Top Banner
DISTRIBUTED APPLICATIONS by: Engr. Myra A. Manalo,PECE
34
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: d1.Distributed Applications

DISTRIBUTED

APPLICATIONS

by:

Engr. Myra A. Manalo,PECE

Page 2: d1.Distributed Applications

Distributed Application

File Transfer

Electronic Mail (E-mail)

Network Management

Page 3: d1.Distributed Applications

File Transfer

It is the downloading of sizable

data across the networks, it supports

the transfer of directories, files,

documents, image and streaming

media formats.

Page 4: d1.Distributed Applications

File Transfer Protocol or FTP, in computer

communications, on the Internet and other

networks, is a method of transferring files from

one computer to another. The protocol is a set of

rules that ensures a file is transmitted properly to

the receiving computer.

Page 5: d1.Distributed Applications

…A computer that stores files that can be

retrieved using FTP is called an FTP site or

FTP server. FTP is part of the Transmission

Control Protocol/Internet Protocol (TCP/IP),

the system that enables different types of

computers and networks on the Internet to

communicate.

Page 6: d1.Distributed Applications

The term "file transfer" is often linked to

the File Transfer Protocol (FTP), there are

numerous ways to transfer files over a

network. Servers which provide a file transfer

service are often called file servers.

Page 7: d1.Distributed Applications

File transfers can roughly be classified in two:

"Pull-based" file transfers where the receiver

initiates a file transmission request.

"Push-based" file transfers where the sender

initiates a file transmission request.

Page 8: d1.Distributed Applications

Some protocols for file

transfer may provide both of

these, and they are often

referred to as "uploading" or

"downloading", from the client's

perspective.

Page 9: d1.Distributed Applications

Distributed Application

• File Transfer

• Electronic Mail (E-mail)

• Network Management

Page 10: d1.Distributed Applications

ELECTRONIC MAIL

Page 11: d1.Distributed Applications

Electronic Mail

E-Mail

- in computer science, abbreviation of

the term electronic mail, method of

transmitting data or text files from one

computer to another over an intranet or

the Internet.

Page 12: d1.Distributed Applications

- enables computer users to send

messages and data quickly through a

local area network or beyond through

a nationwide or worldwide

communication network.

- came into widespread use in

the 1990s and has become a major

development in business and personal

communications.

Page 13: d1.Distributed Applications

Basic

nformation

About the

Electronic Mail

Page 14: d1.Distributed Applications

E-mail users create and send messages

from individual computers using commercial e-

mail programs or mail-user agents (MUAs). Most

of these programs have a text editor for

composing messages. The user sends a

message to one or more recipients by specifying

destination addresses. When a user sends an e-

mail message to several recipients at once, it is

sometimes called broadcasting.

Page 15: d1.Distributed Applications

…The address of an e-mail message includes

the source and destination of the message.

Different addressing conventions are used

depending upon the e-mail destination. An

interoffice message distributed over an intranet,

or internal computer network, may have a simple

scheme, such as the employee’s name, for the

e-mail address.

Page 16: d1.Distributed Applications

E-mail messages sent outside of an

intranet are addressed according to the

following convention:

The first part of the address contains the

user’s name, followed by the symbol @, the

domain name, the institution’s or organization’s

name, and finally the country name.

Page 17: d1.Distributed Applications

...A typical e-mail address might be

[email protected]. In this example sally is the

user’s name, abc is the domain name—the

specific company, organization, or institution that

the e-mail message is sent to or from, and the

suffix com indicates the type of organization that

abc belongs to.

Page 18: d1.Distributed Applications

com – commercial

mil – military

org – organization

gov – governmental

edu – educational

Page 19: d1.Distributed Applications

How

Electronic

Mail

Works

Page 20: d1.Distributed Applications
Page 21: d1.Distributed Applications

The diagram above shows a typical

sequence of events that takes place when

Alice composes a message using her mail

user agent (MUA). She types in, or selects

from an address book, the e-mail address of

her correspondent. She hits the "send"

button.

Page 22: d1.Distributed Applications

1. Her MUA formats the message in

Internet e-mail format and uses the

Simple Mail Transfer Protocol (SMTP)

to send the message to the local mail

transfer agent (MTA), in this case

smtp.a.org, run by Alice's Internet

Service Provider (ISP).

Page 23: d1.Distributed Applications

2. The MTA looks at the destination address provided in the SMTP protocol (not from the message header), in this case [email protected]. An Internet e-mail address is a string of the form [email protected], which is known as a Fully Qualified Domain Address (FQDA). The part before the @ sign is the local part of the address, often the username of the recipient, and the part after the @ sign is a domain name. The MTA looks up this domain name in the Domain Name System to find the mail exchange servers accepting messages for that domain.

Page 24: d1.Distributed Applications

3. The DNS server for the b.org domain, ns.b.org, responds with an MX record listing the mail exchange servers for that domain, in this case mx.b.org, a server run by Bob's ISP.

4. smtp.a.org sends the message to mx.b.org using SMTP, which delivers it to the mailbox of the user bob.

5. Bob presses the "get mail" button in his MUA, which picks up the message using the Post Office Protocol (POP3).

Page 25: d1.Distributed Applications

The Power

of

Electronic Mail

to go

Farther

Page 26: d1.Distributed Applications

…E-mail data travels from the sender’s computer to

a network tool called a message transfer agent

(MTA) that, depending on the address, either

delivers the message within that network of

computers or sends it to another MTA for distribution

over the Internet. The data file is eventually delivered

to the private mailbox of the recipient, who retrieves

and reads it using an e-mail program or MUA. The

recipient may delete the message, store it, reply to it,

or forward it to others.

Page 27: d1.Distributed Applications

…Modems are important devices that have

allowed for the use of e-mail beyond local area

networks. Modems convert a computer’s binary

language into an analog signal and transmit the

signal over ordinary telephone lines. Modems

may be used to send e-mail messages to any

destination in the world that has modems and

computers able to receive messages.

Page 28: d1.Distributed Applications

…E-mail messages display technical

information called headers and footers above

and below the main message body. In part,

headers and footers record the sender’s and

recipient’s names and e-mail addresses, the

times and dates of message transmission and

receipt, and the subject of the message.

Page 29: d1.Distributed Applications

…In addition to the plain text contained in the

body of regular e-mail messages, an increasing

number of e-mail programs allow the user to send

separate files attached to e-mail transmissions. This

allows the user to append large text- or graphics-

based files to e-mail messages.

Page 30: d1.Distributed Applications

Distributed Application

• File Transfer

• Electronic Mail (E-mail)

• Network Management

Page 31: d1.Distributed Applications

Network Management

Network management and system administration are

critical for a complex system of interconnected

computers and resources to remain operating. A

network manager is the person or team of people

responsible for configuring the network so that it runs

efficiently. For example, the network manager might

need to connect computers that communicate

frequently to reduce interference with other

computers.

Page 32: d1.Distributed Applications

…The system administrator is the person or

team of people responsible for configuring the

computer and its software to use the network.

For example, the system administrator may

install network software and configure a server's

file system so client computers can access

shared files.

Page 33: d1.Distributed Applications

…Networks are subject to hacking, or illegal

access, so shared files and resources must be

protected. A network intruder could eavesdrop on

packets being sent across a network or send

fictitious messages. For sensitive information,

data encryption (scrambling data using

mathematical equations) renders captured

packets unreadable to an intruder. Most servers

also use authentication schemes to ensure that a

request to read or write files or to use resources

is from a legitimate client and not from an

intruder.

Page 34: d1.Distributed Applications

Thank you