Mail (SMTP): Allow a mail delivery agent on a local machine to connect to a mail delivery agent on a remote machine and deliver mail.
|
|
|
- Sibyl Miles
- 10 years ago
- Views:
Transcription
1 Application Layer The application layer consists of what most users think of as programs. The application does the actual work at hand. Although each application is different, some applications are so useful that they have become standardized. The Internet has defined standards for: File transfer (FTP): Connect to a remote machine and send or fetch an arbitrary file. FTP deals with authentication, listing a directory contents, ascii or binary files, etc. Remote login (telnet): A remote terminal protocol that allows a user at one site to establish a TCP connection to another site, and then pass keystrokes from the local host to the remote host. Mail (SMTP): Allow a mail delivery agent on a local machine to connect to a mail delivery agent on a remote machine and deliver mail. News (NNTP): Allows communication between a news server and a news client. Web (HTTP): Base protocol for communication on the World Wide Web. CS week13-appl.tex
2 Electronic Mail Electronic mail is a popular network service. There are two parts to electronic mail systems: User agent: The user interface to the mail system. The user agent accesses messages stored in a system mailbox, provides ways to view, edit, and reply to messages, etc. The user agent can be as simple as having the user use a text editor to create a file that the user agent hands to the message transfer agent. Sample agents in Unix: /bin/mail, mh, elm, and the emacs rmail package. Message transfer agent (MTA): Software that transports messages created by a user to destination mailboxes, possibly on remote machines. The MTA s job is more complex than other applications: 1. It must handle temporary failures; if a destination machine is temporarily unavailable, it must spool the message on the local machine for later delivery. Thus, the User Agent typically just deposits messages into a spool area. 2. It must distinguish between local and remote recipients. 3. It may have to deliver copies of a message to several machines. 4. It may allow mixing text, voice, and video in a message as well as appending documents and files to a message. Mail addresses consist of: mailbox names: The name of a specific mailbox. Usually, a mailbox is associated with one login id. symbolic names: The name of a service rather than a specific user. For instance, postmaster is universally recognized as an address for mail problems. Symbolic names are aliases for specific mailbox(s). group names (mail exploders): An alias for a set of recipients. How does an MTA know what to do with mail? It consults an internal database that specifies how the mail address should be interpreted. The Internet includes a standard for mail delivery called the Simple Mail Transfer Protocol (SMTP). The protocol itself is surprisingly simple; because it uses TCP, much of the hard work is handled by lower-level protocols. CS week13-appl.tex
3 To deliver mail, the MTA opens a TCP connection to a destination site, and sends it the message. The remote MTA deposits the message in its spool area, and returns an acknowledgment ONLY after it has saved the message in stable storage. The sender removes its copy ONLY after it has received the acknowledgment. If the destination is unavailable, the MTA tries again later. If a message cannot be delivered in (say) 3 days, an error is returned to the user. Internet mail has an important advantage over other mail systems (e.g., uucp or bitnet): Because it is an end-to-end delivery system, it is inherently more reliable than other systems. In contrast, systems utilizing message switching can only guarantee that a message gets to an intermediate destination. In uucp, one specifies a list of machines (e.g., mcvax!enidbo!cxr ). The local MTA delivers the message to machine mcvax and deletes it from the local spool area. Unfortunately, we now no longer have a copy of the message, and it has not yet reached the destination machine enidbo. In short, anything can happen: Machine mcvax might crash and lose the message (without reporting an error). The message could be delayed hours or days. Worst of all, neither sender nor recipient can find out what the status of the message is. Within the Internet, all mail addresses have the same form: local-part@domain-name. Is domain-name a machine name? No. Rather than referring to a machine name, domain-name refers to an MX record in the DNS. Local-part refers to anything to the left of and can be the name of a user, the name of a mailing list, etc. Internet addresses only specify the syntax of addresses, not their semantics. For example: [email protected]: Specifies a domain name of cs.wpi.edu and local-part cew. cew%[email protected]: Specifies a domain name of cs.purdue.edu, and a local part of cew%cs.wpi.edu. The MTA would deliver the mail to purdue, which would process the mail based on the local-part. [email protected]: The MTA delivers the message to uunet.uu.net, uunet then inspects the local part. Uunet.UU.NET uses the convention that! characters in the local part refer to uucp path names. Note that this is a convention only many sites do not interpret! in this way, and there is no requirement that they do so. CS week13-appl.tex
4 The mail to a bitnet site demonstrates the need for mail gateways, gateways that accept mail messages from one network type (e.g. Internet) and send them across another (e.g. bitnet). Mail gateways: 1. Are used when the sender and recipient cannot communicate directly using common transport protocols. 2. Hide the details of multiple incompatible networks from users. 3. Increase the complexity of an MTA, which now has to be able to translate selected addresses into other forms. An MTA may need to translate an internet address into a Bitnet address, for instance. SMTP deals with transferring mail from one MTA to another. It only concerns itself with transferring mail from one machine to another. Surprisingly, the SMTP protocol is quite simple. It uses the query response model, and only a few message types are defined. The hard work is handled by TCP. SMTP commands consist of human-readable ascii strings. Responses begin with a 3-digit number (used by the SMTP program), followed by a string (used as comments for users), and a terminating newline character. Each command has a corresponding response: HELO: Initiate a mail transaction, identifying the sender to the recipient. Typical response: 250 OK. MAIL FROM: <reverse-path>: Tells the remote SMTP that a new mail transaction is beginning. A single TCP connection can be used to serially process a set of message exchanges between a pair of hosts. Reverse-path specifies where errors should be sent to, allowing error messages to be forwarded to a system administrator rather than the sender. This feature is especially useful in large mailing lists, where errors about undeliverable mail should go to the list maintainer rather than a sender. Typical response: 250 OK. RCPT TO:<forward-path>: Forward-path specifies a single recipient of the message. Forward-path is the local part of a mail address, and can be a user, mail list, etc. The sending SMTP sends a RCPT command for each intended recipient. Typical responses: 250 OK, 251 User not local; will forward to <forward-path>, or 550 No such user. CS week13-appl.tex
5 DATA: If accepted, the sender transfers the actual message. End-of-message is indicated by sending a. on a line by itself. Typical response: 250 OK. When can sender delete message from its queue? The sender does not delete its copy of the message until after receiving the 250 reply. QUIT: Terminate the connection. The following example shows mail sent by walnut through owl to cs.purdue.edu. 220-owl.WPI.EDU Sendmail ready at Wed, 24 Apr :10: ESMTP spoken here >>> EHLO walnut.wpi.edu 250-owl.WPI.EDU Hello walnut.wpi.edu [ ], pleased to meet you 250-EXPN 250-SIZE 250 HELP >>> MAIL From:<[email protected]> SIZE= <[email protected]>... Sender ok >>> RCPT To:<[email protected]> 250 <[email protected]>... Recipient ok >>> DATA 354 Enter mail, end with "." on a line by itself >>>. 250 LAA27806 Message accepted for delivery [email protected]... Sent (LAA27806 Message accepted for delivery) Closing connection to owl.wpi.edu. >>> QUIT 221 owl.wpi.edu closing connection Miscellaneous SMTP commands: TURN: Turn the line around. When the client has finished sending mail, the TURN command switches the sender and receiver, allowing the receiver to start sending messages without having to terminate and reestablish a connection. EXPN: expand a mailbox name into its aliases. Note: Is mail authenticated? No. It is trivial to fool SMTP into accepting forged messages. SMTP makes no attempt to authenticate a sender. CS week13-appl.tex
6 Remote Login A remote login facility allows a user to establish a login session to a remote machine and then execute commands. Implementing a remote login facility is not as trivial as might seem: Some operating systems were built before networks existed and assume that login sessions can come only from terminal lines. Some systems allow special keys (e.g., CTRL-C) to abort the current process. In some systems it may be impossible to send the CTRL-C to the remote server. On the other hand, sending a CTRL-C to a remote server may prevent a user from aborting the local end of the session. A remote login facility should provide interoperability between heterogeneous machines. Should a program output CR-NL or just a NL? Individual machines have differing interpretations for how to specify functions to perform such logical functions as indicating end of record/line. Telnet is an Internet standard remote login protocol that connects a local terminal with a remote login session. It copies keystrokes to the remote machine and copies output from the remote machine to the local terminal. Telnet provides three services: 1. Telnet defines a Network Virtual Terminal (NVT) standard that describes a standard terminal. Client programs interact with the NVT, and the server translates NVT operations into ones specific to the actual hardware/operating system. 2. Telnet allows the two ends of the connection to negotiate options with one another. Option negotiation allows both ends to agree on a common level of service. 3. Telnet treats both ends of a connection symmetrically allowing both ends to be programs. To handle heterogeneity, telnet defines how data and command sequences are represented. The client translates keystrokes into NVT format and sends them the server. The server translates NVT operations into the appropriate local representation. All telnet operations are sent as 8-bit bytes: Bytes with a first bit of zero are treated as normal 7-bit ascii character data. Printable ascii characters have standard meanings, and the meaning of control characters is specified to eliminate ambiguities. CS week13-appl.tex
7 Bytes with the high order bit set are used for command sequences. The two-character sequence CR-LF delimits records. Telnet defines the following commands: Interrupt process (IP): Terminate the running program. Abort output (AO): Discard any buffered output. Are you there (AYT): Allows client to send and out-of-band query to verify the remote end is still there. Erase character (EC): Erase the previous character. Erase line (EL): Delete the entire current line. Synchronize: Clear data path to remote party. Break: Equivalent of the BREAK or ATTENTION key. To send a command, telnet sends the escape sequence Interpret As Command (IAC) followed by the 1-byte command. The IAC has a value of 0xff (and must be escaped when it appears in the data). Sending control functions is not always enough to guarantee the desired results. Consider the following scenario: If the remote program is in a loop, it may never read input or generate output. If the client continues sending output, the server s receive buffer will fill, and the server will eventual advertise a TCP flow-control window of size 0. Further data sent to the server will remain in buffered at the sender. What if the client now sends an interrupt process command? It will never be delivered because the client is no longer allowed to send new data. The command stays in the sender s buffer. Telnet solves this problem by using the TCP urgent pointer mechanism to send an out-of-band signal. When it sends the interrupt process command, it directs TCP to set the urgent pointer to the IAC command. TCP then sends a segment (that doesn t necessarily have data in it) with the urgent pointer set. The remote TCP then alerts the remote telnet of the urgent data, which proceeds to process it. Note: The TCP urgent mechanism specification requires that the operating system provide a mechanism for asynchronously notifying a process of the presence of urgent data; Unix uses the SIGURG signal. CS week13-appl.tex
8 Telnet allows either end of a connection to negotiate the use of options. Option processing is interesting because either end can request the use of an option. To request an option, side A sends a Will X option request. The remote side responds with Do X or Don t X, indicating that it will or will not participate in the requested option. If an option is accepted, it become effective immediately after the DO X in the data stream. Actual option negotiation takes place in two steps. At the top level, two telnet processes negotiate as to whether they are willing to negotiate an option. If the answer is yes, further option-specific subnegotiation takes place to exchange the actual option information. Example options: 1. Use an 8-bit instead of 7-bit data path. This allows the transmission of non-ascii data. 2. Full duplex vs. half duplex operation. 3. Local editing. That is, have the local telnet perform echoing, erase, etc., and only send complete lines. This can save a tremendous amount of bandwidth. Another option allows the remote side to specify what characters indicate end of command. 4. Specify mappings of characters to interrupt functions. For example, map ctrl-c into the abort command. 5. Determine the size (rows and columns) of the terminal. Note: Telnet servers using newer options coexist with older servers; they negotiate the use of new options with newer servers, while older server respond Won t X for any option X they do not understand. CS week13-appl.tex
9 Berkeley Rsh commands Berkeley Unix includes a set of network applications that support the idea of a set of trusted hosts. System administrators define a set of machines that can be trusted, allowing users within the set of machines to dispense with explicit authentication (e.g., typing passwords). In the CS Department, for instance, all Sun machines belong to one set, allowing users to rlogin from one workstation to another without providing passwords. Unix includes several rsh ( r-shell ) programs: rlogin: Similar to telnet, but tailored to the Unix environment. For instance: 1. It doesn t require use of password when logging into another machine in the set of trusted hosts. 2. Users can augment the default set of trusted hosts by adding (machine name, user id) pairs to the file.rhosts. For example, the.rhosts file for the cs513 account on wpi could contain the entry: sequoia.wpi.edu cew. 3. It exports the terminal type (e.g., the TERM variable) to the remote machine. (Note: telnet only recently added the option necessary to achieve this.) 4. Handles CTRL-S and CTRL-Q locally, so that output is stopped immediately. Recall that with telnet, CTRL-S is not processed by the local client at all; it is sent to the remote telnet, introducing a significant delay between entering CTRL-S and having the output stop. Many of the weaknesses in telnet relative to rlogin have been fixed in the past several years. rsh: Execute a remote command. For example, rsh eve ls executes the ls command on eve. rcp: Copy a file from one machine to another. Analogous to cp, but filenames can be prepended with machine: to specify files on remote machines. One advantage that rcp has over FTP is that since rcp assumes both machine run Unix, it can set the permissions of the copied file properly. FTP is unable to do that because permissions generally have differing interpretations on different vendor s machines. CS week13-appl.tex
10 Secure Shell commands New set of commands: slogin, ssh, scp to support secure r-shell programs. Security methods;.rhosts/.shosts file considered insecure and often not allowed by remote server. Client hosts maintains a key for each host and supplies it when logging on to the remote host. Remote host verifies it has correct key from the client host. Closes security holes due to IP spoofing, DNS spoofing and routing spoofing. The $HOME/.ssh/known_hosts file can be insecure. Use RSA encryption. On server machine maintain $HOME/.ssh/authorized_keys, which lists public keys for machines in which remote login is permitted. On login, server sends random number encrypted with user s public key. User maintains private key in.ssh/identity.pub, which is used to decrypt. Client can obtain public/private key pair using ssh-keygen. After setting up public and private keys, the user can remote login without a password. Use TIS authentication server. Use encrypted password entered by the user. CS week13-appl.tex
11 Remote File Access There are two basic approaches to remote file access: On-line access: Multiple programs running on different machines concurrently access a single file located on a file server. When accessing a file, an application operates on pieces of the file rather than the entire file. In addition, the server (and its associated protocols) may be able to guarantee each client sees the same version of a file. This approach is typified by Sun s Network File System (NFS). Whole file copying: An application fetches a copy of the entire file from a remote server, and then operates on the local copy. If the operating system provides access to remote files exactly like it provides access to local files, we say that the remote files are integrated with local files and that the file system provides transparent access. The advantages of transparent on-line access should be obvious: 1. Users use the same programs to access local and remote files. 2. Files needed by many machines can be shared, reducing the amount of disk space needed. For example, binaries to popular programs such as emacs. 3. Users can access their files, regardless of which particular machine they log into. However, there also disadvantages: 1. If an application uses both local and remote files, an application may not work, even if the local machine is running. That is, we still have a central point of failure. 2. Performance degrades when the network or remote server becomes overloaded. The alternative to transparent access is to provide application programs to copy files between local and remote machines. The Internet defines one such application, File Transfer Protocol (FTP). FTP provides: Interactive access: Users interact with a remote server, issuing commands such as ls, chdir, put, get, etc. Format: The User specifies the type of file being transferred, allowing the transfer of ASCII or EBCDIC text files, binary data, etc. CS week13-appl.tex
12 Authentication: User must present account and password before being given access to the remote system. Unlike other applications, FTP uses two TCP connections to do its work: Control connection: The first connection is used by an interactive front end for command processing. Moreover, rather than defining a new protocol, FTP uses a restricted form of telnet (e.g., no option negotiation) for the control connection. Transfer connection: A second connection is used for the actual transfer of data (e.g., files, output from ls command, etc.). One interesting aspect of FTP is its selection of TCP port numbers for the data connection. For the control connection, a client picks any unused local port number and connects to the well-known FTP port on the remote system. The server accepts control connection requests from any machine. For the transfer connection, however, the server should only accept a connection from the user at the other end of the control connection. Thus, the remote FTP client picks a local port number and sends it to the server via the control connection. The server than accepts a connection request, but specifies that the remote address must match that received over the control port. Typically, a user connecting to an FTP server must specify an account and password. Often, it is convenient to set up a special account in which no password is needed. Such systems provide a service called anonymous FTP: 1. When asked for an account and password, the user uses an id of anonymous and password guest. (Or any password for that matter. The user s Internet mailing address is the preferred password.) 2. The account generally has restricted privileges; in Unix systems, for instance, anonymous FTP users can only access files within the restricted directory of the FTP account. 3. Anonymous ftp is a convention and must be setup by a system administrator. The following shows a sample FTP session used to fetch X software from MIT: < sequoia >ftp ftp.cs.usask.ca Trying CS week13-appl.tex
13 Connected to clotho.usask.ca. 220 clotho FTP server (UNIX(r) System V Release 4.0) ready. Name (ftp.cs.usask.ca:cew): anonymous 331 Guest login ok, send ident as password. Password: 230 Guest login ok, access restrictions apply. ftp> ls 200 PORT command successful. 150 ASCII data connection for /bin/ls ( ,1467) (0 bytes). bin dev etc ftpd_setup pub usr 226 ASCII Transfer complete. 37 bytes received in seconds (2.3 Kbytes/s) ftp> cd pub 250 CWD command successful. ftp> ls -CF 200 PORT command successful. 150 ASCII data connection for /bin/ls ( ,1469) (0 bytes). 111/ cmpt250/ eric/ pc99/ yang/ 115/ combi/ geometry/ publications/ UofS_local/ defaults/ grassman/ rsmith.tar aries/ discus/ keil/ sailor/ carey/ envlop/ microweb/ software/ 226 ASCII Transfer complete. remote: -CF 294 bytes received in seconds (18 Kbytes/s) ftp> binary 200 Type set to I. ftp> get rsmith.tar 200 PORT command successful. 150 Binary data connection for rsmith.tar ( ,1470) (55296 bytes). 226 Binary Transfer complete. local: rsmith.tar remote: rsmith.tar bytes received in 3.8 seconds (14 Kbytes/s) ftp> quit 221 Goodbye. The Trivial File Transfer Protocol (TFTP) is another Internet standard for transferring files. It differs from FTP in the following ways: CS week13-appl.tex
14 1. It is based on UDP rather than TCP and is a basic stop-and-wait protocol with acknowledgments and retransmissions. 2. It has no authentication. 3. It is small enough that it fits in workstation and PC read-only memories (ROMs). Thus, workstations can use standard Internet protocols to bootstrap off of file servers. Indeed, Sun diskless workstations boot as follows: 1. Use RARP to obtain their Internet addresses. 2. Use TFTP to download a copy of the operating system into memory. 3. Start execution. The protocol itself is exceedingly simple: 1. The first datagram identifies the name of a file, and specifies whether the file is to be fetched or sent. 2. Datagrams are numbered sequentially, and each datagram containing 512 bytes of data. End-of-data is signaled by a datagram containing less than 512 data bytes. 3. Datagrams contain a sequence number and are either ACK or DATA packets. CS week13-appl.tex
15 Sun Network File System (NFS) Sun s NFS has become a de facto standard for remote file systems. It provides online, transparent, integrated file access. Because it is RPC-based, users access remote files in the same way as local files. Clients invoke operations on the file server solely through RPCs. For instance, to open a file, an application issues an open system call specifying the file to be opened. If the file is local, the operating system processes the open request as normal. If the file is located on a remote another server, the operating system issues an RPC to the server. A read system call is translated into an RPC request for the relevant data blocks of the file. Some interesting issues in building NFS: 1. NFS is an interface to a virtual file system. Although it is used primarily in Unix, it can also be used to access files in other operating systems. 2. RPC and XDR had to be moved from user-level library routines into the operating system kernel, because any file-related system calls might translate into a server request. 3. For fault tolerance, file servers should be stateless. That is, the server shouldn t maintain any information between subsequent client calls needed to satisfy a request if the server were to crash, the state would be lost and the request could not be satisfied. In other words, an RPC s arguments should contain all information needed to satisfy a request. 4. Client RPC calls were designed to be idempotent. Is this possible given a stateless server? No. For example, what happens if a client invokes an RPC to delete a file, gets no response, and retransmits the request. If the request is executed once, the file will be deleted. If executed twice, the second request will result in an error non-existent file. Without maintaining state, the server has no way of knowing whether a request is new or a retransmission. 5. Clients must first mount a remote file system onto the local file tree before accessing remote files. The mount operation allows the server to authenticate the client. Note, however, that authentication is based on the IP address of the client, a weak form of authentication. 6. The first version of NFS was very slow. Adding a small cache of recently used file pages to the client speeded up execution. (Files being written are flushed to the server when a file is closed.) CS week13-appl.tex
16 7. Further study showed that 90% of the client-server RPCs were for the getattr routine (e.g., Unix stat). Adding a client cache of recent responses reduced traffic to 10%. Like many industry-originated de facto standards, NFS exhibits significant technical problems: Cache coherency: Using caches to improve performance is a well known technique. A big problem is cache coherence. What happens if two machines access the same file, one writing it, and the other reading it? They interfere with each other, because NFS s caching strategy isn t sophisticated enough to turn off caching. Authentication: NFS performs authentication based on the sender s IP address (servers maintain a list of trusted machines), and each RPC packet contains an authentication field. In the Unix environment, the authentication field contains the sender s machine name, user id, group id, and a list of the groups the user is a member of. When a server gets an RPC request, it (naively?) assumes that the information is valid. Thus, in theory, anyone with a PC or workstation that can send arbitrary packets is able to impersonate a legitimate user. For instance, an imposter could claim to be some other user, and then send a sequence of packets to open a file and then read arbitrary data from the file. NFS does include hooks for using DES encryption, but special hardware is needed. UDP-based transport protocol: RPC uses UDP rather than a true transport protocol. One result has been implementations that work across LANs, but not WANs. Yellow pages: Sun workstations use a distributed database system called yellow pages. The idea is to have a single server manage such information as passwords, and translating host names to host addresses. Unfortunately, yellow pages is unable to return temporary failure indications, such as when using the DNS. Despite its technical problems, NFS is tremendously popular and useful. CS week13-appl.tex
17 World Wide Web Built on the Hypertext Transport Protocol (HTTP). Addressing a key. Done through a Uniform Resource Locator (URL). Form of a URL: protocol://hostname/file e.g. Look at sample of what happens. Other protocols can be used (see Fig. 7-63). HTML Language used is HTML (Hypertext Markup Language). Can include graphics/images. Forms, scripts (commands to generate a page). CS week13-appl.tex
18 Secure Sockets Layer With increased use of electronic commerces, secure transactions are important. SSL protocol developed by Netscape for encrypted communication between clients and servers. SSL sits between TCP/IP and HTTP layers. Invoked by browsers using the protocol https. Uses public-key cryptography. Features: Clients can authenticate servers thrugh a certificate authority. Important as a client should not send credit card information to an unknown server. Servers can authenticate clients in the same way. Encrypted SSL connection (no plain text). Two sub-protocols: SSL record protocol and SSL handshake protocol. SSL record format defines the format used to transmit data. SSL handshake protocol uses SSL record protocol to establish connection between SSL-enabled server and SSL-enabled client. Exchange of messages does the following: authenticate the server to the client allow client and server to select the cryptographic algorithms, or ciphers, they both support. Choices include DES, Digianl signature algorithm (DSA), MD5, RSA, RSA key exchange. Most common is RSA key exchange developed for SSL. Also FORTEZZA Cipher Suites for SSL 3.0. Optionally authenticate client to the server. Use public-key encryption techniques to generate shared secrets. Establish encrypted SSL connection. CS week13-appl.tex
19 SSL Handshake Outline using one of Cipher suites previously given. 1. Client sends SSL version number, cipher settings, randomly generated data and other information server needs. 2. Server sends server SSL version number, cipher settings, randomly generated data, other information and servers own certificate. Server may optionally request client s certificate. Client authenticates server certificate by using public key of public key of certificate authority (CA). See Figure Client creates premaster key for session and encrypts it with servers public key (obtained from server s certificate) and sends to server. 4. Client sends encrypted data based on own private key if client needs authentication. 5. Server generates master secret after optional client authentication. 6. Both client and server use master secret secret to generate session keys, which are symmetric keys for encryption/decryption of exchanged information during SSL session. 7. Client and server inform each other session key has been created. 8. SSL handshake is complete. Look at timings for cached and uncached key from IBM technical report. Client needs to verify server s Domain Name (DN) to make sure a man-in-the-middle does not intercept messages and substitute its own keys. CS week13-appl.tex
20 Multimedia Holy grail of computing lots of technical challenges, lots of potential profits. Generally concerned about continuous media audio and video. Particular characteristics of each in the text. Data compression is important to reduce the amount of data sent. Standards: JPEG used to compress still pictures. MPEG used to compress videos. Four kinds of frames (MPEG-1): 1. I (intracoded) frames: self-contained JPEG images 2. P (predictive) frames: block-by-block difference with last frame 3. B (bidirectional) frames: difference with last and next frame 4. D (DC-coded): block averages used for fast forward CS week13-appl.tex
Remote login (Telnet):
SFWR 4C03: Computer Networks and Computer Security Feb 23-26 2004 Lecturer: Kartik Krishnan Lectures 19-21 Remote login (Telnet): Telnet permits a user to connect to an account on a remote machine. A client
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi History of FTP The first proposed file transfer mechanisms were developed for implementation on hosts at M.I.T.
Chakchai So-In, Ph.D.
Application Layer Functionality and Protocols Chakchai So-In, Ph.D. Khon Kaen University Department of Computer Science Faculty of Science, Khon Kaen University 123 Mitaparb Rd., Naimaung, Maung, Khon
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP - Message Format. The Client/Server model is used:
Evolution of the WWW Communication in the WWW World Wide Web (WWW) Access to linked documents, which are distributed over several computers in the History of the WWW Origin 1989 in the nuclear research
2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
Applications and Services. DNS (Domain Name System)
Applications and Services DNS (Domain Name Service) File Transfer Protocol (FTP) Simple Mail Transfer Protocol (SMTP) Malathi Veeraraghavan Distributed database used to: DNS (Domain Name System) map between
Introduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP Abstract Message Format. The Client/Server model is used:
Evolution of the WWW Communication in the WWW World Wide Web (WWW) Access to linked documents, which are distributed over several computers in the History of the WWW Origin 1989 in the nuclear research
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces Yunfeng Fei, John Jones, Kyriakos Lakkas, Yuhong Zheng Abstract: In recent years many common applications have been modified
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Tera Term Telnet. Introduction
Tera Term Telnet Introduction Starting Telnet Tera Term is a terminal emulation program that enables you to log in to a remote computer, provided you have a registered account on that machine. To start
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
We mean.network File System
We mean.network File System Introduction: Remote File-systems When networking became widely available users wanting to share files had to log in across the net to a central machine This central machine
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
Networking Applications
Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Electronic Mail 1 Outline Introduction SMTP MIME Mail Access
Computer System Management: Hosting Servers, Miscellaneous
Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
1 Introduction: Network Applications
1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Email, SNMP, Securing the Web: SSL
Email, SNMP, Securing the Web: SSL 4 January 2015 Lecture 12 4 Jan 2015 SE 428: Advanced Computer Networks 1 Topics for Today Email (SMTP, POP) Network Management (SNMP) ASN.1 Secure Sockets Layer 4 Jan
Appendix. Web Command Error Codes. Web Command Error Codes
Appendix Web Command s Error codes marked with * are received in responses from the FTP server, and then returned as the result of FTP command execution. -501 Incorrect parameter type -502 Error getting
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
TELE 301 Network Management. Lecture 16: Remote Terminal Services
TELE 301 Network Management Lecture 16: Remote Terminal Services Haibo Zhang Computer Science, University of Otago TELE301 Lecture 16: Remote Terminal Services 1 Today s Focus Remote Terminal Services
Network Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
SSL A discussion of the Secure Socket Layer
www.harmonysecurity.com [email protected] SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
Overview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
Chapter 6 Virtual Private Networking Using SSL Connections
Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
File Transfer Protocol (FTP) Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Fall 2007, TAIWAN
File Transfer Protocol (FTP) Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Fall 2007, TAIWAN 1 Contents CONNECTIONS COMMUNICATION COMMAND PROCESSING
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT April 2009 EXAMINERS' REPORT Network Information Systems General Comments Last year examiners report a good pass rate with
End User Guide The guide for email/ftp account owner
End User Guide The guide for email/ftp account owner ServerDirector Version 3.7 Table Of Contents Introduction...1 Logging In...1 Logging Out...3 Installing SSL License...3 System Requirements...4 Navigating...4
CS 416: Opera-ng Systems Design
Question 1 Explain the major difference between a file system that supports journaling (e.g., Linux ext4) versus a log-structured file system (e.g., YAFFS2). Operating Systems 2015 Exam 3 Review Paul Krzyzanowski
Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
Network File System (NFS) Pradipta De [email protected]
Network File System (NFS) Pradipta De [email protected] Today s Topic Network File System Type of Distributed file system NFS protocol NFS cache consistency issue CSE506: Ext Filesystem 2 NFS
As enterprises conduct more and more
Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside
Enterprise Security Critical Standards Summary
Enterprise Security Critical Standards Summary The following is a summary of key points in the Orange County Government Board of County Commissioners (OCGBCC) security standards. It is necessary for vendors
It is the thinnest layer in the OSI model. At the time the model was formulated, it was not clear that a session layer was needed.
Session Layer The session layer resides above the transport layer, and provides value added services to the underlying transport layer services. The session layer (along with the presentation layer) add
ProxyCap Help. Table of contents. Configuring ProxyCap. 2015 Proxy Labs
ProxyCap Help 2015 Proxy Labs Table of contents Configuring ProxyCap The Ruleset panel Loading and saving rulesets Delegating ruleset management The Proxies panel The proxy list view Adding, removing and
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
Protocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
The Secure Sockets Layer (SSL)
Due to the fact that nearly all businesses have websites (as well as government agencies and individuals) a large enthusiasm exists for setting up facilities on the Web for electronic commerce. Of course
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
CS 164 Winter 2009 Term Project Writing an SMTP server and an SMTP client (Receiver-SMTP and Sender-SMTP) Due & Demo Date (Friday, March 13th)
CS 164 Winter 2009 Term Project Writing an SMTP server and an SMTP client (Receiver-SMTP and Sender-SMTP) Due & Demo Date (Friday, March 13th) YOUR ASSIGNMENT Your assignment is to write an SMTP (Simple
Cross-platform TCP/IP Socket Programming in REXX
Cross-platform TCP/IP Socket programming in REXX Abstract: TCP/IP is the key modern network technology, and the various REXX implementations have useful, if incompatible interfaces to it. In this session,
Internet Security [1] VU 184.216. Engin Kirda [email protected]
Internet Security [1] VU 184.216 Engin Kirda [email protected] Christopher Kruegel [email protected] Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will
Module 1. Introduction. Version 2 CSE IIT, Kharagpur
Module 1 Introduction Lesson 2 Layered Network Architecture Specific Functional Objectives On Completion of this lesson, the students will be able to: State the requirement for layered approach Explain
SMTP Servers. Determine if an email message should be sent to another machine and automatically send it to that machine using SMTP.
SMTP Servers SMTP: Simple Mail Transfer Protocol (TCP Port 25) The Simple Mail Transfer Protocol (SMTP) is an Internet standard for transferring electronic mail between computers. UNIX systems implement
1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.
Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
Cisco Secure PIX Firewall with Two Routers Configuration Example
Cisco Secure PIX Firewall with Two Routers Configuration Example Document ID: 15244 Interactive: This document offers customized analysis of your Cisco device. Contents Introduction Prerequisites Requirements
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
Fundamentals of the Internet 2009/10. 1. Explain meaning the following networking terminologies:
Fundamentals of Internet Tutorial Questions (2009) 1. Explain meaning the following networking terminologies: Client/server networking, Coax, twisted pair, protocol, Bit, Byte, Kbps, KBps, MB, KB, MBps,
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
F-Secure. Securing the Mobile Distributed Enterprise. F-Secure SSH User's and Administrator's Guide
F-Secure Securing the Mobile Distributed Enterprise F-Secure SSH User's and Administrator's Guide F-Secure SSH for Windows, Macintosh, and UNIX Secure Remote Login and System Administration User s & Administrator
Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol
SSL/TLS TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol HTTPS SSH SSH Protocol Architecture SSH Transport Protocol Overview SSH User Authentication Protocol SSH Connection Protocol
Implementing Secure Sockets Layer on iseries
Implementing Secure Sockets Layer on iseries Presented by Barbara Brown Alliance Systems & Programming, Inc. Agenda SSL Concepts Digital Certificate Manager Local Certificate Authority Server Certificates
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
Configuring Secure Socket Layer (SSL)
7 Configuring Secure Socket Layer (SSL) Contents Overview...................................................... 7-2 Terminology................................................... 7-3 Prerequisite for Using
finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,...
Read Chapter 9 Linux network utilities finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,... 1 Important to know common network terminology
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
First Semester Examinations 2011/12 INTERNET PRINCIPLES
PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES
What really is a Service?
Internet Services What really is a Service? On internet (network of networks), computers communicate with one another. Users of one computer can access services from another. You can use many methods to
Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.
Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A
Network Technologies
Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
Network Working Group Request for Comments: 840 April 1983. Official Protocols
Network Working Group Request for Comments: 840 J. Postel ISI April 1983 This RFC identifies the documents specifying the official protocols used in the Internet. Annotations identify any revisions or
File transfer clients manual File Delivery Services
File transfer clients manual File Delivery Services Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse
9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Multimedia Networking and Network Security
CMPT371 12-1 Multimedia Networking and Network Security 1 Multimedia Networking and Network Security This note is based on Chapters 7 and 8 of the text book. Outline of multimedia networking Multimedia
Protocolo FTP. FTP: Active Mode. FTP: Active Mode. FTP: Active Mode. FTP: the file transfer protocol. Separate control, data connections
: the file transfer protocol Protocolo at host interface local file system file transfer remote file system utilizes two ports: - a 'data' port (usually port 20...) - a 'command' port (port 21) SISTEMAS
Windows Server 2003 default services
Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.
Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and
