Anda di halaman 1dari 6

1.

Describe the following concepts:

MIME: Multi Purpose Internet Mail Extensions was originally designed to allow email
with non-ASCII portions, such as graphics, video, and audio. Web browsers extended
MIME and come with the ability to display many formats standard (such as JPEG and
GIF graphics), and other formats (such as RealAudio or AVI videos) with a "helper"
application, or outside application.

Different MIME types:

 Application: ms word, ms excel PDF, rtf (rich text format), Java-vm,


and Zip.
 Audio: wav, wmv, mid.
 Image: gif, jpeg, jpg, jpe, png, tif, xbm, Macintosh PICT format.
 Message: HTTP, News, rfc 822
 Multi part: x-tar, x-gzip, voice-message, encrypted
 Text: enriched, html, plain,richtext, sgml
 Video: mpeg, mpg, vnd.vivo, QuickTime

Port Numbers:
A port number is a way to identify a specific process to which an Internet or other
network message is to be forwarded when it arrives at a server. For the Transmission
Control Protocol and the User Datagram Protocol, a port number is a 16-bit integer
that is put in the header appended to a message unit. This port number is passed
logically between client and server transport layers and physically between the
transport layer and the Internet Protocol layer and forwarded on.

For example, a request from a client (perhaps on behalf of you at your PC) to a
server on the Internet may request a file be served from that host's File Transfer
Protocol (FTP) server or process. In order to pass your request to the FTP process in
the remote server, the Transmission Control Protocol (TCP) software layer in your
computer identifies the port number of 21 (which by convention is associated with an
FTP request) in the 16-bit port number integer that is appended to your request. At
the server, the TCP layer will read the port number of 21 and forward your request to
the FTP program at the server.

Well known Ports:


A TCP or UDP port with a number in the range 0-1023 (originally 0-255). The well-
known port numbers are assigned by the (IANA) and on most systems can only be
used by system (or root) processes or by programs executed by privileged users.
Some well known ports:

Port Number: Port name Purpose:


20 FTP Command port
21 FTP Data port
23 Telnet Unencrypted text
communication
25 SMTP For sending E-mails
80 HTTP used for transferring web
pages
110 POP3 Use to retrieve email
194 IRC Internet relay chat
993 IMAP4 Encrypted transmission

Audio File Formats:


An audio file format is a container format for storing audio data on a computer
system. Despite its name, there are many file formats for storing audio files.
The general approach towards storing digital audio formats is to sample the audio
voltage (corresponding to a certain position in the membrane of a speaker) in regular
intervals (e.g. 44,100 times per second for CDDA or 48,000 or 96,000 times per
second for DVD video) and store the value with a certain resolution (e.g. 16 bits per
sample in CDDA). Therefore sample rate, resolution and number of channels (e.g. 2
for stereo) are key parameters in audio file formats.

2. Describe the primary function of a Web Server:

A web server serves web pages to clients across the Internet or an Intranet. The web
server hosts the pages, scripts, programs, and multimedia files and serves them
using HTTP, a protocol designed to send files to web browsers and other protocols.
After an HTTP server receives a request, it attempts to process the request. If a
document is requested, the web server will attempt to find the document and return
it. If the resource requested can not be located or if there is something wrong with
the request itself, the server generates an error.

The most common web server is Apache (available for all major operating systems)
though IIS (Internet Information Server - available on the Windows Platform) is a
fast growing web server.

Diagram:

3. Describe the following types of server:

Proxy Server:
In an enterprise that uses the Internet, a proxy server is a server that acts as an
intermediary between a workstation user and the Internet so that the enterprise can
ensure security, administrative control, and caching service. A proxy server is
associated with or part of a gateway server that separates the enterprise network
from the outside network and a firewall server that protects the enterprise network
from outside intrusion.

Proxy servers have 3 main uses: security, content filtering and caching.
A proxy server receives a request for an Internet service (such as a Web page
request) from a user. If it passes filtering requirements, the proxy server, assuming it
is also a cache server, looks in its local cache of previously downloaded Web pages. If
it finds the page, it returns it to the user without needing to forward the request to
the Internet. If the page is not in the cache, the proxy server, acting as a client on
behalf of the user, uses one of its own IP addresses to request the page from the
server out on the Internet. When the page is returned, the proxy server relates it to
the original request and forwards it on to the user.

SMTP:
Simple Mail Transfer Protocol is a TCP/IP protocol used in sending and receiving e-
mail. However, since it is limited in its ability to queue messages at the receiving
end, it is usually used with one of two other protocols, POP3 or IMAP that let the user
save messages in a server mailbox and download them periodically from the server.
In other words, users typically use a program that uses SMTP for sending e-mail and
either POP3 or IMAP for receiving e-mail. On Unix-based systems, send mail is the
most widely-used SMTP server for e-mail. A commercial package, Send mail,
includes a POP3 server. Microsoft Exchange includes an SMTP server and can also be
set up to include POP3 support.
SMTP usually is implemented to operate over Internet port 25. An alternative to
SMTP that is widely used in Europe is X.400. Many mail servers now support
Extended Simple Mail Transfer Protocol (ESMTP), which allows multimedia files to be
delivered as e-mail.

DNS Server:
The Domain Name Server resolves the name of the web site typed into the location
field of the browser with the IP address of the server that will send the requested
information from that web site. The DNS server is typically local in most major
network environments and must be periodically updated to include new domain
names and re-identify names and IP's that have changed. The DNS server makes it
possible for a web site to be moved from one server at a specific IP address to
another IP address without having to rename the web site. For example, CNN.com, a
large web site visited by hundreds of thousands of users each hour, can have an
entry IP address that all the DNS servers know but then can load balance traffic
across multiple servers in one office and across multiple offices in different locations,
without the user ever having to learn anything more than CNN.com for an address.

Or
Short for Domain Name System (or Service), an Internet service that translates
domain names into IP addresses. Because domain names are alphabetic, they're
easier to remember. The Internet however, is really based on IP addresses. Every
time you use a domain name, therefore, a DNS service must translate the name into
the corresponding IP address. For example, the domain name www.example.com
might translate to 198.105.232.4. The DNS system is, in fact, its own network. ...
Or
The Domain Name System or DNS is a system that stores information about
hostnames and domain names in a kind of distributed database on networks, such as
the Internet. Most importantly, it provides a physical location (IP address) for each
hostname, and lists the mail exchange servers accepting e-mail for each domain.
4. Define the following:

IP Address:
Internet Protocol, or IP, addresses are the numerical codes that relate to a
specific domain name. It is possible that a domain name may identify one or
more IP addresses. The format of an IP address is a 32-bit numeric address
written as four numbers separated by periods. Each number can be zero to 255.
For example, 1.120.15.185 could be an IP address.
Or
Each machine connected to the Internet has an address known as an Internet
Protocol address (IP address). The IP address takes the form of four numbers
separated by dots, for example: 123.45.67.890
Or
(Internet Protocol Address) A unique number consisting of 4 parts separated by
dots, eg 165.113.245.2 Every machine that is on the Internet has a unique IP
address - if a machine does not have an IP address, it is not really on the
Internet. Most machines also have one or more Domain Names that are easier for
people to remember.

Network ID:
A network ID is the credential that uniquely identifies the user to the network
security application. In macro-based automation, the CMS calls upon the Network
Security plug-in to acquire the users network ID from the network security
application.

Subnet Mask:

The word sub network (usually shortened to subnet) has two related meanings.
In the older and more general meaning, it meant one physical network of an inter
work. In the Internet Protocol (IP), a sub network is a division of a classful
network. Subnetting an IP network allows a single large network to be broken
down into what appears (logically) to be several smaller ones. It was originally
introduced before the introduction of classful network numbers in IPv4, to allow a
single site to have a number of local area networks. Even after the introduction of
classful network numbers, subnetting continued to be useful, as it reduced the
number of entries in the internet-wide routing table (by hiding information about
all the individual subnets inside a site). As a side benefit, it also resulted in
reduced network overhead, by dividing the parts which receive IP broadcast.

Or
The subnet mask is used to determine where the network number in an IP
address ends and the node number in an IP address begins. A node is anything
on a network that needs an IP address to communicate (a PC, server, router,
etc).
5. Identify the class and subnet masks for the following IP addresses. Also
identify their Network part and host part for each address.

6. Firewall:
A firewall is a set of related programs, located at a network gateway server that
protects the resources of a private network from users from other networks. An
enterprise with an intranet that allows its workers access to the wider Internet
installs a firewall to prevent outsiders from accessing its own private data resources
and for controlling what outside resources its own users have access to.

Diagram:

The functions of a firewall:


• A firewall ensures that all communications attempting to cross from one
network to the other meet an organization’s security policy.

• Firewalls track and control communications, deciding whether to allow, reject


or encrypt communications.

• In addition to protecting trusted networks from the internet, firewalls are


increasingly being deployed to protect sensitive portions of local area
networks and individual PC’s.

7. Browser plug-ins:
The browser Plug-ins are software programs that extend the capabilities of the
browser we are using, for example, the ability to do things like download and display
or hear audio, video, animation, and special image viewing files or to filter images in
graphic programs in the web page of a browser. The main program (a web browser
or an email client, for example) provides a way for plug-in to register themselves
with the program, and a protocol by which data is exchanged with plug-in.

Software companies are developing plug-ins at a phenomenal rate, some of the


common plug-ins that we find in today’s browsers are:

Graphics:
• Corel Vector Graphics
• Adobe SVG Viewer
• Flash Saver 5.7 plug-ins for IE.
• Rapid VUE Browser plug-in 2.0 for IE.
• Windows Image Viewer for IE

Video:
• Macromedia flash player
• Macromedia shockwave player
• Windows media player
• Quick time player
Audio:
• Real Player
• Media player

8. The functions of web logs:

• It will give you information about your site's visitors

• Provides activity statistics, accessed files, and paths through the site.

• Provides statistics: daily, by hours of the day, by days of the week and by
months

• Information about referring pages, search engines, browsers, operating


systems, and more.

• Flexible system of filters provides an ability to carry out deep analysis of


Visitor’s activity.

• It can provide information about visitors who accessed a specific page or


came from a specific URL.

• Gives Information about errors: error types, detailed 404 error information

Types of Logs:

There are two types of logs in Apache web server which is used to configure the site.
”common log” and “combined log”.

Configuring “httpd.conf” file in apache with common log display’s only the web sites
summary. For example: the number of hits, total visitors, bandwidth details, number
of page views etc.

With “combined log” we are able to analyze the site in more detail than configured
with “common log”. It displays all the information’s that common log shows but in
addition we can view the summary of for example: the web browser used, mostly
used browser to view the site, daily used OS, mostly used OS etc.

----------------------------------End--------------------------------

Anda mungkin juga menyukai