Thursday, September 10, 2009
group19_angels:http proxy server
Squid optimises the data flow between client and server to improve performance and caches frequently-used content to save bandwidth. Squid can also route content requests to servers in a wide variety of ways to build cache server hierarchies which optimise network throughput.
Group3_AMAK: Network protocol analysis
group17_the spark:introduction to FTP
FILE TRANSFER.
Transferring files from one system to another system is one of the biggest tasks in the networking environment.the large volume of data transfer in the internet today is due to the file transfer and the protocol that is responsible for this task of file transferring is File Transfer Protocol.
File transfer protocol is the standard mechanism provided by TCP\IP for copying and transferring the file from one host to another which seems to be simple and straightforward. FTP differs from other client server applications since it establishes 2 connections between hosts.
That is one connection for data transfer and other for control information.This separation of data and commands makes ftp more efficient.Control connection uses very simple rules for communications where only one command or data is transferred at a time.in data connection since it need to transfer different data types uses a bit complex procedure.
FTP uses two well known TCP ports:
PORT 21 is used for the control connection.
PORT 20 is used for data connection.
COMMUNICATION OVER CONTROL CONNECTION.
FTP uses same approach as SMPT to communicate by using 7 bit ASCII character which is very simple .Each command or response is only one short line and hence need not worry about the file format and file structure.
COMMUNICATION OVER DATA CONNECTION.
File transfer occurs over data connection under control of some set of commands which is sent over control connection.
File transfer in FTP means one of the three things i.e.
Retrieving the file -command used is RETR .
Storing a file-command used is STOR.
Listing of files or directories-command used is LIST .
The client has to define type of file ,data structure and transmission mode.
- File type includes ASCII FILE,EBCDIC file,IMAGE file.
- Data structure includes file structure,record structure and page structure.
- Transmission mode includes stream mode,block mode and compressed mode.
group17_the spark:http proxy server.
A proxy server is a server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, and caching service.
Proxy servers have two main purposes:
Improve Performance: Proxy servers can improve performance for groups of users. This is because it saves the results of all requests for a certain amount of time. Consider the case where both user X and user Y access the World Wide Web through a proxy server. First user X requests a certain Web page, which we'll call Page 1. Sometime later, user Y requests the same page. Instead of forwarding the request to the Web server where Page 1 resides, which can be a time-consuming operation, the proxy server simply returns the Page 1 that it already fetched for user X,hence this is a much faster operation. Real proxy servers support hundreds or thousands of users. The major online services such as America Online, MSN and Yahoo, for example, employ an array of proxy servers.
Filter Requests: Proxy servers can also be used to filter requests. For example, a company might use a proxy server to prevent its employees from accessing a specific set of Web sites.it may also commmunicate to daemon based or ICAP based anti virus software to provide security against virus and other malware by scanning incoming content in real time before it enters the network.
The HYPERTEXT TRANSFER PROTOCOL is used mainly to access data on the world wide web . the protocol tranfers datd in the form of plain text, hypertext , audio, video and so on. It is called the hypertext transfer protocol because it is used in an envirornment where there are rapid jumps from one document to another.During the HTTP connection,the IP address of the client machine is necessarily transmitted in order to get the information back. This allows a server to identify the source of the web request.
HTTP proxy servers interprets web access.
HTTP is a proxy server which acts as an middleman between your web browser and an end server.Instead of directly connecting to web page it connects to the proxy which forwards the request to end server. They support many programms browsers, download managers. They can be united into a chain and in a chain can be mixed with other types of proxy servers like SOCKS and CGI.
group17_the spark:understanding of computer networks
- Computer networks use a well defined mutually agreed set of rules and conventions known as protocols.
- They interact with one another who are authenticated and authorized.
- They allow source sharing preferabally in a predictable and controllable manner.
Resource sharing and communication are the two principle reasons of building and using computer networks.
Some of the most popular applications include email, web browser, digital libraries, video -on-demand, file transfer, video or audio conferencing, e-commerce, etc.
Computers in a network are interconnected through a transmission media through which the data can be shared.
Transmission media are classified into wire based and wireless media.
- Wired media includes fiber optic cables, twisted pair cable, coaxial cable etc
- wireless media includes bluetooth, infrared, terrestrial microwaves, communication satellites, cellular and pcs systems, wireless LANs etc
- In client-server computing, computer plays a major role known as server where the files, data in the form of web pages, documents, data base and resources are placed and the computers in this network are called clients and they receive data from the server.
- In peer-peer networks, all the computers play the same role and no computer acts as a centralised server.
Wednesday, September 9, 2009
group15_krazzy4:first weekly report on REMOTE LOGIN
In this post we are actually going to see how things work in remote login. For this consider two parties i> A host computer and
ii>A remote user.
The host computer is the computer that is to be accessed by a user who is remote to that system. When we relate to our prvious example the host computer is the computer that is placed in the cluster lab and 'X' is the remote user.
For remote login to work successfully three major components are required viz : A common software(eg team viewer),an internet connection and a secure desktop sharing network. The common software consists of two distinct programs which are :
1)The desktop sharing client that runs on the host computer and
2)A viewer program that allows the remote user to view the contents of the host.
The scheme works when both the host and the remote user are connected to the net and both use the same desktop sharing software. We have tried doing this using the Team Viewer software on the windows vista operating software. Through this software the host computer was able to hand over it's keyboard and mouse controls to the remote user. In order to do this the software must be run on the host computer first where it generates a partner id and password. In order for the remote user to access the host computer, it has to request the host computer for the partner id and the password. Thus we were able to control the host computer through a common software when both the host and the remote systems were connected to the internet.
Group18_Awesome4some: HTTP/FTP Proxy servers (introduction)
A proxy server is a server (a machine or a program) which is present between the user (client side) and the Internet. When a person requests for a particular web page, the request is passed on directly to the server and the requested page is located, retrieved and sent back to the requested computer. This is done by locating the surfer’s IP address, and then transferring back to the same IP address which had requested the web page. But with the introduction of proxy servers the request is intercepted by it and the request does not reach the real server. The proxy server acts as a regular server by saving caches of all previously downloaded websites. When a request sent to server is intercepted by the proxy server, it checks in its cache. If the page is found then it is sent back to the Ip which raised the request. If it is not found then, the proxy uses its own IP address and raises a request to the real server and then sends it to the requested terminal. This is useful in terms of retaining anonymity, to speed up the process of webpage retrieval and to filter requests. There are many types of Proxy servers like transparent proxy, anonymous proxy, distorting proxy, high anonymity proxy.
Http proxy server:
Hypertext Transfer Protocol (HTTP) is an application-level protocol used for retrieving inter-linked resources led to the establishment of the World Wide Web. HTTP is a request/response standard of a client (end user) and a server (web site). The client making an HTTP request—using a web browser, etc—is referred to as the user agent. The responding server—which stores or creates resources such as HTML files and images—is called the origin server.
HTTP proxy server is a proxy, allowing working on the Internet with HTTP and (not always) FTP protocols. It (as well as other proxy servers) can carry out caching of information downloaded from the Internet. HTTP proxy servers are the most prominently used.
Ftp Proxy server:
File Transfer Protocol (FTP) is a standard network protocol used to exchange and manipulate files over an Internet. FTP is also built on a client-server architecture and utilizes separate control and data connections between the client and server applications. FTP is also often used as an application component to automatically transfer files for program internal functions and can be used with user-based password authentication or with anonymous user access.
Ftp proxy is an application level gateway for FTP. It sits between a client and a server forwarding command and data streams supporting a subset of the file transfer protocol as described in RFC 959. Beside this basic function which makes the program useful on firewall or masqueraders it offers fixing the FTP server (e.g. for connections into a protected LAN) and proxy authentication.
Group11_dnaa:Protocol Stack and Addressing
International Standards Organization (ISO) developed OSI model as a first step towards international standardization of the protocols used in the various layers. The model is known as the ISO OSI Reference Model because it is related with connecting open system i.e. systems that are open for communication with other systems.
The OSI model includes seven layers:
A layer is a collection of conceptually similar functions that provide services to the layer above it and receives service from the layer below it. On each layer an instance provides services to the instances at the layer above and requests service from the layer below. For example, a layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that make up the contents of the path. Conceptually two instances at one layer are connected by a horizontal protocol connection on that layer.
Different layers of ISO OSI model are as follows:
1) Physical Layer describes the physical & electrical properties of the communications media.
e.g., voltage levels, data rates, max distances.
2) Data Link layer describes the logical organization of data bits transmitted on a particular
medium.
e.g., frame sequencing, error notification
3) Network Layer describes how a series of exchanges over various data links can deliver data across a network.
e.g., addressing and routing
4) Transport Layer describes the quality and nature of data delivery
e.g., how retransmissions are used to ensure delivery
5) Session layer describes the organization of large data sequences & manages
communication session.
e.g., coordinates requests/responses
6) Presentation Layer describes the form of data being transferred & ensures that it will be
readable by receiver.
e.g., floating point formats, data compression, encryption
7) Application Layer describes how applications will communicate
e.g., HTTP, FTP, Telnet, SMTP
Physical layer:
The physical layer defines the hardware implementation, mechanical, electrical and procedural interfaces and the physical communication channel which lies below the physical layer. At this layer information is placed on the physical medium. The Physical Layer will tell one device how to transmit to the medium, and another device how to receive from it. It is related with delivering raw bits over a communication channel. The design issues have to do with making sure that when one side sends a 1 bit, it is received as a 1 bit by the other side but not as a 0 bit. The physical layer performs services requested by the Data Link Layer.
The major functions and services performed by the Physical Layer:
- Definition of Hardware Specifications: The details of operation of cables, connectors wireless radio transceivers, network interface cards and other hardware devices are generally a function of the physical layer.
- Physical topology: establishment and termination of a connection to a communications media. It defines how devices are connected to devices to media. Devices can be connected by using mesh topology, star topology, ring topology or bus topology.
- Participation in the process whereby the communication resources are effectively shared among multiple users.
- Representation of bits: Conversion between the representation of digital data in user equipment and the corresponding signals transmitted over a communications channel. To be transmitted bits must be encoded into signals electrical or optical.
- Encoding and Signaling: The physical layer data consists of a stream of bits with no interpretation thus it is responsible for various encoding and signaling functions that transform the data from bits that reside within a computer or other device into signals that can be sent over the network.
- Date transmission rate: The transmission rate the no of bits sent each second is also defined by the physical layer.
- Transmission mode: The physical layer also defines the direction of transmission between two devices:simplex,half dupolex,full duplex.
Group1_Charisma:First weekly report of the project network protocol analysis
With this background we learnt about the usage of the protocol analyser tool wireshark.These are some of the commands whose syntaxes and functions were understood by us:-
capinfos - Prints information about capture files
dumpcap - Dump network traffic
editcap - Edit and/or translate the format of capture files
idl2wrs - CORBA IDL to Wireshark Plugin Generator
mergecap - Merges two or more capture files into one
rawshark - Dump and analyze raw libpcap data
text2pcap - Generate a capture file from an ASCII hexdump of packets
tshark - Dump and analyze network traffic
wireshark-filter - Wireshark filter syntax and reference
wireshark - Interactively dump and analyze network traffic
We look forward to learn more about wireshark by next week.
group9_dead lock:Transmission control protocol
TCP is one of the main protocols in TCP/IP networks. TCP/IP was developed in the 1970s and adopted as the protocol standard for ARPANET (the predecessor to the Internet) in 1983.Whereas the IP protocol deals only with packets. TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent.It is a popular network debugging tool used to intercept and display packets transmitted or received on a network.TCPdump is one of those tools that network and systems administrators alike reach for whenever they need to take a look at the actual network packets. The TCP/IP suite provides two transport methods and also ensures that data arrive intact and complete. It is used for everything that must arrive in perfect form.
The TCP transport layer 4 sends packets to IP network layer 3, which adds its own header and delivers a "datagram" to a data link layer 2 protocol such as Ethernet, ATM or SONET. Datagram is the unit of data or packet, transmitted in a TCP/IP network. Each datagram contains source and destination addresses and data.
group14_indigo:this week report of remote login
-->telnet host name
After connecting with the remote host, you will be prompted for your login id and your password just as if you were logging on via a terminal on that system.
For using the RLOGIN command for remote login the syntax is:
-->rlogin hostname
This command provides an advantage over the telnet command that is here in this command you can specify a username on the command line, ahttp://www.blogger.com/post-create.g?blogID=1013281640107267804nd can set it up so that when you rlogin to a host you will not be prompted for a password. Rlogin assumes you wish to login to an account with the same name as the account you are presently logged in as. If you wish to change this, use the -l option.
Rlogin: Remote Login in UNIX systems
rlogin (remote login) is a UNIX command that allows an authorized user to login to other UNIX machines (hosts) on a network and to interact as if the user were physically at the host computer. Once logged in to the host, the user can do anything that the host has given permission for, such as read, edit, or delete files.
Each remote machine may have a file named /etc/hosts.equiv containing a list of trusted hostnames with which it shares usernames. Users with the same username on both the local and remote machine may rlogin from the machines listed in the remote machine's /etc/hosts.equiv file without supplying a password. Individual users may set up a similar private equivalence list with the file .rhosts in their home directories. Each line in this file contains two names: a host- name and a username separated by a space. An entry in a remote user's .rhosts file permits the user named username who is logged into hostname to log in to the remote machine as the remote user without supplying a password. If the name of the local host is not found in the /etc/hosts.equiv file on the remote machine, and the local username and hostname are not found in the remote user's .rhosts file, then the remote machine will prompt for a password. Hostnames listed in /etc/hosts.equiv and .rhosts files must be the official hostnames listed in the hosts database; nicknames may not be used in either of these files. For security reasons, the .rhosts file must be owned by either the remote user or by root.
The remote terminal type is the same as your local terminal type (as given in your environment TERM variable). The terminal or window size is also copied to the remote system if the server supports the option, and changes in size are reflected as well. All echoing takes place at the remote site, so that (except for delays) the remote login is transparent. Flow control using
A secure version of rlogin (slogin) was combined with two other UNIX utility, ssh and scp, in the Secure Shell suite, an interface and protocol created to replace the earlier utilities.
group13_Avani:description of protocol stack
Brief description of layers of the OSI model
- it is the top layer of the OSI model.
- it is responsible for providing services to the user.
- provides a set of interfaces for sending and receiving applications to gain access to and use network services.
- it converts the data into a generic format for network transmission for outgoing messages and for incoming messages, it converts the data from the generic network format to a format that the receiving application can understand.
- it is also responsible for certain protocol conversions, data encryption/decryption or data compression and decompression.
- it manages user sessions and dialogues.
- controls establishment and termination of logic links between users.
- reports upper layer errors.
- it is also responsible for security and access control to session information(via session participant identification).
- it is responsible for the delivery of a message from one procees to another.
- manages the data flow between parties by segmenting long data streams into smaller data chunks.
- reaasembles chunks into their original sequence at the receiving end.
- provides acknowledgements for successful transmissions and requests resends for packets which arrive with errors.
- it determines how data is transferred between network devices.
- routes packets according to unique network device addresses.
- provides flow and congestion control to prevent network resource depletion.
- handles special data frames(packets) between the network layer and physical layer.
- at the receiving end, it packs the raw data from the physical layer into data frames for delivery to the network layer.
- at the sending end this layer handles conversion of data into raw formats that can be handled by the physical layer.
- it is the bottom layer of the OSI model.
- converts bits into electronic signals for outgoing messages and converts electronic signals into bits for incoming messages.
- it manages the interface between the network medium(coax, twisted pair etc) and computer.
Group20_dynamic networks:htp/ftp proxy servers
Now let us be familiar with certain terms used now and then,HTTP and FTP.Computer Networking involves communicating between the computers.So when we request a web-page a computer 'talks' to a web server through a web browser.They speak a language known as HTTP which stands forHyper Text Transfer Protocol.
For ex:
The browser says:
GET /http/1.0
Host:www.cricketnews.com
The server replies:
http/1.0 200 OK
Content-Type: text/html
{
the body of the page
}
Here we can see how the browser is communicating to the server. First the browser request's(GET /http/1.0) indicating that the browser wants to see the home page of the site and it is using 1.0HTTP protocol.The second line indicates the website of the requested page.In the first line of the server's reply (http/1.0 200 OK),indicates the server is also speaking version 1.0 and the request sent was successful and in the second line it is showing the content or type of data it is.
FTP refers to File Transfer Protocol which is an older protocol for moving files back and forth over the networks i.e actually file transfering and also its not a secured way of choice for senstive data.
Project Schedule
| Date | Group A project | Group B project |
| Sept 9 | Group 5, Group 6, Group 7 | - |
| Sept 16 | Group 11, Group 12, Group 16 | - |
| Sept 23 | Group 13, Group 14, Group 15 | - |
| Sept 30 | Group 17, Group 18 | Group 19 |
| Oct 7 | Group 20, Group 9 | Group 5 |
| Oct 14 | Group 19, Group 8 | Group 17 |
| Oct 21 | Group 10, Group 1 | Group 3 |
| Oct 28 | Group 2, Group 4 | Group 13 |
| Nov 4 | Group 3 | Group 11, Group 18 |
| Nov 11 | - | Group 15, Group 6, Group 10 |
| Nov 18 | - | Group 20, Group 9, Group 1 |
| Nov 25 | - | Group 14, Group 4, Group 8 |
| Dec 2 | - | Group 12, Group 7 |
| Dec 9 | - | Group 2, Group 16 |
Group16_QuadMasters:Remote Login
1. Software download
2. Internet connection
3. Secure desktop sharing network
For remote login to work, both the host computer and all remote users have to download and install the same desktop sharing software. Desktop sharing software typically includes two distinct programs:
1. The desktop sharing client that runs on the host computer
2. A viewer program that allows the remote user to view the contents of the host computer's desktop in a resizable window
Group8_Vintageboys:TCPdump
It allows us to view entire ethernet frame or other link layer and if required print the frame header. By default, tcp dump prints the packets at the IP layer.
TCPdump generally helps in solving a variety of problems and analysts say that the number of server based problems that could be solved by using TCPdump is limitless since it prints detailed information about network traffic, helps in debug denial and during service attacks. If a network is flooded and all other attempts to determine the source or destination of the traffic fail, tcpdump will show you the source address, destination address, and type of traffic involved.
Thursday, September 3, 2009
MKN_Folks...SOS Need Ur help!
Well, to say the least, I think Iam waaaaaaaay too short-sighted as well as did not foresee the avalance of information you folks would collect and post! Maybe under-estimated the energy and enthusiasm inherent in your present chronological age, dear students! I ADMIT :-) Tuesday, September 1, 2009
Group12_chaarMusafirs:how does internet works?
Group12_ChaarMusafirs : Protocol Stack and addressing
Linksys WRT45ABG
Nmap:

