SlideShare a Scribd company logo
Introduction
Master Class 5
Internet infrastructures & Technologies :
Internet Systems & applications II
Josep Bardallo 2012
230 / 10 / 2012Josep Bardallo
Services used in Internet (application layer)
330 / 10 / 2012Josep Bardallo
Web Server. Definition
 Webserver: A computer that deliver content in Internet.
 The primary function of a web server is to deliver web pages on the
request to clients using the Hypertext Transfer Protocol (HTTP).
430 / 10 / 2012Josep Bardallo
Web Servers. Elements
 The Web server includes the hardware, operating system, Web
server software, TCP/IP protocols and site content (Web pages,
images and other files).
 A user agent (web browser), initiates communication by making a
request for a specific resource using HTTP and the server responds
with the content of that resource or an error message if unable to do
so.
 Web servers are not only on Internet. HTTP server software is
commonly built into hardware to provide a control panel for
configuring the device from any Web browser, or for Intranets.
530 / 10 / 2012Josep Bardallo
Web Servers in the world by domain (Oct. 2012)
630 / 10 / 2012Josep Bardallo
Web Servers Architecture: 3 Tier Layer
730 / 10 / 2012Josep Bardallo
Typical architectures: Standard services in a company
830 / 10 / 2012Josep Bardallo
Typical architectures: Complex Web environment.
Sample 1 (Real Case)
930 / 10 / 2012Josep Bardallo
Typical architectures: Complex Web environment.
Sample 2 (Real Case). Car selling
1030 / 10 / 2012Josep Bardallo
Typical architectures: Complex Web environment.
Sample 3 (Real Case). City Council
1130 / 10 / 2012Josep Bardallo
Typical architectures: Complex Web environment.
Sample 3 (Real Case). City Council
1230 / 10 / 2012Josep Bardallo
Typical architectures: Complex Web environment.
Sample 3 (Real Case). City Council
1330 / 10 / 2012Josep Bardallo
Web Servers. Top 500 sites
http://www.alexa.com/topsites
1430 / 10 / 2012Josep Bardallo
Number of servers of Top 100 (estimated and
growing)
 Google: estimated more than 900.000 servers
 Amazon: 500.000+ (322.000+ Virginia, 1.600 in Sao Paulo in 25
racks)
 Microsoft 300.000+ servers
 Facebook: 180.000+
 QVH: 120.000+ servers
 Softlayer, Rackspace, Akamai, Yahoo: 100.000+ servers
 Intel, 1&1, Ebay, GoDaddy: 70.000+ servers
 Verizon, Time Warner: 30.000+ servers
1530 / 10 / 2012Josep Bardallo
Web Servers Technology
1630 / 10 / 2012Josep Bardallo
Web Servers Technology
1730 / 10 / 2012Josep Bardallo
User Agent: Operating Systems in Internet
1830 / 10 / 2012Josep Bardallo
User Agent: Web Browsers in Internet
1930 / 10 / 2012Josep Bardallo
User Agent: Web Browsers in Internet. Trends
2030 / 10 / 2012Josep Bardallo
User Agent: Web Browsers in Internet. By Country
2130 / 10 / 2012Josep Bardallo
Secure Servers (SSL)
 Secure Sockets layer (SSL) is a form of protocol, used by e-
commerce sites, on-line banking and financial services to secure
communications by encrypting the data transmitted between two
points over Internet
 When the user enters a site with SSL certificate, they public key of
the site certificate is received by the browser and used to encrypt
the submitted information. The data can only be decrypted with the
key issued to the certificated site, assuring it will be readable only
by the internet intended recipient.
2230 / 10 / 2012Josep Bardallo
Email
 Electronic mail, or e-mail, is a method of exchanging digital
messages from an author to one or more recipients
2330 / 10 / 2012Josep Bardallo
Email: Elements
 Email Client, SMTP Server (MTA), POP Server
2430 / 10 / 2012Josep Bardallo
Email: Workflow
2530 / 10 / 2012Josep Bardallo
MTA Vendors
2630 / 10 / 2012Josep Bardallo
Email: Some numbers
2730 / 10 / 2012Josep Bardallo
Email: Some numbers
2830 / 10 / 2012Josep Bardallo
Email: SPAM
2930 / 10 / 2012Josep Bardallo
Internet Video & Images
3030 / 10 / 2012Josep Bardallo
Storage in Internet
3123 / 10 / 2012Josep Bardallo
Bibliography
 http://w3techs.com/technologies/cross/web_server/ranking
 http://gigaom.com/cleantech/facebooks-number-of-servers-soar-to-an-estimated-180k/
 http://news.netcraft.com/archives/2012/07/03/july-2012-web-server-survey.html
 http://www.radicati.com/wp/wp-content/uploads/2011/05/Email-Statistics-Report-2011-2015-Executive-
Summary.pdf
 http://www.clickz.com/type/news/category/stats
 http://www.symantec.com/theme.jsp?themeid=state_of_spam
 http://www.mailradar.com/
 http://www.w3counter.com/globalstats.php?year=2012&month=9
 http://marketshare.hitslink.com/
 http://www.wired.com/wiredenterprise/2012/03/amazon-ec2/

More Related Content

Similar to M5 internet systems & applications ii

DWX2018 IoT lecture
DWX2018 IoT lectureDWX2018 IoT lecture
DWX2018 IoT lecture
Alon Fliess
 
Llunitebe2018 rdmi in practice
Llunitebe2018 rdmi in practiceLlunitebe2018 rdmi in practice
Llunitebe2018 rdmi in practice
Kenny Buntinx
 
Importance of APIs in the Internet of Things
Importance of APIs in the Internet of ThingsImportance of APIs in the Internet of Things
Importance of APIs in the Internet of Things
Nordic APIs
 
WebRTC Tutorial by Dean Bubley of Disruptive Analysis & Tim Panton of Westhaw...
WebRTC Tutorial by Dean Bubley of Disruptive Analysis & Tim Panton of Westhaw...WebRTC Tutorial by Dean Bubley of Disruptive Analysis & Tim Panton of Westhaw...
WebRTC Tutorial by Dean Bubley of Disruptive Analysis & Tim Panton of Westhaw...
Dean Bubley
 
BSAD 104 Navigating The Internet
BSAD 104 Navigating The InternetBSAD 104 Navigating The Internet
BSAD 104 Navigating The Internetmsdenee
 
DevCon5 (July 2014) - Acision SDK
DevCon5 (July 2014) - Acision SDKDevCon5 (July 2014) - Acision SDK
DevCon5 (July 2014) - Acision SDK
Crocodile WebRTC SDK and Cloud Signalling Network
 
KoprowskiT-Difinify2017-SQL_ServerBackup_In_The_Cloud
KoprowskiT-Difinify2017-SQL_ServerBackup_In_The_CloudKoprowskiT-Difinify2017-SQL_ServerBackup_In_The_Cloud
KoprowskiT-Difinify2017-SQL_ServerBackup_In_The_Cloud
Tobias Koprowski
 
WebRTC - On Standards, Identity and Telco Strategy
WebRTC - On Standards, Identity and Telco StrategyWebRTC - On Standards, Identity and Telco Strategy
WebRTC - On Standards, Identity and Telco Strategy
Jose de Castro
 
SharePoint in the Extranet Joel Oleson
SharePoint in the Extranet Joel OlesonSharePoint in the Extranet Joel Oleson
SharePoint in the Extranet Joel Olesonwebhostingguy
 
Internet of Things and Big Data
Internet of Things and Big DataInternet of Things and Big Data
Internet of Things and Big Data
Swiss Data Forum Swiss Data Forum
 
Your App is been deployed behind the Firewall! Now What?
Your App is been deployed behind the Firewall! Now What?Your App is been deployed behind the Firewall! Now What?
Your App is been deployed behind the Firewall! Now What?
Dennis Reumer
 
Moving to the cloud azure, office365, and intune - concurrency
Moving to the cloud   azure, office365, and intune - concurrencyMoving to the cloud   azure, office365, and intune - concurrency
Moving to the cloud azure, office365, and intune - concurrencyConcurrency, Inc.
 
Maker of Things - the open IoT cloud for makers chapter.
Maker of Things - the open IoT cloud for makers chapter.Maker of Things - the open IoT cloud for makers chapter.
Maker of Things - the open IoT cloud for makers chapter.
Jollen Chen
 
Unit5 presentation of computer bussiness interface
Unit5 presentation of computer bussiness interfaceUnit5 presentation of computer bussiness interface
Unit5 presentation of computer bussiness interface
dharmikmangukiya2
 
SharePoint 2010 Global Deployment
SharePoint 2010 Global DeploymentSharePoint 2010 Global Deployment
SharePoint 2010 Global Deployment
Joel Oleson
 
tado° Makes Your Home Environment Smart with InfluxDB
tado° Makes Your Home Environment Smart with InfluxDBtado° Makes Your Home Environment Smart with InfluxDB
tado° Makes Your Home Environment Smart with InfluxDB
InfluxData
 
Pentesting Android Apps
Pentesting Android AppsPentesting Android Apps
Pentesting Android Apps
Abdelhamid Limami
 
Service Oriented Architecture Updated Luqman
Service Oriented Architecture Updated  LuqmanService Oriented Architecture Updated  Luqman
Service Oriented Architecture Updated Luqmanguesteb791b
 
Bsad 104 navigating the internet
Bsad 104 navigating the internetBsad 104 navigating the internet
Bsad 104 navigating the internetmsdenee
 

Similar to M5 internet systems & applications ii (20)

DWX2018 IoT lecture
DWX2018 IoT lectureDWX2018 IoT lecture
DWX2018 IoT lecture
 
Llunitebe2018 rdmi in practice
Llunitebe2018 rdmi in practiceLlunitebe2018 rdmi in practice
Llunitebe2018 rdmi in practice
 
Importance of APIs in the Internet of Things
Importance of APIs in the Internet of ThingsImportance of APIs in the Internet of Things
Importance of APIs in the Internet of Things
 
WebRTC Tutorial by Dean Bubley of Disruptive Analysis & Tim Panton of Westhaw...
WebRTC Tutorial by Dean Bubley of Disruptive Analysis & Tim Panton of Westhaw...WebRTC Tutorial by Dean Bubley of Disruptive Analysis & Tim Panton of Westhaw...
WebRTC Tutorial by Dean Bubley of Disruptive Analysis & Tim Panton of Westhaw...
 
BSAD 104 Navigating The Internet
BSAD 104 Navigating The InternetBSAD 104 Navigating The Internet
BSAD 104 Navigating The Internet
 
DevCon5 (July 2014) - Acision SDK
DevCon5 (July 2014) - Acision SDKDevCon5 (July 2014) - Acision SDK
DevCon5 (July 2014) - Acision SDK
 
KoprowskiT-Difinify2017-SQL_ServerBackup_In_The_Cloud
KoprowskiT-Difinify2017-SQL_ServerBackup_In_The_CloudKoprowskiT-Difinify2017-SQL_ServerBackup_In_The_Cloud
KoprowskiT-Difinify2017-SQL_ServerBackup_In_The_Cloud
 
WebRTC - On Standards, Identity and Telco Strategy
WebRTC - On Standards, Identity and Telco StrategyWebRTC - On Standards, Identity and Telco Strategy
WebRTC - On Standards, Identity and Telco Strategy
 
SharePoint in the Extranet Joel Oleson
SharePoint in the Extranet Joel OlesonSharePoint in the Extranet Joel Oleson
SharePoint in the Extranet Joel Oleson
 
Internet of Things and Big Data
Internet of Things and Big DataInternet of Things and Big Data
Internet of Things and Big Data
 
Your App is been deployed behind the Firewall! Now What?
Your App is been deployed behind the Firewall! Now What?Your App is been deployed behind the Firewall! Now What?
Your App is been deployed behind the Firewall! Now What?
 
Moving to the cloud azure, office365, and intune - concurrency
Moving to the cloud   azure, office365, and intune - concurrencyMoving to the cloud   azure, office365, and intune - concurrency
Moving to the cloud azure, office365, and intune - concurrency
 
Maker of Things - the open IoT cloud for makers chapter.
Maker of Things - the open IoT cloud for makers chapter.Maker of Things - the open IoT cloud for makers chapter.
Maker of Things - the open IoT cloud for makers chapter.
 
Unit5 presentation of computer bussiness interface
Unit5 presentation of computer bussiness interfaceUnit5 presentation of computer bussiness interface
Unit5 presentation of computer bussiness interface
 
SharePoint 2010 Global Deployment
SharePoint 2010 Global DeploymentSharePoint 2010 Global Deployment
SharePoint 2010 Global Deployment
 
Basic Computer Skills
Basic Computer SkillsBasic Computer Skills
Basic Computer Skills
 
tado° Makes Your Home Environment Smart with InfluxDB
tado° Makes Your Home Environment Smart with InfluxDBtado° Makes Your Home Environment Smart with InfluxDB
tado° Makes Your Home Environment Smart with InfluxDB
 
Pentesting Android Apps
Pentesting Android AppsPentesting Android Apps
Pentesting Android Apps
 
Service Oriented Architecture Updated Luqman
Service Oriented Architecture Updated  LuqmanService Oriented Architecture Updated  Luqman
Service Oriented Architecture Updated Luqman
 
Bsad 104 navigating the internet
Bsad 104 navigating the internetBsad 104 navigating the internet
Bsad 104 navigating the internet
 

More from Josep Bardallo

M8 privacy & regulatory in internet
M8 privacy & regulatory in internetM8 privacy & regulatory in internet
M8 privacy & regulatory in internetJosep Bardallo
 
M7 internet security
M7 internet securityM7 internet security
M7 internet security
Josep Bardallo
 
M1 network types & internet
M1   network types & internetM1   network types & internet
M1 network types & internetJosep Bardallo
 
S4 public or private datacenter
S4 public or private datacenterS4 public or private datacenter
S4 public or private datacenterJosep Bardallo
 
S1 internet, secure place for business
S1   internet, secure place for businessS1   internet, secure place for business
S1 internet, secure place for businessJosep Bardallo
 
Securima ti ca 2013 - seguridad en la nube
Securima ti ca 2013 - seguridad en la nubeSecurima ti ca 2013 - seguridad en la nube
Securima ti ca 2013 - seguridad en la nubeJosep Bardallo
 
SVT CloudJacket Service
SVT CloudJacket ServiceSVT CloudJacket Service
SVT CloudJacket ServiceJosep Bardallo
 
SVT. innovacion y crecimiento con Cloud 2013
SVT. innovacion y crecimiento con Cloud 2013SVT. innovacion y crecimiento con Cloud 2013
SVT. innovacion y crecimiento con Cloud 2013Josep Bardallo
 
Ahorro De Costes Con Esso. Best Practices
Ahorro De Costes Con Esso. Best PracticesAhorro De Costes Con Esso. Best Practices
Ahorro De Costes Con Esso. Best Practices
Josep Bardallo
 
SSO ROI
SSO ROISSO ROI
ITIL v3 Problem Management
ITIL v3 Problem ManagementITIL v3 Problem Management
ITIL v3 Problem Management
Josep Bardallo
 
ITIL - IAM (Access Management)
ITIL - IAM (Access Management)ITIL - IAM (Access Management)
ITIL - IAM (Access Management)
Josep Bardallo
 

More from Josep Bardallo (13)

M8 privacy & regulatory in internet
M8 privacy & regulatory in internetM8 privacy & regulatory in internet
M8 privacy & regulatory in internet
 
M7 internet security
M7 internet securityM7 internet security
M7 internet security
 
M6 cloud computing
M6 cloud computingM6 cloud computing
M6 cloud computing
 
M1 network types & internet
M1   network types & internetM1   network types & internet
M1 network types & internet
 
S4 public or private datacenter
S4 public or private datacenterS4 public or private datacenter
S4 public or private datacenter
 
S1 internet, secure place for business
S1   internet, secure place for businessS1   internet, secure place for business
S1 internet, secure place for business
 
Securima ti ca 2013 - seguridad en la nube
Securima ti ca 2013 - seguridad en la nubeSecurima ti ca 2013 - seguridad en la nube
Securima ti ca 2013 - seguridad en la nube
 
SVT CloudJacket Service
SVT CloudJacket ServiceSVT CloudJacket Service
SVT CloudJacket Service
 
SVT. innovacion y crecimiento con Cloud 2013
SVT. innovacion y crecimiento con Cloud 2013SVT. innovacion y crecimiento con Cloud 2013
SVT. innovacion y crecimiento con Cloud 2013
 
Ahorro De Costes Con Esso. Best Practices
Ahorro De Costes Con Esso. Best PracticesAhorro De Costes Con Esso. Best Practices
Ahorro De Costes Con Esso. Best Practices
 
SSO ROI
SSO ROISSO ROI
SSO ROI
 
ITIL v3 Problem Management
ITIL v3 Problem ManagementITIL v3 Problem Management
ITIL v3 Problem Management
 
ITIL - IAM (Access Management)
ITIL - IAM (Access Management)ITIL - IAM (Access Management)
ITIL - IAM (Access Management)
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 

M5 internet systems & applications ii

  • 1. Introduction Master Class 5 Internet infrastructures & Technologies : Internet Systems & applications II Josep Bardallo 2012
  • 2. 230 / 10 / 2012Josep Bardallo Services used in Internet (application layer)
  • 3. 330 / 10 / 2012Josep Bardallo Web Server. Definition  Webserver: A computer that deliver content in Internet.  The primary function of a web server is to deliver web pages on the request to clients using the Hypertext Transfer Protocol (HTTP).
  • 4. 430 / 10 / 2012Josep Bardallo Web Servers. Elements  The Web server includes the hardware, operating system, Web server software, TCP/IP protocols and site content (Web pages, images and other files).  A user agent (web browser), initiates communication by making a request for a specific resource using HTTP and the server responds with the content of that resource or an error message if unable to do so.  Web servers are not only on Internet. HTTP server software is commonly built into hardware to provide a control panel for configuring the device from any Web browser, or for Intranets.
  • 5. 530 / 10 / 2012Josep Bardallo Web Servers in the world by domain (Oct. 2012)
  • 6. 630 / 10 / 2012Josep Bardallo Web Servers Architecture: 3 Tier Layer
  • 7. 730 / 10 / 2012Josep Bardallo Typical architectures: Standard services in a company
  • 8. 830 / 10 / 2012Josep Bardallo Typical architectures: Complex Web environment. Sample 1 (Real Case)
  • 9. 930 / 10 / 2012Josep Bardallo Typical architectures: Complex Web environment. Sample 2 (Real Case). Car selling
  • 10. 1030 / 10 / 2012Josep Bardallo Typical architectures: Complex Web environment. Sample 3 (Real Case). City Council
  • 11. 1130 / 10 / 2012Josep Bardallo Typical architectures: Complex Web environment. Sample 3 (Real Case). City Council
  • 12. 1230 / 10 / 2012Josep Bardallo Typical architectures: Complex Web environment. Sample 3 (Real Case). City Council
  • 13. 1330 / 10 / 2012Josep Bardallo Web Servers. Top 500 sites http://www.alexa.com/topsites
  • 14. 1430 / 10 / 2012Josep Bardallo Number of servers of Top 100 (estimated and growing)  Google: estimated more than 900.000 servers  Amazon: 500.000+ (322.000+ Virginia, 1.600 in Sao Paulo in 25 racks)  Microsoft 300.000+ servers  Facebook: 180.000+  QVH: 120.000+ servers  Softlayer, Rackspace, Akamai, Yahoo: 100.000+ servers  Intel, 1&1, Ebay, GoDaddy: 70.000+ servers  Verizon, Time Warner: 30.000+ servers
  • 15. 1530 / 10 / 2012Josep Bardallo Web Servers Technology
  • 16. 1630 / 10 / 2012Josep Bardallo Web Servers Technology
  • 17. 1730 / 10 / 2012Josep Bardallo User Agent: Operating Systems in Internet
  • 18. 1830 / 10 / 2012Josep Bardallo User Agent: Web Browsers in Internet
  • 19. 1930 / 10 / 2012Josep Bardallo User Agent: Web Browsers in Internet. Trends
  • 20. 2030 / 10 / 2012Josep Bardallo User Agent: Web Browsers in Internet. By Country
  • 21. 2130 / 10 / 2012Josep Bardallo Secure Servers (SSL)  Secure Sockets layer (SSL) is a form of protocol, used by e- commerce sites, on-line banking and financial services to secure communications by encrypting the data transmitted between two points over Internet  When the user enters a site with SSL certificate, they public key of the site certificate is received by the browser and used to encrypt the submitted information. The data can only be decrypted with the key issued to the certificated site, assuring it will be readable only by the internet intended recipient.
  • 22. 2230 / 10 / 2012Josep Bardallo Email  Electronic mail, or e-mail, is a method of exchanging digital messages from an author to one or more recipients
  • 23. 2330 / 10 / 2012Josep Bardallo Email: Elements  Email Client, SMTP Server (MTA), POP Server
  • 24. 2430 / 10 / 2012Josep Bardallo Email: Workflow
  • 25. 2530 / 10 / 2012Josep Bardallo MTA Vendors
  • 26. 2630 / 10 / 2012Josep Bardallo Email: Some numbers
  • 27. 2730 / 10 / 2012Josep Bardallo Email: Some numbers
  • 28. 2830 / 10 / 2012Josep Bardallo Email: SPAM
  • 29. 2930 / 10 / 2012Josep Bardallo Internet Video & Images
  • 30. 3030 / 10 / 2012Josep Bardallo Storage in Internet
  • 31. 3123 / 10 / 2012Josep Bardallo Bibliography  http://w3techs.com/technologies/cross/web_server/ranking  http://gigaom.com/cleantech/facebooks-number-of-servers-soar-to-an-estimated-180k/  http://news.netcraft.com/archives/2012/07/03/july-2012-web-server-survey.html  http://www.radicati.com/wp/wp-content/uploads/2011/05/Email-Statistics-Report-2011-2015-Executive- Summary.pdf  http://www.clickz.com/type/news/category/stats  http://www.symantec.com/theme.jsp?themeid=state_of_spam  http://www.mailradar.com/  http://www.w3counter.com/globalstats.php?year=2012&month=9  http://marketshare.hitslink.com/  http://www.wired.com/wiredenterprise/2012/03/amazon-ec2/