SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH

Slides:



Advertisements
Similar presentations
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
Advertisements

© Copyright 1997, The University of New Mexico C-1 Internet Service Provider Services What to do once you’re connected.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Windows Server 2008 Chapter 8 Last Update
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
1 Linux Networking and Security Chapter 3. 2 Configuring Client Services Configure DNS name resolution Configure dial-up network access using PPP Understand.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Chapter 7: Using Windows Servers to Share Information.
CHAPTER Protocols and IEEE Standards. Chapter Objectives Discuss different protocols pertaining to communications and networking.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Services Working at a Small-to-Medium Business or ISP – Chapter 7.
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
Chapter 3: Services of Network Operating Systems Maysoon AlDuwais.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
TCP/IP (Transmission Control Protocol / Internet Protocol)
1 Internet Protocols To support the Internet and all its services, many protocols are necessary Some of the protocols that we will look at: –Internet Protocol.
Linux Operations and Administration
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols.
Web Server Administration Chapter 4 Name Resolution.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
Web and Proxy Server.
Web Technology Seminar
Understand Names Resolution
Application Layer Functionality and Protocols Abdul Hadi Alaidi
Chapter 7: Using Windows Servers
Understanding Web Server Programming
Application Layer Functionality and Protocols
Application layer tcp/ip
Instructor Materials Chapter 5 Providing Network Services
Instructor Materials Chapter 10: Application Layer
Module 8: Networking Services
Chapter 5 Linux Services
The Internet.
Using MIS 2e Chapter 6 Appendix
Unit 5: Providing Network Services
TYPES OF SERVER. TYPES OF SERVER What is a server.
Working at a Small-to-Medium Business or ISP – Chapter 7
Chapter 10: Application Layer
Traditional Internet Applications
Working at a Small-to-Medium Business or ISP – Chapter 7
DHCP, DNS, Client Connection, Assignment 1 1.3
IIS.
Chapter 27: System Security
Application layer Lecture 7.
Working at a Small-to-Medium Business or ISP – Chapter 7
Goals Introduce the Windows Server 2003 family of operating systems
has many aspects that work together to give people almost instant communication from any computer on the internet to any other computer There.
Internet Protocols IP: Internet Protocol
Windows Server Administration Fundamentals
AbbottLink™ - IP Address Overview
INTERNET APPLICATIONS
Applications Layer Functionality & Protocols
APACHE WEB SERVER.
Chapter 7 Network Applications
Web Servers (IIS and Apache)
Data Communications and Networks
Presentation transcript:

SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH NETWORK SERVICES SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH

NETWORK SERVICES Network services are the foundation of a networked computing environment Network services are configured on corporate LAN’s to ensure security and user friendly operation Email, printing and network file sharing services are also network services

NETWORK SERVICES INCLUDE: Common network services include: Authentication servers Directory services Dynamic Host Configuration Protocol (DHCP) DNS e-Mail

Authentication Servers Authentication servers are servers that provide authentication services to users or other systems via networking. Authentication is used as the basis for authorization , privacy  and non-repudiation . The major authentication algorithms utilized are passwords, Kerberos, and public key encryption.

Directory Services A directory service is the software system that stores, organizes and provides access to information in a directory. They may be very narrow in scope, supporting only a small set of node types and data types, or they may be very broad. In a directory used by a network operating system, the nodes represent resources that are managed by the OS

dhcp The Dynamic Host Configuration Protocol (DHCP) is an auto configuration protocol used on IP networks. DHCP allows a computer to be configured automatically, eliminating the need for intervention by a network administrator. It also provides a central database for keeping track of computers that have been connected to the network. There are two versions of DHCP, one for IPv4 and one for IPv6

Electronic mails e-mail is a method of exchanging digital messages across the Internet or other computer networks. email server computer systems accept, forward, deliver and store messages on behalf of users. An electronic mail message consists of two components, the message header, and the message body, which is the email's content. emails carry multi-media content attachments.

Domain name systems(dns) It is a distributed hierarchical naming system for computers,services,or any other resource connected to internet or private network. It translates domain names into numerical identifiers associated with networking equipments. It also stores information such as, the list of mail servers that accept email for a given internet domain.

bind Berkeley Internet Name Domain maintains the DNS-related software suite that runs under Linux has a security record comparable to other modern Internet software. BIND itself was re-written in version 9, which has a security record comparable to other modern Internet software.

Domain name space

Domain name servers The Domain Name System is maintained by a distributed database system, which uses the client-server model. The nodes of this database are the name servers. The top of the hierarchy is served by the root nameservers, the servers to query when looking up (resolving) a top-level domain name (TLD). There are two types :authoritative name servers & caching only name servers.

File transfer protocol FTP is one of the most popular applications used to copy files between computers via a network connection. From the remote user's perspective, there are two types of FTP :regular FTP & remote FTP. The File Transfer Protocol (FTP) is used as one of the most common means of copying files between servers over the Internet. It operates in two connection channels: FTP Control Channel, TCP Port 21 FTP Data Channel, TCP Port 20

Types of ftp

vsftpd It stands for Very Secure FTP Daemon . It is used in Linux operating system for security. Passive FTP is present by default in Linux systems. Vsftpd version for REDHAT is vsftpd_2.0.4

How To Get VSFTPD Started With REDHAT to start, stop, or restart VSFTPD after booting we use these commands: [root@bigboy tmp]# /etc/init.d/vsftpd start [root@bigboy tmp]# /etc/init.d/vsftpd stop [root@bigboy tmp]# /etc/init.d/vsftpd restart We can configure VSFTPD to start at boot we use the chkconfig command. [root@bigboy tmp]# chkconfig vsftpd on

SENDMAIL Sendmail is a general purpose internetwork email routing facility that supports many kinds of mail- transfer and delivery methods. Sendmail is a well known project of the free and open source software and unix communities. To handle mails for a domain,DNS with MX record is configured for that domain.

Incoming mail & outgoing mail Incoming Mail : . Users retrieve their mail from the mail server using client software, such as Microsoft's Outlook or Outlook Express, that supports either the POP or IMAP mail retrieval protocols. Outgoing Mail : . PC and Linux workstation users configure their e-mail software to make the mail server their outbound SMTP mail server.

INSTALLING SENDMAIL use the chkconfig command to get sendmail configured to start at boot: [root@bigboy tmp]# chkconfig sendmail on To start, stop, and restart sendmail after booting, use : [root@bigboy tmp]# service sendmail start [root@bigboy tmp]# service sendmail stop [root@bigboy tmp]# service sendmail restart

test Mail Server's Name In DNS Firstly need to make sure that your mail server’s name resolves in DNS correctly. Testing can be done by using the host command: [root@smallfry tmp]# host bigboy.my-site.com bigboy.my-site.com has address 192.168.1.100 [root@smallfry tmp]#

Apache servers Apache is web server software notable for playing a key role in the initial growth of the World Wide Web.  Apache is primarily used to serve both static content and dynamic Web pages on the World Wide Web. Apache is used where content needs to be made available in a secure and reliable way.

How To Get Apache Started Use the chkconfig command to configure Apache to start at boot: [root@bigboy tmp]# chkconfig httpd on Use the httpd<code> init script in the <code>/etc/init.d directory to start,stop, and restart Apache after booting: [root@bigboy tmp]# /etc/init.d/httpd start [root@bigboy tmp]# /etc/init.d/httpd stop [root@bigboy tmp]# /etc/init.d/httpd restart

Virtual Hosting Virtual hosting is a method for hosting multiple domain names on a computer using a single IP address. Virtual hosting is a method for hosting multiple domain names on a computer using a single IP address. This allows one machine to share its resources, such as memory and processor cycles, to use its resources more efficiently.

Types of Virtual Hosting Name-based : make your Web server host more than one site per IP address by using Apache’s named virtual hosting features. IP-based : It consists of one IP address per website. It contains a single <VirtualHost>container per IP address.