Group20 Dynamic Networks


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Group20 Dynamic Networks

  1. 1. DYNAMIC NETWORKS <ul><li>HTTP & FTP PROXY SERVERS </li></ul><ul><li>Group 20: </li></ul><ul><li>AMEET G </li></ul><ul><li>BHUJANG R </li></ul><ul><li>KAUSHIK N </li></ul><ul><li>PRAMOD M </li></ul>
  2. 2. CONTENTS <ul><li>Introduction to proxy servers – Ameet G </li></ul><ul><li>(Slides 3 to 12) </li></ul><ul><li>FTP and FTP proxy servers – Pramod M </li></ul><ul><li>(Slides 13 to 23) </li></ul><ul><li>HTTP and HTTP proxy servers – BhujangR </li></ul><ul><li>(Slides 24 to 30) </li></ul><ul><li>Demo – Kaushik - AllegroSurf </li></ul>
  4. 4. WHAT IS PROXY SERVER?? <ul><li>The word proxy means &quot; to act on behalf of another &quot; and a proxy server acts on behalf of the user. </li></ul><ul><li>All requests from clients to the Internet go to the proxy server where it evaluates the request, and if allowed, re-establishes it on the outbound side to the Internet. </li></ul><ul><li>Both client and server think they are communicating with one another, but, in fact, are dealing only with the proxy. </li></ul>
  5. 5. Proxy server layout
  6. 6. How proxy server works?
  7. 7. Aims of proxy server <ul><li>Privacy – It hides the ip of the client and shows the ip of the proxy server. </li></ul><ul><li>Caching of requests. </li></ul><ul><li>Bypassing content blocks –Client can get around the blocked sites by admin. </li></ul><ul><li>Web browsing access. </li></ul><ul><li>Usage monitoring – The proxy detects the traffic occurring in it and monitor’s the clients. </li></ul>
  8. 8. Snippets <ul><li>Proxy Servers are in the format  where xxx is any numeric digit. They are in the form of an  IP  with a Port. </li></ul><ul><li>Also if your Internet Service Provider has blocked any sites like  Orkut  or MySpace you can bypass the firewall using proxy servers. </li></ul><ul><li>Proxy servers help hop over your local or wireless network restrictions. </li></ul>
  9. 9. Types of proxy servers (based on function) <ul><li>Cache proxy – Speed up internet access. </li></ul><ul><li>Web proxy – To connect user to server and use internet. </li></ul><ul><li>Anonymizing proxy – To spoof your ip address and surf. </li></ul><ul><li>Forced proxy – Force the user to go through proxy (used in companies). </li></ul><ul><li>Transparent & Non-transparent proxy. </li></ul>
  10. 10. Caching in case of dynamic-web pages <ul><li>Web pages maybe static or dynamic. </li></ul><ul><li>In case of dynamic pages we add headers which contain time and date of the page and re-request if necessary. </li></ul><ul><li>Another is add a max time in the header till which the page is valid and re-request the server. </li></ul>
  11. 11. Load Balancing <ul><li>Load balancing helps make networks more efficient by distributing the processing and traffic evenly across network, making sure no single device is overwhelmed. </li></ul><ul><li>• Increased scalability </li></ul><ul><li>• High performance </li></ul><ul><li>• High availability and disaster recovery </li></ul>
  12. 12. Disadvantage of using proxy! <ul><li>Proxy service lag sometimes behind the non- proxied services. </li></ul><ul><li>Proxy services may require different servers for each service. </li></ul><ul><li>Proxy services require certain modifications to be made on clients. </li></ul><ul><li>Proxy servers do not protect from protocol weakness. </li></ul>
  14. 14. WHAT IS FTP?? <ul><li>FTP refers to a network protocol responsible for transferring files from one computer to another over a TCP computer network or the Internet. </li></ul><ul><li>FTP helps users to upload web page files (simple text files, images, multi-media files, etc.) from their personal computers to the server. </li></ul><ul><li>A FTP is a client-server model type. </li></ul>2
  15. 15. AIMS of FTP <ul><li>The aim of FTP protocol is to: </li></ul><ul><li>Allow file sharing between remote machines thus promoting indirectly ‘remote login’. </li></ul><ul><li>Allow independence between client and server machine system files. </li></ul><ul><li>Enable efficient data transfer. </li></ul>
  16. 16. HOW DOES FTP WORK ? <ul><li>The File Transfer Protocol (FTP) is defined by the RFC959 based on the FTP Model as illustrated. </li></ul><ul><li>The FTP uses two TCP/IP connection channel, i.e., control connection and data connection between the User and the Server. </li></ul>
  17. 17. CONTROL & DATA CONNECTIONS <ul><li>The control connection is a full duplex communication path between Server and User for exchanging commands and replies . </li></ul><ul><li>The FTP uses the Telnet protocol for the control connection </li></ul><ul><li>Data connection is a full duplex communication link through which data (file) are transferred between Server and User on a specified type and mode. </li></ul><ul><li>The data connection is established for data </li></ul><ul><li>or file transfer on demand temporally </li></ul>
  18. 18. CONTINUED… <ul><li>There are two modes of operation namely Active mode and Passive mode. </li></ul><ul><li>FTP handles two types of data conversions and representations namely ASCII and Binary data. </li></ul><ul><li>FTP has a number of commands for transferring the files. </li></ul>
  19. 19. More about FTP…. <ul><li>Ftp uses port 20 for data and port 21 for control connections respectively. </li></ul><ul><li>It was implemented first in 1971 in MIT then defined in RFC141 now defined by RFC959. </li></ul><ul><li>FTP is an indirect use of network application. </li></ul><ul><li>Improved versions of FTP are FTPS, TFTP, SFTP, FXP. </li></ul><ul><li>Web browsers utilize FTP protocol to talk to FTP servers directly. A CERN-type proxy avoids the complexities of proxying the FTP protocol by talking to a Web browser via HTTP while talking to an FTP server via FTP. </li></ul>
  20. 20. Security concerns.. <ul><li>Filter the IP address of the unregistered users. </li></ul><ul><li>Use the alias technique to prevent login by others. </li></ul>
  21. 21. FTP servers <ul><li>Fig- Reverse FTP proxy. </li></ul><ul><li>FTP servers host the files which are necessary for clients. </li></ul><ul><li>Clients are those who request for files by their identity to the server through application programs installed in them. </li></ul><ul><li>Now browsers connect to servers via URL’s also. </li></ul>
  22. 22. FTP via proxy servers <ul><li>The client sends authentication information first to the proxy, tell the ftp server name and then the proxy connects the FTP server and resends the login information to the FTP server. </li></ul><ul><li>Another way is the CERN server talking both the languages of http to client and ftp to the server. </li></ul>
  23. 23. Disadvantages of FTP <ul><li>Passwords and file contents are sent in clear text over the Internet. </li></ul><ul><li>It is hard to filter FTP traffic using a firewall since the data connection is made to an arbitrary port on a client computer. </li></ul><ul><li>It is possible to tell a server to send data to an arbitrary port of a third computer. </li></ul><ul><li>Despite these disadvantages, the FTP is and will likely remain one of the most popular protocols on the Internet. </li></ul>
  24. 24. HYPER TEXT TRANSFER PROTOCOL (HTTP) <ul><li>HTTP – A medium of communication between a client and server for mutual exchange of resources. </li></ul><ul><li>Versions – HTTP 1.0 </li></ul><ul><li>HTTP 1.1 </li></ul><ul><li>HTTP deals with the transfer of data contained in files along with resources* to and from the server and client. </li></ul><ul><li>HTTP Client – Web Browser </li></ul><ul><li>HTTP Server – Web Server </li></ul><ul><li>Standard Port - 80 </li></ul>
  25. 25. Like the FTP model the HTTP also follows the client-server model. The HTTP client requests a method to be catered to and the HTTP server replies with the resources , requested. Once this single cycle is completed the process comes to an end. The format of request and response messages are similar and comprise of : 1)Initial Line 2)Header Line/s 3)Blank Line 4)Message Body
  26. 26. CONTINUED <ul><li>Initial Request Line - The request usually comprises of the GET method (Get a resource). </li></ul><ul><li>It comprises of the path to the URL or the request URI followed by the HTTP version x.x </li></ul><ul><li>It is also called as the status line. </li></ul><ul><li>Header Line – The header contains more information about the request and response ie the object being sent in the message body. </li></ul><ul><li>Message Body – Comprises of the data requested for transfer or a suitable message. </li></ul>
  27. 27. HTTP 1.1 <ul><li>HTTP 1.1 is an upgrade to 1.0 </li></ul><ul><li>Some of the upgraded features </li></ul><ul><li>(1) Faster in terms of response time. </li></ul><ul><li>(2) Reliable. </li></ul><ul><li>(3) 100 continue response. </li></ul>
  28. 28. HTTP PROXY SERVER <ul><li>Deals about the proxy settings for a HTTP protocol. </li></ul><ul><li>Not realized at the operating system level. </li></ul><ul><li>Processes have to be manipulated to employ the principles of proxy. </li></ul>
  29. 29. GOALS <ul><li>A proxy server designed to handle HTTP protocols are called HTTP PROXY SERVERS </li></ul><ul><li>The meta data involved in the tranfer of HTML pages are handled. </li></ul><ul><li>Step up in the speed of transmission. </li></ul><ul><li>Authentication via SSL methods. </li></ul><ul><li>Reduces redundancy in data transmission </li></ul>
  30. 30. BUILDING PROXY SERVERS <ul><li>Multithreaded proxy servers are by far the latest form of a proxy server. </li></ul><ul><li>Question ? What are/is the function of a proxy server. </li></ul><ul><li>~END~ </li></ul>
  31. 31. THANK YOU
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.