Assignment 5
Web Service
A Web service is a method of communication between two electronic devices over a network. It uses following open standards: XML, SOAP, WSDL, UDDI
Page Rank
Page rank is an algorithm used by Google Search to rank websites in their search engine results. Page rank is a way of measuring the importance of website pages.
Cloud Computing
Cloud computing is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer's hard drive. The three types about cloud are "Software as a Service", "Platform as a Service" and "Infrastructure as a Service".
Blade Server
It is a modular type of a server computer which is designed for minimum use of energy and room, stripped from many components, however still posessing all necessary elements to be considered computer.
Google Docs
It is a free internet text documents, spreadsheets, presentations and simple drawings editor owned by Google. It allows users to create and edit documents online while collaborating in real-time with other users.
Server Virtualization
Server virtualization is converting one physical server into multiple, isolated virtual machines in order to help maximise the server resources.
assignment 4
Ethernet in ISO/OSI model
Ethernet is a family of computer networking technologies for local area networks (LANs) and metropolitan area networks (MANs). It describes the format of Ethernet frames and protocols from physical and link layer. It is based on idea that nodes are connected to the common medium through which they send and receive frames.
Ethernet standards for physical layer
1) 10 Mbit/s
2) Fast Ethernet
3) Gigabit Ethernet
4) 10 Gigabit Ethernet
5) 100 Gigabit Ethernet
Ethernet limits
Limits may refer to the speed of transmission in particular Ethernet standard or to the distance between two stations that allows transmission.
Structure of Ethernet frame
MAC address
MAC stands for Medium Access Control, It is 48-bits address written hexa-decimally. It is an identifier of a network card. First 24 bits specify the producer of the network card and other 24 bits are unique ID of a particular network card.
Broadcasting
A transmission of the packet that is going to be received by every device on the network.
Hub
Hub is a device which allows to join many network devices to a computer network with star topology. It transmits electrical signals from one port to all other. Hub has not routing tables broadcasts all networks data across each connection.
Switch
A device which joins segments of computer network working. It analyzes MAC addresses of sender and receiver of the frame.
CSMA/CD
Carrier Sense Multiple Access / with Collision Detection is a protocol which reduces collisions and its effects.
Collision
There is a possibility that two or more devices would start transmitting the packet at the same moment. It is detected automatically for instance by CSMA/CD protocol and computers abort transmission. After some random time they try to send a packet once again.
Half- and full- duplex
Full duplex, both parts can communicate to the other simultaneously.
Half duplex, each part can communicate to the other but not simultaneously, the communication is one direction at a time.
ARP request
ARP is an abbreviation for Address Resolution Protocol. It's a network layer protocol used to convert an IP address into a physical address. A host wishing to obtain a physical address broadcasts ARP request onto the TCP/IP network. The host on the network that has the IP address in the request then replies with its physical hardware address.
Detecting doubled IP address
IP address conflicts occur when two devices on a network are assigned the same IP address, resulting in one or both being disabled and losing connectivity until the conflict is resolved.
BOOTP
Bootstrap Protocol (BOOTP) is a protocol that lets a network user be automatically configured and have an operating system booted.
DHCP
Dynamic Host Configuration Protocol. It is a standardized network protocol used on IP networks to distribute network configuration parameters
Sniffing
It is intercepting and logging traffic passing over a digital network or part of a network.
VLANs
Virtual local area network. In technical terms, a VLAN is a broadcast domain created by switches. Normally, it is a router creating that broadcast domain. With VLAN’s, a switch can create the broadcast domain.
Certificates
Certificates are used for authentication of content in order to make secure connections between user and server and avoid spoofing which makes us sure that we are connected to the right server and no one else can interrupt or intercept our communication.
Encryption model
Encryption is the conversion of electronic data into another form, which cannot be easily understood by anyone except authorized parts.
Ethernet is a family of computer networking technologies for local area networks (LANs) and metropolitan area networks (MANs). It describes the format of Ethernet frames and protocols from physical and link layer. It is based on idea that nodes are connected to the common medium through which they send and receive frames.
Ethernet standards for physical layer
1) 10 Mbit/s
2) Fast Ethernet
3) Gigabit Ethernet
4) 10 Gigabit Ethernet
5) 100 Gigabit Ethernet
Ethernet limits
Limits may refer to the speed of transmission in particular Ethernet standard or to the distance between two stations that allows transmission.
Structure of Ethernet frame
MAC address
MAC stands for Medium Access Control, It is 48-bits address written hexa-decimally. It is an identifier of a network card. First 24 bits specify the producer of the network card and other 24 bits are unique ID of a particular network card.
Broadcasting
A transmission of the packet that is going to be received by every device on the network.
Hub
Hub is a device which allows to join many network devices to a computer network with star topology. It transmits electrical signals from one port to all other. Hub has not routing tables broadcasts all networks data across each connection.
Switch
A device which joins segments of computer network working. It analyzes MAC addresses of sender and receiver of the frame.
CSMA/CD
Carrier Sense Multiple Access / with Collision Detection is a protocol which reduces collisions and its effects.
Collision
There is a possibility that two or more devices would start transmitting the packet at the same moment. It is detected automatically for instance by CSMA/CD protocol and computers abort transmission. After some random time they try to send a packet once again.
Half- and full- duplex
Full duplex, both parts can communicate to the other simultaneously.
Half duplex, each part can communicate to the other but not simultaneously, the communication is one direction at a time.
ARP request
ARP is an abbreviation for Address Resolution Protocol. It's a network layer protocol used to convert an IP address into a physical address. A host wishing to obtain a physical address broadcasts ARP request onto the TCP/IP network. The host on the network that has the IP address in the request then replies with its physical hardware address.
Detecting doubled IP address
IP address conflicts occur when two devices on a network are assigned the same IP address, resulting in one or both being disabled and losing connectivity until the conflict is resolved.
BOOTP
Bootstrap Protocol (BOOTP) is a protocol that lets a network user be automatically configured and have an operating system booted.
DHCP
Dynamic Host Configuration Protocol. It is a standardized network protocol used on IP networks to distribute network configuration parameters
Sniffing
It is intercepting and logging traffic passing over a digital network or part of a network.
VLANs
Virtual local area network. In technical terms, a VLAN is a broadcast domain created by switches. Normally, it is a router creating that broadcast domain. With VLAN’s, a switch can create the broadcast domain.
Certificates
Certificates are used for authentication of content in order to make secure connections between user and server and avoid spoofing which makes us sure that we are connected to the right server and no one else can interrupt or intercept our communication.
Encryption model
Encryption is the conversion of electronic data into another form, which cannot be easily understood by anyone except authorized parts.
1 Configure Thunderbird to send and receive e-mails from server.
2 Send an e-mail to non existent mail server
3 Send an e-mail to non existent user
5. Configure Thunderbird to work with nntp server news.man.lodz.pl and send an e-mail to the group test.pl
Protocols POP3
POP3 stands for Post Office Protocol. POP3 allows an email client to download an email from an email server. The POP3 protocol is simple and does not offer many features except for download. Its design assumes that the email client downloads all available email from the server, deletes them from the server and then disconnects. POP3 normally uses port 110.
IMAP
IMAP stands for Internet Message Access Protocol. IMAP shares many similar features with POP3. IMAP includes many more features than POP3. The IMAP protocol is designed to let users keep their email on the server. IMAP requires more disk space on the server and more CPU resources than POP3, as all emails are stored on the server. IMAP normally uses port 143.
SMTP
SMTP stands for Simple Mail Transfer Protocol. SMTP is used when email is delivered from an email client, such as Outlook Express, to an email server or when email is delivered from one email server to another. SMTP uses port 25.
Client Server Communication
Server and Client are the two main elements in all Internet Applications. The client sends requests and the server listens to those requests and responds/accomplishes the required task. The server and client communicate with each other through a common protocol. In Web NMS, the common communication protocol is either TCP Socket or RMI. The Client-Server communication denotes the communication between FE server/FE component of combo BE server and the Clients. In the Web NMS context, the Server-side comprises of BE server and FE server and the Client-side comprises of FE and Clients.
SMTP commands:
HELO command, to initiate dialog with identifying itself in the parameter
MAIL command, to establish the return address.
RCPT command, to establish a recipient of this message. This command can be issued multiple times, one for each recipient. These addresses are also part of the envelope.
DATA to signal the beginning of the message text. It consists of a message header and a message body separated by an empty line. DATA is actually a group of commands, and the server replies twice: once to the DATA command proper, to acknowledge that it is ready to receive the text, and the second time after the end-of-data sequence, to either accept or reject the entire message.
QUIT command ends the session.
POP/IMAP commands:
USER. It allows the authentication. Always it must be followed by a user name.
PASS. It allows specify the password of the previous user.
STAT. Info about the messages of server.
USER. It allows the authentication. Always it must be followed by a user name.
PASS. It allows specify the password of the previous user.
STAT. Info about the messages of server.
NNTP Protocol
The Network News Transfer Protocol (NNTP) is an application protocol used for transporting Usenet news articles (netnews) between news servers and for reading and posting articles by end user client applications.
E-mail mailbox
E-mail mailbox is a storage device where electronic mail messages are delivered. A mailbox is identified by an email address. The mail system allows user to scan mailbox copy it to a file, delete it, print it or forward to another user.
The Network News Transfer Protocol (NNTP) is an application protocol used for transporting Usenet news articles (netnews) between news servers and for reading and posting articles by end user client applications.
E-mail mailbox
E-mail mailbox is a storage device where electronic mail messages are delivered. A mailbox is identified by an email address. The mail system allows user to scan mailbox copy it to a file, delete it, print it or forward to another user.
Email Parameter
1) maximum size of mailbox
2) maximum size of sent messages
3) maximum size of received messages
4) number of available domains
5) period of inactivity
6) servers
Email Aliases
An alias is a name you have used besides your real name. Email Alias is an alternative email address which points to existing email account but It is not a email account. If we assign aliases to one email address, messages sent to all those aliases will be delivered to our mailbox.
Email Address
An email address identifies an email box to which email messages are delivered. Email address is made up of a local part, an @ symbol, then a domain part.
E-mail structure
Electronic mail (e-mail) is a method of exchanging digital messages from an author to one or more recipients.
Internet email messages consist of two major sections:
Header - structured into fields such as From, To, Bcc, Cc (Carbon copy), Subject, Date, Message-ID, In-Reply-To, Content-Type (eg. text/html). It is separated from the body by a blank line.
Body - the basic content, as unstructured text. Sometimes containing a signature block at the end.
Email Address
An email address identifies an email box to which email messages are delivered. Email address is made up of a local part, an @ symbol, then a domain part.
E-mail structure
Electronic mail (e-mail) is a method of exchanging digital messages from an author to one or more recipients.
Internet email messages consist of two major sections:
Header - structured into fields such as From, To, Bcc, Cc (Carbon copy), Subject, Date, Message-ID, In-Reply-To, Content-Type (eg. text/html). It is separated from the body by a blank line.
Body - the basic content, as unstructured text. Sometimes containing a signature block at the end.
Header
The header, a set of lines containing information about the message's transportation, such as the sender's address, the recipient's address, or time stamps showing when the message was sent by intermediary servers to the transport agents, which act as a mail sorting office.
Separator
It is used for separating the list of e-mail addresses by domains and then arranging the addresses within domain.
Attachments
It is any computer file that is sent along with an email . It is the way to share documents and images.
E-mail Coding
Email coding prevents from finding email address in the webpage source.
Separator
It is used for separating the list of e-mail addresses by domains and then arranging the addresses within domain.
Attachments
It is any computer file that is sent along with an email . It is the way to share documents and images.
E-mail Coding
Email coding prevents from finding email address in the webpage source.
MIME
MIME (Multi-Purpose Internet Mail Extensions) is an extension of the original Internet e-mail protocol that lets people use the protocol to exchange different kinds of data files on the Internet: audio, video, images, application programs, and other kinds, as well as the ASCII text handled in the original protocol, the Simple Mail Transport Protocol (SMTP).
Mailing List
A mailing list is a collection of names and addresses used by an individual or an organization to send material to multiple recipients. At least two types of mailing lists can be defined: an announcement list is closer to the original sense, where a "mailing list" of people was used as a recipient for newsletters, periodicals or advertising. Traditionally this was done through the postal system, but with the rise of email, the electronic mailing list became popular. The second type allows members to post their own items which are broadcast to all of the other mailing list members. This second category is usually known as a discussion list.
E-Mail gate
A server than transfers electronic mail between two networks using different mail systems.
E-mail Security
Email security is a priority for all businesses, with the growing threat of hackers, viruses spam, phishing and identity theft, as well as the need to secure business information. From an individual/end user standpoint, proactive email security measures include:
Strong passwords
Password rotations
Spam filters
Desktop-based anti-virus/anti-spam applications
A blacklist (or black list) is a list or register of entities or people who, for one reason or another, are being denied a particular privilege, service, mobility, access or recognition. The blacklist test will check a mail server IP address against over 100 DNS based email blacklists. (Commonly called Realtime blacklist, DNSBL or RBL). If your mail server has been blacklisted, some email you send may not be delivered. Email blacklists are a common way of reducing spam.
Graylists
Graylist is a method of defending e-mail users against spam. A mail transfer agent (MTA) using graylisting will "temporarily reject" any email from a sender it does not recognize. If the mail is legitimate the originating server will try again after a delay, and if sufficient time has elapsed the email will be accepted.
Spam Filtering
A spam filtering is a program that is used to detect unsolicited and unwanted email and prevent those messages from getting to a user's inbox.
SSL
SSL stands for Secure Socket Layer - it is a protocol designed to send messages safely in the network. It ensures confidentiality of data transfer and security of logins and passwords
TLS
Transport Layer Security (TLS) is a protocol that ensures privacy between communicating applications and their users on the Internet. When a server and client communicate, TLS ensures that no third party may eavesdrop or tamper with any message. TLS is the successor to the Secure Sockets Layer (SSL).
PGP
PGP stands for Pretty Good Privacy - a tool used for coding and decoding electronic mail. PGP is often used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications.
Signature Spam
Spam is unwanted electronic message. Spam can be spread across electronic mail, internet communicators or even SMS. Usually spam is sent in mass, contains a lot of commercial information and has the same content. The aim of spam is to achieve material benefits by the sender.
Blacklist
Graylists
Graylist is a method of defending e-mail users against spam. A mail transfer agent (MTA) using graylisting will "temporarily reject" any email from a sender it does not recognize. If the mail is legitimate the originating server will try again after a delay, and if sufficient time has elapsed the email will be accepted.
A spam filtering is a program that is used to detect unsolicited and unwanted email and prevent those messages from getting to a user's inbox.
Protocols
SMTP, POP3 and IMAP are TCP/IP protocols used for mail delivery. If you plan to set up an email server such as hMailServer, you must know what they are used for. Each protocol is just a specific set of communication rules between computers.
SMTP
SMTP stands for Simple Mail Transfer Protocol. SMTP is used when email is delivered from an email client, such as Outlook Express, to an email server or when email is delivered from one email server to another. SMTP uses port 25.
POP3
POP3 stands for Post Office Protocol. POP3 allows an email client to download an email from an email server. The POP3 protocol is simple and does not offer many features except for download. Its design assumes that the email client downloads all available email from the server, deletes them from the server and then disconnects. POP3 normally uses port 110.
IMAP
IMAP stands for Internet Message Access Protocol. IMAP shares many similar features with POP3. IMAP includes many more features than POP3. The IMAP protocol is designed to let users keep their email on the server. IMAP requires more disk space on the server and more CPU resources than POP3, as all emails are stored on the server. IMAP normally uses port 143.
Client Server Communication
Server and Client are the two main elements in all Internet Applications. The client sends requests and the server listens to those requests and responds/accomplishes the required task. The server and client communicate with each other through a common protocol. In Web NMS, the common communication protocol is either TCP Socket or RMI. The Client-Server communication denotes the communication between FE server/FE component of combo BE server and the Clients. In the Web NMS context, the Server-side comprises of BE server and FE server and the Client-side comprises of FE and Clients.
Signature Spam
Spam signature is an element or set of elements of an email that may lead an anti-spam filter to consider this email as a spam.
Spam signatures impact spam scores.
PGP
PGP stands for Pretty Good Privacy is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications
TLS
Transport Layer Security (TLS) is a protocol that ensures privacy between communicating applications and their users on the Internet. When a server and client communicate, TLS ensures that no third party may eavesdrop or tamper with any message. TLS is the successor to the Secure Sockets Layer (SSL).
SSL
SSL is an Internet security protocol used by Internet browsers and Web servers to transmit sensitive information. SSL has become part of an overall security protocol known as Transport Layer Security (TLS).
In your browser, you can tell when you are using a secure protocol, such as TLS, in a couple of different ways. You will notice that the "http" in the address line is replaced with "https," and you should see a small padlock in the status bar at the bottom of the browser window. When you're accessing sensitive information, such as an online bank account or a payment transfer service like PayPal or Google Checkout, chances are you'll see this type of format change and know your information will most likely pass along securely.
E-mail Security
Email security is a priority for all businesses, with the growing threat of hackers, viruses spam, phishing and identity theft, as well as the need to secure business information. From an individual/end user standpoint, proactive email security measures include:
Strong passwords
Password rotations
Spam filters
Desktop-based anti-virus/anti-spam applications
Parameter
In information technology, a parameter is an item of information - such as a name, a number, or a selected option - that is passed to a program by a user or another program. Parameters affect the operation of the program receiving them.
Aliases
An alias is a name you have used besides your real name. Its so they can check all the records for you, in case some aren't under you legal name. If you've never used any other name besides your birth name, then skip the question. If not, list any names you have used, especially if you used them on official documents or w/e.
E-Mail gate
The e-Mail gate web site is dedicated to battle spam by helping people to protect their email addresses against email crawlers, also known as "spambots".
A spambot is a program similar to the web-crawlers used by search engines to index the web. The main difference is that spambots search and store all the email addresses it encounters while crawling the web. There are several commercial as well as free spambots available, ranging from the most simple crawlers to integrated group mailers with highly sophisticated methods of detecting email addresses within a web page. Since spambots provides free updated lists of email addresses they have quickly become the favorite choice for spammers.
Mailing List
A mailing list is a collection of names and addresses used by an individual or an organization to send material to multiple recipients. The term is often extended to include the people subscribed to such a list, so the group of subscribers is referred to as "the mailing list", or simply "the list".
MIME
MIME (Multi-Purpose Internet Mail Extensions) is an extension of the original Internet e-mail protocol that lets people use the protocol to exchange different kinds of data files on the Internet: audio, video, images, application programs, and other kinds, as well as the ASCII text handled in the original protocol, the Simple Mail Transport Protocol (SMTP).
Header
The header, a set of lines containing information about the message's transportation, such as the sender's address, the recipient's address, or time stamps showing when the message was sent by intermediary servers to the transport agents (MTAs), which act as a mail sorting office. The header begins with a From line and is changed each time it passes through an intermediary server. Using headers, you can see the exact path taken by the email, and how long it took each server to process.
Subscribe to:
Posts
(
Atom
)















