Shneha Patil
kinni singh$A17
 
Lecture Notes for computer networks subject
Lecture Notes for computer networks subjectLecture Notes for computer networks subject
Lecture Notes for computer networks subject
ssuseree48e0
 
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
IJAEMSJORNAL
 
@Call @Girls Rajkot 0000000000 Priya Sharma Beautiful And Cute Girl any Time
@Call @Girls Rajkot  0000000000 Priya Sharma Beautiful And Cute Girl any Time@Call @Girls Rajkot  0000000000 Priya Sharma Beautiful And Cute Girl any Time
@Call @Girls Rajkot 0000000000 Priya Sharma Beautiful And Cute Girl any Time
mishratanu639
 
Vernier Caliper and How to use Vernier Caliper.ppsx
Vernier Caliper and How to use Vernier Caliper.ppsxVernier Caliper and How to use Vernier Caliper.ppsx
Vernier Caliper and How to use Vernier Caliper.ppsx
Tool and Die Tech
 
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
VICTOR MAESTRE RAMIREZ
 
Social media management system project report.pdf
Social media management system project report.pdfSocial media management system project report.pdf
Social media management system project report.pdf
Kamal Acharya
 
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionUnderstanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Bert Blevins
 
Response & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITHResponse & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITH
IIIT Hyderabad
 
PCA-solved problems.pptx helpful for ml .
PCA-solved problems.pptx helpful for ml .PCA-solved problems.pptx helpful for ml .
PCA-solved problems.pptx helpful for ml .
Sravani477269
 
( Call  ) Girls Noida 9873940964 High Profile
( Call  ) Girls Noida 9873940964 High Profile( Call  ) Girls Noida 9873940964 High Profile
( Call  ) Girls Noida 9873940964 High Profile
butwhat24
 

Recently uploaded (20)

AWS-Architecture-Icons-Deck_For-Dark-BG_04282023.pptx
AWS-Architecture-Icons-Deck_For-Dark-BG_04282023.pptxAWS-Architecture-Icons-Deck_For-Dark-BG_04282023.pptx
AWS-Architecture-Icons-Deck_For-Dark-BG_04282023.pptx
 
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdfOCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
OCS Training - Rig Equipment Inspection - Advanced 5 Days_IADC.pdf
 
Press Tool and It's Primary Components.pdf
Press Tool and It's Primary Components.pdfPress Tool and It's Primary Components.pdf
Press Tool and It's Primary Components.pdf
 
一比一原版(csulb文凭证书)美国加州州立大学长滩分校毕业证如何办理
一比一原版(csulb文凭证书)美国加州州立大学长滩分校毕业证如何办理一比一原版(csulb文凭证书)美国加州州立大学长滩分校毕业证如何办理
一比一原版(csulb文凭证书)美国加州州立大学长滩分校毕业证如何办理
 
catalyst-1200-1300-series-switchesbdm.pptx
catalyst-1200-1300-series-switchesbdm.pptxcatalyst-1200-1300-series-switchesbdm.pptx
catalyst-1200-1300-series-switchesbdm.pptx
 
Net Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK EmpireNet Zero Case Study: SRK House and SRK Empire
Net Zero Case Study: SRK House and SRK Empire
 
Research Experience during my undergraduate study.pptx
Research Experience during my undergraduate study.pptxResearch Experience during my undergraduate study.pptx
Research Experience during my undergraduate study.pptx
 
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model SafeBangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
Bangalore @ℂall @Girls ꧁❤ 0000000000 ❤꧂@ℂall @Girls Service Vip Top Model Safe
 
PMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOCPMSM-Motor-Control : A research about FOC
PMSM-Motor-Control : A research about FOC
 
( Call  ) Girls Vasant Kunj Just 9873940964 High Class Model Shneha Patil
( Call  ) Girls Vasant Kunj Just 9873940964 High Class Model Shneha Patil( Call  ) Girls Vasant Kunj Just 9873940964 High Class Model Shneha Patil
( Call  ) Girls Vasant Kunj Just 9873940964 High Class Model Shneha Patil
 
Lecture Notes for computer networks subject
Lecture Notes for computer networks subjectLecture Notes for computer networks subject
Lecture Notes for computer networks subject
 
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
 
@Call @Girls Rajkot 0000000000 Priya Sharma Beautiful And Cute Girl any Time
@Call @Girls Rajkot  0000000000 Priya Sharma Beautiful And Cute Girl any Time@Call @Girls Rajkot  0000000000 Priya Sharma Beautiful And Cute Girl any Time
@Call @Girls Rajkot 0000000000 Priya Sharma Beautiful And Cute Girl any Time
 
Vernier Caliper and How to use Vernier Caliper.ppsx
Vernier Caliper and How to use Vernier Caliper.ppsxVernier Caliper and How to use Vernier Caliper.ppsx
Vernier Caliper and How to use Vernier Caliper.ppsx
 
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
 
Social media management system project report.pdf
Social media management system project report.pdfSocial media management system project report.pdf
Social media management system project report.pdf
 
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionUnderstanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
 
Response & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITHResponse & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITH
 
PCA-solved problems.pptx helpful for ml .
PCA-solved problems.pptx helpful for ml .PCA-solved problems.pptx helpful for ml .
PCA-solved problems.pptx helpful for ml .
 
( Call  ) Girls Noida 9873940964 High Profile
( Call  ) Girls Noida 9873940964 High Profile( Call  ) Girls Noida 9873940964 High Profile
( Call  ) Girls Noida 9873940964 High Profile
 

Computer Networks : WWW , TELNET and SSH

  • 1. World Wide Web Dr.T.Abirami, Associate Professor , Department of IT, Kongu Engineering College,Perundurai
  • 2. World Wide Web • Web was first proposed by Tim Berners-Lee in 1989 at CERN†, the European Organization for Nuclear Research • Web is a repository of information is distributed all over the world and related documents are linked together • Web can be related to in the above statement: 1. distributed and two terms 2. linked. • Distribution allows the growth of the Web. Each web server in the world can add a new web page to the repository and announce it to all Internet users without overloading a few servers. • Linking allows one web page to refer to another web page stored in another server somewhere else in the world. The linking of web pages was achieved using a concept called hypertext, Dr.T.Abirami, Associate Professor , Department of IT, Kongu Engineering College,Perundurai
  • 3. Architecture the service provided is distributed over many locations called sites. Each site holds one or more web pages Dr.T.Abirami, Associate Professor , Department of IT, Kongu Engineering College,Perundurai
  • 4. Web Client (Browser) • display a web page • Each browser usually consists of three parts: 1. a controller, 2. client protocols, and 3. interpreters. Dr.T.Abirami, Associate Professor , Department of IT, Kongu Engineering College,Perundurai
  • 5. Web Server • The web page is stored at the server. • Each time a request arrives, the corresponding document is sent to the client. • To improve efficiency, servers normally store requested files in a cache in memory; memory is faster to access than a disk. Example • web servers include Apache and Microsoft Internet Information Server. Dr.T.Abirami, Associate Professor , Department of IT, Kongu Engineering College,Perundurai
  • 6. Uniform Resource Locator (URL) • A web page, as a file, needs to have a unique identifier to distinguish it from other web pages. • To define a web page, need four identifiers: 1. Protocol : to access the web page. HTTP (HyperText Transfer Protocol) and FTP (File Transfer Protocol). HTTP protocol is used for accessing the web page 2. Host: The host identifier can be the IP address of the server or the unique name given to the server. 3. Port: well-known port number is 80 4. Path: location and the name of the file in the underlying operating system. http://www.mhhe.com/compsci/forouzan/ defines the web page Dr.T.Abirami, Associate Professor , Department of IT, Kongu Engineering College,Perundurai
  • 7. Web Documents • Static Documents : fixed-content documents that are created and stored in a server. The client can get a copy of the document only. • dynamic document is created by a web server whenever a browser requests the document. When a request arrives, the web server runs an application program or a script that creates the dynamic document. • Active Documents : need a program or a script to be run at the client site. run a program that creates animated graphics on the screen or a program that interacts with the user. Dr.T.Abirami, Associate Professor , Department of IT, Kongu Engineering College,Perundurai
  • 8. TELNET Dr.T.Abirami, Associate Professor , Department of IT, Kongu Engineering College,Perundurai
  • 9. Telnet • It stands for the TELetype NETwork. • It helps in terminal emulation. • It allows Telnet clients to access the resources of the Telnet server. • It is used for managing files on the internet. • It is used for the initial setup of devices like switches. • The telnet command is a command that uses the Telnet protocol to communicate with a remote device or system. • Port number of telnet is 23. Dr.T.Abirami, Associate Professor , Department of IT, Kongu Engineering College,Perundurai
  • 10. Dr.T.Abirami, Associate Professor , Department of IT, Kongu Engineering College,Perundurai
  • 11. Local versus Remote Logging • When a user logs into a local system, it is called local logging. • when a user wants to access an application program or utility located on a remote machine, it performs remote logging. Here the TELNET client and server programs come into use. • The characters are sent to the TELNET client, which transforms the characters into a universal character set called Network Virtual Terminal (NVT) characters Dr.T.Abirami, Associate Professor , Department of IT, Kongu Engineering College,Perundurai
  • 12. Dr.T.Abirami, Associate Professor , Department of IT, Kongu Engineering College,Perundurai
  • 13. SECURE SHELL (SSH) Dr.T.Abirami, Associate Professor , Department of IT, Kongu Engineering College,Perundurai
  • 14. Secure Shell (SSH) • It is a secure application program that can be used today for several purposes such as remote logging and file transfer • it was originally designed to replace TELNET. • There are two versions of SSH: SSH-1 and SSH-2, Dr.T.Abirami, Associate Professor , Department of IT, Kongu Engineering College,Perundurai
  • 15. Components • SSH Transport-Layer Protocol (SSH-TRANS) • TCP is not a secured transport-layer protocol, SSH first uses a protocol that creates a secured channel on top of the TCP. • Privacy or confidentiality of the message exchanged • Data integrity, which means that it is guaranteed that the messages exchanged between the client and server are not changed by an intruder • Server authentication • Compression of the messages • SSH Authentication Protocol (SSH-AUTH) • is established between the client and the server and the server is authenticated for the client, • SSH Connection Protocol (SSH-CONN) • is established and both server and client are authenticated for each other Dr.T.Abirami, Associate Professor , Department of IT, Kongu Engineering College,Perundurai
  • 16. Applications • SSH for Remote Logging • SSH for File Transfer • Port Forwarding Dr.T.Abirami, Associate Professor , Department of IT, Kongu Engineering College,Perundurai