Internet Services. Sadiq M. Sait, Ph.D
|
|
|
- Morgan Bond
- 10 years ago
- Views:
Transcription
1 Internet Services Sadiq M. Sait, Ph.D Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia Internet Short Course 1-1
2 What really is a Service? On internet (network of networks), computers communicate with one another. Users of one computer can access services from another. You can use many methods to communicate with a computer somewhere else on the Internet. These methods used to communicate are called services because they service your requests. There are a wide variety of services, and each can give you many kinds of information. In summary the internet is a: way to move data a bunch of protocols 1-2
3 Available Services Some most popular services on the Internet are:» » Telnet» FTP» WWW» Others (Archie, Wais, Gopher, News and News Groups, Internet Relay Chat, Internet Phone, Video Conferencing, & Internet Collaborative Tools) 1-3
4 Available Services» Electronic mail» Telnet: Remote login into computer networks» FTP: File Transfer Protocol for transferring computer files» WWW: World Wide Web» Gopher: Searchable index, selectable index of documents» USENET: Newsgroups with different subjects enable people with common interest to share information» Chat: Real-time communications between people on the Internet 1-4
5 Clients and Servers All that we speak of internet fall into three categories:» Clients» Servers» Content Software/Hardware that we use to browse the web, send mail, download files, etc are called clients. Servers respond to clients requests. 1-5
6 Most popular and widely used internet service (over 70 million users). Has become a de-facto standard of communication within the corporate and beyond. Works between disparate systems like PC, Unix, Mac, etc. Latest standards let users attach files (audio, video, animation, etc). Volume of data transferred is billions of bytes/day. 1-6
7 It is easy to send, read, reply to, and manage. It is convenient, global, economical and very fast. It has many advantages over regular methods such as postal service or fax technology. Studies have shown that recipients are more likely to reply to an message than a written request. can be read or written at any time, independent of time zones and business hours. 1-7
8 Advantages:» Standard way of communication for corporations» Less interference or interrupts between work» Reply with a number of options» No cost within the environment» Less chance of miscommunication» Can save messages for future retrieval and records Disadvantages» You need to have a computer and a network connection» Less personal than voice (although now we can also have voice mail, with some extra cost) 1-8
9 How works? Like other internet services is yet another client-server system, called SMTP (simple message transfer protocol). You use a mail client program to send a message to the post office server (an SMTP server). The post office server identifies the recipient s address and send the message through the internet to the mail server that handles mail for each recipient s address. The mail server stores the message in the recipient s mailbox. The recipient uses an client program to request new messages from the mail server. The mail server sends the message in the recipient s mailbox back to the mail client. 1-9
10 How works? Sender s Mail Client Post Office Server (SMTP) Mail Server (POP3) Recipient s Mail Client 1-10
11 How works? The Internet uses a TCP/IP-family protocol called Simple Mail Transfer Protocol (SMTP) as the standard method for transferring electronic mail. SMTP handles messages in queues (also called spools). When a message is sent to SMTP, it places it in an outgoing queue. 1-11
12 How does it work? SMTP attempts to forward the message from the queue whenever it connects to remote machines. Usually, if SMTP cannot forward the message within a given amount of time, it is returned with an error message, or simply dropped. When a connection is established between two computers that use SMTP, the two systems exchange authentication codes. 1-12
13 How does it Work? Each system sends a command to the other to identify the first mail message s sender and provides basic information about the message. The receiving system returns an acknowledgement, after which the message is transmitted. SMTP is smart enough to handle multiple destinations for the same message in an efficient manner. 1-13
14 Structure of A typical system, such as the one in a company office, usually consists of a mail server, a post office, and the clients. The mail system is tied directly to the local area network of the organization. 1-14
15 Hotmail, Yahoo Mail, Rocket Mail. Hotmail and it s cousins are all getting to be very popular because» they offer free accounts,» basically use Web-technology The disadvantage is that you have to» wait longer; frustrating experience if the mail is plenty and the lines are slow--which they are anyway, most of the time! The major advantage, however,» is access to mail from virtually anywhere they can access the WWW on the Internet» there is privacy, since mail is left on the server 1-15
16 Finding an Address: Finger and Whois Finger is a standard utility supplied with the TCP/IP protocol family that lets you determine who is a valid system user and who is logged into a system you have access to. Finger can be used to find out a person s username if a mail recipient is logged in on the destination machine. Finger shows you how long a user has been logged in, where they re logged in from, and what their login names are. 1-16
17 Whois The Whois program and its accompanying database is maintained by the Internet Network Information Center. The system is meant to be a database of all Internet users, but it is far from complete. One of the easiest ways to use the Whois service is to telnet to a Whois server and access the database directly. Alternatively, you can send an request to the Whois server and let it perform the search and mail back the results. 1-17
18 Formats Most systems do not impose limitations on the type of files that can be sent, as long as the network protocol can handle the characters. It is also common practice to compress large files for transmission. The Internet system handles binary files by converting them to 7-bit ASCII characters. 1-18
19 Mailing Lists A mailing list is a group of addresses that can be reached by sending a message to one address: the list address. Mail sent to that address is redistributed to all subscribers. Subscribers can have a discussion by sending messages to the list address (often called posting to the list). The list of addresses can be maintained by hand or with an automated list server system like Majordomo or ListProcessor. 1-19
20 Mailing Lists Mailing lists are good for many things such as:» distributing information from a central source to lots of people» Discussing a project among participants.» Exchanging questions and answers with other users of a product or service, or perhaps company technicalsupport personnel. To join just send mail to [email protected]. where listserv is commonly the account through which messages are distributed 1-20
21 Telnet Telnet is a program that lets you log into to a remote computer directly through the internet, and to compute on the remote computer Why Use Telnet? Telnet takes advantage of the way computers are linked in the network by passing your commands from the computer where you re located, onto another computer, which sends it to a third computer, and so on until it reaches the computer you want to access. 1-21
22 Telnet Technically telnet is a protocol. Telnet to Non-Standard Ports. This is accomplished by assigning each server a particular port number as identification. Telnetting a particular port enables you to log on to a remote system for a particular purpose. Connection can be established by using SLIP, PPP or dedicated lines. Usually available in the universities and Internet Service Providers. 1-22
23 Telnet Weakness Only console applications can run. No GUI support unless X terminals are used. Security risk because hackers can trap the IP address of the network. Least used part of the Web All ports numbered 80 will have Web sites; likewise all port 23s will be used for telnet, and multi-user games will always be found on 4201, etc. 1-23
24 FTP and Archie FTP is the short for File Transfer Protocol One of the oldest services on the internet and a common way for sending/receiving files. Allows you to examine the files of remote hosts on the Internet, and transfer files between your host and those hosts Companies provide FTP for downloading of evaluation software, demos, and beta software. Runs on all popular platforms, can run either via console, GUI or a browser One common type of FTP service is an anonymous FTP. 1-24
25 Anonymous FTP They are called anonymous because they accept the word anonymous as a login name, and your address as the password. With this kind of service, you can download or upload files without having an account on the machine. Most often used to download files. If the FTP server isn t anonymous, when you connect to the server you must provide a user name and password, just as though you were logging in to the machine. Anonymous FTP servers are one of the major means of distributing software and information across the Internet. 1-25
26 Anonymous FTP FTP servers are fairly straightforward. When a server receives a file request from an FTP client, it sends a copy of that file back to the client. Other commands instruct the server to send the client a directory of files, or to accept an upload from the client, etc. 1-26
27 FTP A large amount of software, mostly free, is available on anonymous FTP servers for many different types of computer systems. One of the most frustrating problems with the Internet is the difficulty of finding information such as FTP sites, host resources, sources of information, and so forth. Most FTP sites don t have a listing of all their available files, although some do. However, if you have access to WWW, there are services (both free and fee-based) that provide a WAIS based search from inside a WWW browser, helping in locating information. 1-27
28 Archie The archie service is a collection of resource discovery tools that together provide an electronic directory service for locating information in an Internet environment. Archie creates a central index of files available on anonymous FTP sites around the Internet. The Archie servers connect to anonymous FTP sites that agree to participate and download lists of all the files on these sites. These lists of files are merged into a database, which users can then search 1-28
29 Archie Users can access an archie server either through interactive sessions or through queries sent via electronic mail messages. The archie server automatically updates the listing information from each site about once a month. In addition to offering access to anonymous ftp listings, archie also permits access to the whatis description database. 1-29
30 WAIS WAIS stands for Wide Area Information Server and is pronounced ways. WAIS searches for words in documents. The core of the software is an indexer, used to create full-text indexes of files fed to it, and a server that can use those indexes to search for keywords or whole English expressions among the files indexed. 1-30
31 WAIS The server allows the user to specify that a particular document is similar to the one he wanted and uses the contents of the document to find more like it. This feature is called relevance feedback and is one of the most useful features WAIS has. The index contains the information the server needs to find a particular word in the database. 1-31
32 WAIS The clients simply build queries for the server in the appropriate format, display search results to users, and allow users to retrieve documents from the server. Sophisticated clients support many different document types, from plain ASCII text to graphical file formats like GIF and JPEG. Most of the WWW browsers nowadays have native support for WAIS, meaning that the browser can communicate directly with a WAIS server. 1-32
33 Gopher The term Gopher refers to: - A network protocol - A server type - One of the many Gopher client applications. Gopher protocol and software allow for browsing information systems so that one doesn t need to know exactly where the needed information is before looking for it. You do need to know the address of a Gopher server to get started, after you are there, the server software presents information in a clear, structured, hierarchical list. 1-33
34 Gopher Most Gopher sites have links to others, so after connecting to one, it is quite easy to jump to another. Gopher s user interface is very simple. Since the Gopher service is text-oriented, it performs well over slow links and can be used by people who only have dialin access to a machine on the internet. 1-34
35 Limitations of Gopher Gopher currently displays only ACSII text data, although you can transfer binary data and display it with other software. Most of the time, the menu-item descriptions are brief, sometimes too brief. Compared with WWW, Gopher can only provide links from menu items, whereas the Web can link from anywhere in the document. 1-35
36 Gopher Protocol The client connects to a server. The client sends the server a selector string (a string of characters that describes the location of a document on the server). The server responds by sending the requested file or directory. 1-36
37 Gopher+ An extended method of fetching the attributes of a Gopher item. Multiple formats of a document associated with a single menu item. A method of attaching a short description to a Gopher item. Forcing a client to fill out a form before retrieving an item and access control. 1-37
38 Veronica Veronica is a service that provides a (very large) index of titles of Gopher items from most servers throughout the Internet. The result of a Veronica search is a set of Gopher items whose titles contain the keyword that the user was searching for. The Veronica index is accessed via a normal Gopher search item. 1-38
39 Jughead Another Gopher directory search is Jughead. Jughead, like Veronica runs as a server on the Gopher site, and provides a pre-built table of directory information that can be searched. Unlike Veronica, Jughead is usually implemented for a particular Gopher site. 1-39
40 Other Services WWW News and NewsGroups Usenet Internet Relay Chat Internet Phone Internet Collaborative Tools 1-40
41 News & Newsgroups Network news is another way to take part in a lot of discussions over the internet, yet keeping them organized and separate from your mail. You don t have to subscribe to a mailing list, and you won t receive lots of mail. The news reader helps you keep everything in order. 1-41
42 UseNet UseNet is a service carried over the Internet that supports newsgroups. The messages everyone using the UseNet sends to a newsgroup, become available for anyone who accesses the newsgroup. Newsgroups are organized hierarchically, with the broadest grouping first in the name. 1-42
43 Newsgroups There are seven major news categories: comp, news, rec, sci, soc, talk, misc Servers can also get newsgroups by creating them locally. Server administrators can create whatever groups they like, corresponding to the interest of the users. 1-43
44 News Item A news item is very similar to an electronic mail message. It has the same general parts as an message; a header and a body. The body of a news item is the message s text. The header tells the news software how to spread the item throughout the Internet. 1-44
45 Internet Relay Chat IRC (Internet Relay Chat) allows you to talk (write) to people from all over the world about a variety of topics, simultaneously and online. It is mostly used as a recreational communication system. It is again a client-server design. The client software allows you to connect to the IRC server, which accepts connections from many IRC clients at the same time. The various IRC servers across the Internet are interconnected. 1-45
46 Internet Relay Chat There are a number of IRC servers running on the Internet, some of them are: irc.netsys.com irc.indiana.edu irc.nada.kth.se irc.caltech.edu csa.bu.edu When you connect to an IRC server, you will usually be asked for a port number in addition to the Internet address. Most of the time, this port number is 6667 Some IRC Terms: Nicknames, IRC Channels 1-46
47 Internet Phone Internet phones let you talk (literally talk, with voice not in writing) to people all over the world, just for the price of your Internet connection. It demands a reasonably fast machine with support for audio devices. Internet phones are essentially for point-to-point communications. The heart of any Internet phone tool is the codec, the software that compresses/decompresses the digitized voice data Most Internet Phones offer more than just telephony, e.g., voice mail, answering machines, and similar features. 1-47
48 Video Conferencing Internet Video Conferencing offers a low-cost alternative to traditional proprietary systems. It demands high bandwidths. It requires a video camera and related hardware card. Video-conferencing is largely point-to-point. Only very few packages support true multi-conferencing. 1-48
49 Internet Collaborative Tools Internet collaborative products deliver a host of interactive technologies that bring workgroups closer together. Multiple users can work together in an application, sketch out ideas, chat, and pass files back and forth. 1-49
What really is a Service?
Internet Services What really is a Service? On internet (network of networks), computers communicate with one another. Users of one computer can access services from another. You can use many methods to
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
THE WHOLE INTERNET USER'S GUIDE & CATALOG EDKROL
THE WHOLE INTERNET USER'S GUIDE & CATALOG EDKROL O'REILLY & ASSOCIATES, INC. 103 MORRIS STREET, SUITE A SEBASTOPOL CA 95472 (800) 998-9938 (707) 829-0515 EMAIL: [email protected] OR uunet!ora!nuts TABLE OF
Remote login (Telnet):
SFWR 4C03: Computer Networks and Computer Security Feb 23-26 2004 Lecturer: Kartik Krishnan Lectures 19-21 Remote login (Telnet): Telnet permits a user to connect to an account on a remote machine. A client
MMGD0204 Web Application Technologies. Chapter 1 Introduction to Internet
MMGD0204 Application Technologies Chapter 1 Introduction to Internet Chapter 1 Introduction to Internet What is The Internet? The Internet is a global connection of computers. These computers are connected
Masters of Science in Information Technology
Objective: At the end of this module, you must be able to 1. Establish a basic understanding of the Internet 2. Understand the Internet's evolution What is Internet? Internet is a vast collection of different
Email Electronic Mail
Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing
Chapter NET 2 What is the Internet? Internet Development Primary Internet Protocol
Chapter NET 2 INTRODUCTION TO THE INTERNET AND WORLD WIDE WEB Before the 90 s the Internet was the domain of the computer industry, universities, and the government. Today there are many people that are
The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
CREATING YOUR ONLINE PRESENCE
CREATING YOUR ONLINE PRESENCE Congratulations on signing up for your webhosting package, you ve just completed the first and most important step in establishing your online presence. There are just a few
Chapter 7. The Internet and World Wide Web. What You Will Learn... Computers Are Your Future. The Internet. What You Will Learn...
What You Will Learn... Computers Are Your Future Chapter 7 How the Internet works Methods for accessing the Internet The Internet and the World Wide Web Hypertext Web browsers and Web servers The Internet
Machine control going www - Opportunities and risks when connecting a control system to the Internet
B&R Industrial Automation Corp. 1325 Northmeadow Parkway, S-130 Tel: (770) 772-0400 E-mail: [email protected] Roswell, Georgia 30076 Fax: (770) 772-0243 Internet: www.br-automation.com Machine
FTP Use. Internal NPS FTP site instructions using Internet Explorer:
FTP Use File Transfer Protocol (FTP), a standard Internet protocol, is the simplest way to exchange files between computers on the Internet. Like the Hypertext Transfer Protocol (HTTP), which transfers
Chakchai So-In, Ph.D.
Application Layer Functionality and Protocols Chakchai So-In, Ph.D. Khon Kaen University Department of Computer Science Faculty of Science, Khon Kaen University 123 Mitaparb Rd., Naimaung, Maung, Khon
RingCentral Office@Hand from AT&T Desktop App for Windows & Mac. User Guide
RingCentral Office@Hand from AT&T Desktop App for Windows & Mac User Guide RingCentral Office@Hand from AT&T User Guide Table of Contents 2 Table of Contents 3 Welcome 4 Download and install the app 5
NETWORKS AND THE INTERNET
NETWORKS AND THE INTERNET Outline to accompany the slide presentation 1. Networks and the Internet A Primer for Prosecutors and Investigators 2. Getting There From networks to the Internet Locating a place
Best practice for SwiftBroadband
Best practice for SwiftBroadband Version 01 30.01.08 inmarsat.com/swiftbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
Using email over FleetBroadband
Using email over FleetBroadband Version 01 20 October 2007 inmarsat.com/fleetbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
Networking Applications
Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Electronic Mail 1 Outline Introduction SMTP MIME Mail Access
Technology/Internet Usage Workshop
Technology/Internet Usage Workshop 1) Workshop Goals (1 st Slide) 2) Computers Desk Top (Show examples) Lap-Top Hand-held Wireless Device Introduce Tammy Welsh from Gateway 3) What is the Internet? The
Chapter 2 Application Layer. Lecture 5 FTP, Mail. Computer Networking: A Top Down Approach
Chapter 2 Application Layer Lecture 5 FTP, Mail Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Chapter 2: outline 2.1 principles
Fundamentals of the Internet 2009/10. 1. Explain meaning the following networking terminologies:
Fundamentals of Internet Tutorial Questions (2009) 1. Explain meaning the following networking terminologies: Client/server networking, Coax, twisted pair, protocol, Bit, Byte, Kbps, KBps, MB, KB, MBps,
The Internet and Network Technologies
The Internet and Network Technologies Don Mason Associate Director Copyright 2013 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
Web Browsers And Mailing Tools
Web Browsers And Mailing Tools Introduction: Network A network is an interconnection between two or more computers or other computing devices which are connected together usually through a cable to share
Preventing credit card numbers from escaping your network
Preventing credit card numbers from escaping your network The following recipe describes how to configure your FortiGate to use DLP (Data Loss Prevention) so that credit card numbers cannot be sent out
Introduction to Web Technology. Content of the course. What is the Internet? Diana Inkpen
Introduction to Web Technology Content of the course Diana Inkpen The Internet and the WWW. Internet Connectivity. Basic Internet Services. University of Ottawa School of Information Technology and Engineering
1 Getting Started. Before you can connect to a network
1 Getting Started This chapter contains the information you need to install either the Apple Remote Access Client or Apple Remote Access Personal Server version of Apple Remote Access 3.0. Use Apple Remote
Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU2. 1.0 Key Features
1.0 Key Features Addonics T E C H N O L O G I E S NAS Adapter Model: NASU2 User Manual Convert any USB 2.0 / 1.1 mass storage device into a Network Attached Storage device Great for adding Addonics Storage
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check
Lesson 7 - Website Administration
Lesson 7 - Website Administration If you are hired as a web designer, your client will most likely expect you do more than just create their website. They will expect you to also know how to get their
Managing your e-mail accounts
Managing your e-mail accounts Introduction While at Rice University, you will receive an e-mail account that will be used for most of your on-campus correspondence. Other tutorials will tell you how to
Device Log Export ENGLISH
Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,
CS43: Computer Networks Email. Kevin Webb Swarthmore College September 24, 2015
CS43: Computer Networks Email Kevin Webb Swarthmore College September 24, 2015 Three major components: mail (MUA) mail transfer (MTA) simple mail transfer protocol: SMTP User Agent a.k.a. mail reader composing,
Remote Logging. Tanveer Brohi(14cs28)
Remote Logging Tanveer Brohi(14cs28) 1 Contents Introduction TELNET SSH Advantages and Disadvantages Conclusion References 2 Introduction What is remote logging? Remote logging is the capability to access
Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP - Message Format. The Client/Server model is used:
Evolution of the WWW Communication in the WWW World Wide Web (WWW) Access to linked documents, which are distributed over several computers in the History of the WWW Origin 1989 in the nuclear research
List of Common TCP/IP port numbers
List of Common TCP/IP port numbers For those of you who configure firewalls, routers, port forwarding, and applications connectivity, this regularly updated document lists all standard, common, well known,
Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP Abstract Message Format. The Client/Server model is used:
Evolution of the WWW Communication in the WWW World Wide Web (WWW) Access to linked documents, which are distributed over several computers in the History of the WWW Origin 1989 in the nuclear research
RADMIN remote control software. Product Overview. What is Radmin? Innovative screen capture technology
What is Radmin? Radmin is a secure and reliable Windows-based remote control program, which allows you to work on several computers through a simple and familiar graphical interface. Radmin allows a user
The Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:
The Internet Chapter 10 Learning Objectives After reading this chapter, you should be able to: Discuss the responsibilities of the Internet Protocol (IP) and how IP can be used to create a connection between
Configuring your email client to connect to your Exchange mailbox
Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add
Web Design I. Introduction. This first exercise will cover the following concepts: Tutorial Topics
Web Design I Web Enhancement XHTML/CSS Tutorial One Getting Started With the Internet Introduction Tutorial Topics This is the first of a series of tutorials to assist students enrolled in the XHTML/CSS
Uploading files to FTP server
V.150630 1. Overview Uploading files to FTP server The instructions in this article will explain how to upload the snapshots and videos from your camera to a FTP server. FTP is an Internet communications
Hosted Fax Mail. Hosted Fax Mail. User Guide
Hosted Fax Mail Hosted Fax Mail User Guide Contents 1 About this Guide... 2 2 Hosted Fax Mail... 3 3 Getting Started... 4 3.1 Logging On to the Web Portal... 4 4 Web Portal Mailbox... 6 4.1 Checking Messages
CPSC 360 - Network Programming. Email, FTP, and NAT. http://www.cs.clemson.edu/~mweigle/courses/cpsc360
CPSC 360 - Network Programming E, FTP, and NAT Michele Weigle Department of Computer Science Clemson University [email protected] April 18, 2005 http://www.cs.clemson.edu/~mweigle/courses/cpsc360
1 Introduction: Network Applications
1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video
Basic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi History of FTP The first proposed file transfer mechanisms were developed for implementation on hosts at M.I.T.
DigiDelivery Client Quick Start
DigiDelivery Client Quick Start Installing the DigiDelivery Client To download and install the DigiDelivery client software: 1 Launch your Web browser and navigate to www.digidesign.com/digidelivery/clients.
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work
N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if
Networks and the Internet A Primer for Prosecutors and Investigators
Computer Crime & Intellectual Property Section Networks and the Internet A Primer for Prosecutors and Investigators Michael J. Stawasz Senior Counsel Computer Crime and Intellectual Property Section ()
AT&T Voice DNA User Guide
AT&T Voice DNA User Guide Page 1 Table of Contents GET STARTED... 4 Log In... 5 About the User Dashboard... 9 Manage Personal Profile... 15 Manage Messages... 17 View and Use Call Logs... 22 Search the
POP3 Connector for Exchange - Configuration
Eclarsys PopGrabber POP3 Connector for Exchange - Configuration PopGrabber is an excellent replacement for the POP3 connector included in Windows SBS 2000 and 2003. It also works, of course, with Exchange
Quick Scan Features Setup Guide. Scan to E-mail Setup. See also: System Administration Guide: Contains details about E-mail setup.
Quick Scan Features Setup Guide XE3024EN0-2 This guide includes instructions for: Scan to E-mail Setup on page 1 Scan to Mailbox Setup on page 6 Network Scanning Setup on page 9 Scan to PC Setup on page
Protocolo FTP. FTP: Active Mode. FTP: Active Mode. FTP: Active Mode. FTP: the file transfer protocol. Separate control, data connections
: the file transfer protocol Protocolo at host interface local file system file transfer remote file system utilizes two ports: - a 'data' port (usually port 20...) - a 'command' port (port 21) SISTEMAS
Web Technologies for Beginners NME Programme - Notes. Part 1 Introduction to Internet
1 Web Technologies for Beginners NME Programme - Notes Part 1 Introduction to Internet This Page is intentionally left blank 2 3 UNIT I Internet Programming LESSON 1 Structure 1.0 Objective 1.1 Introduction
Basics of VoIP Origination
Basics of VoIP Origination Version 1.1 July 26, 2006 AdvancedVoIP.com [email protected] [email protected] Phone: +1 213 341 1431 Copyright AdvancedVoIP.com, 1999-2006. All Rights Reserved.
Using Avaya Aura Messaging
Using Avaya Aura Messaging Release 6.3.2 Issue 1 December 2014 Contents Chapter 1: Getting Started... 4 Messaging overview... 4 Prerequisites... 4 Accessing your mailbox from any phone... 4 Accessing the
How to register and use our Chat System
How to register and use our Chat System Why this document? We have a very good chat system and easy to use when you are set up, but getting registered and into the system can be a bit complicated. If you
Protocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
Why your own server space? Why should you set it up?
Lab 5 servers Why your own server space? Why should you set it up? -Control factors -Demystifying how things get on the internet -Project from start to finish What is the Difference Between a Digital Art
Email Integration for Open Text Fax Appliance and Open Text Fax Appliance, Premier Edition
Email Integration for Open Text Fax Appliance and Open Text Fax Appliance, Premier Edition Open Text Fax and Document Distribution Group October 2009 2 White Paper Contents Introduction...3 Who Should
Troubleshooting / FAQ
Troubleshooting / FAQ Routers / Firewalls I can't connect to my server from outside of my internal network. The server's IP is 10.0.1.23, but I can't use that IP from a friend's computer. How do I get
SNMPc Release 7.0 Disaster Recovery Support. Castle Rock Computing March, 2004
SNMPc Release 7.0 Disaster Recovery Support Castle Rock Computing March, 2004 Overview Communication networks have become an indispensable part of modern enterprises. Employee and customer interaction,
Interwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
U.S. Bank Secure Mail
U.S. Bank Secure Mail @ Table of Contents Getting Started 3 Logging into Secure Mail 5 Opening Your Messages 7 Replying to a Message 8 Composing a New Message 8 1750-All Introduction: The use of email
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols. Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria
Napster and Gnutella: a Comparison of two Popular Peer-to-Peer Protocols Anthony J Howe Supervisor: Dr Mantis Cheng University of Victoria February 28, 2002 Abstract This article presents the reverse engineered
Vodafone Email Plus. User Guide for Windows Mobile
Vodafone Email Plus User Guide for Windows Mobile 1 Table of Contents 1 INTRODUCTION... 4 2 INSTALLING VODAFONE EMAIL PLUS... 4 2.1 SETUP BY USING THE VODAFONE EMAIL PLUS ICON...5 2.2 SETUP BY DOWNLOADING
Introduction to LAN/WAN. Application Layer (Part II)
Introduction to LAN/WAN Application Layer (Part II) Application Layer Topics Domain Name System (DNS) (7.1) Electronic Mail (Email) (7.2) World Wide Web (WWW) (7.3) Electronic Mail (Email) Mostly used
MSSQL quick start guide
C u s t o m e r S u p p o r t MSSQL quick start guide This guide will help you: Add a MS SQL database to your account. Find your database. Add additional users. Set your user permissions Upload your database
Document Management Glossary
Document Management Glossary CVS - Concurrent Versions System and is a process of sharing, saving and recovering version information for people using code. Document - Information stored in files on a pc
Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started
Webmail User Manual Table of Contents Chapter 1 INTRODUCTION TO MAILENABLE SOFTWARE... 3 MailEnable Webmail Introduction MailEnable Requirements and Getting Started Chapter 2 MAILENABLE KEY FEATURES OVERVIEW...
EXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
Linux Network Administration
Linux Network Administration Sendmail Evolution of Email The birth of electronic mail (email) occurred in the early 1960s The mailbox was a file in a user's home directory that was readable only by that
Internet Technology 2/13/2013
Internet Technology 03r. Application layer protocols: email Email: Paul Krzyzanowski Rutgers University Spring 2013 1 2 Simple Mail Transfer Protocol () Defined in RFC 2821 (April 2001) Original definition
Digital Scanning Solutions. Versatile, affordable scanning solutions for every day business. Digital Printing Solutions
Digital Scanning Solutions Versatile, affordable scanning solutions for every day business Digital Printing Solutions Innovative yet reasonably priced scanning solutions from Samsung Scan to USB, E-mail,
lesson 19 Internet Basics
lesson 19 Internet Basics This lesson includes the following sections: The Internet: Then and Now How the Internet Works Major Features of the Internet Online Services Internet Features in Application
SMTPSWITCH MAILER V6 FEATURES
SMTPSWITCH MAILER V6 FEATURES 22 Powerful Features Packed in a Single Email Marketing/Bulk Mailing Program! Easy and Advanced WYSIWYG/HTML Editing SMTPSwitch Mailer has a powerful built-in WYSIWYG editor
District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification
1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.
Configuring, Customizing, and Troubleshooting Outlook Express
3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane
CITS1231 Web Technologies. Client, Server, the Internet, and the Web
CITS1231 Web Technologies Client, Server, the Internet, and the Web Topic Outline How does the Internet work Client Server Architecture Connections Communications Protocols Addressing Routing One of the
How To Protect Your Email From Being Hacked On A Pc Or Mac Or Ipa From Being Stolen On A Network (For A Free Download) On A Computer Or Ipo (For Free) On Your Pc Or Ipom (For An Ipo
The Case for Email Security secure, premium by Erik Kangas, President, Lux Scientiae Section 1: Introduction to Email Security You may already know that email is insecure; however, it may surprise you
Chapter 9 The Internet
CSCA0101 COMPUTING BASICS Chapter 9 1 1. 2. Types of Network 3. What Makes Internet Works? 4. Internet Equipment 5. Internet Applications 2 A global network connecting millions of computers More than 100
C-more Remote Access, Data Log, FTP File Transfer, and Email Tutorial
C-more Remote Access, Data Log, FTP File Transfer, and Email Tutorial P a g e 2 Introduction: This script will walk you through the basic process of setting up the remote access, data logging, FTP file
Quick Start Guide. Your New Email Account
Quick Start Guide Your New Email Account http://www.names.co.uk/support/ Table of Contents Adding a new email account... 3 Adding a new email address... 5 Adding a mail group... 6 How to check your emails...
1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.
Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process
I-Fax (Internet Fax) 1: Basic Overview. 2: Benefits to the customer. Machines included:
(Internet Fax) Machines included: HL-4040CN HL-4050CDN HL-4070CDW DCP-9040CN DCP-9045CDN MFC-9440CN MFC-9840CDW DCP-8060 DCP-8065DN MFC-8460N MFC-8860DN MFC-8870DW Contents 1) Overview 2) Benefits to the
USING OUTLOOK WITH ENTERGROUP. Microsoft Outlook
USING OUTLOOK WITH ENTERGROUP In this tutorial you will learn how to use Outlook with your EnterGroup account. You will learn how to setup an IMAP or POP account, and also how to move your emails and contacts
Customization & Enhancement Guide. Table of Contents. Index Page. Using This Document
Customization & Enhancement Guide Table of Contents Using This Document This document provides information about using, installing and configuring FTP Attachments applications provided by Enzigma. It also
FTP Service Reference
IceWarp Server FTP Service Reference Version 10 Printed on 12 August, 2009 i Contents FTP Service 1 V10 New Features... 2 FTP Access Mode... 2 FTP Synchronization... 2 FTP Service Node... 3 FTP Service
Quick Scan Features Setup Guide
Xerox WorkCentre 7132 Quick Scan Features Setup Guide 701P45042 This guide includes instructions for: Scan to Email on page 1 Scan to Mailbox Setup (Optional) on page 5 Network Scanning Setup (Optional)
TNote125 Student Locator Framework Email Notification Diagnostics
Technical Note 125 September 25, 2006 TNote125 Student Locator Framework Email Notification Diagnostics The Student Locator Agent uses standard Internet email to notify designated administrators when a
RingCentral for Desktop. UK User Guide
RingCentral for Desktop UK User Guide RingCentral for Desktop Table of Contents Table of Contents 3 Welcome 4 Download and install the app 5 Log in to RingCentral for Desktop 6 Getting Familiar with RingCentral
Server Setup. Basic Settings
Server Setup Basic Settings CrushFTP has two locations for its preferences. The basic settings are located under the "Prefs" tab on the main screen while the advanced settings are under the file menu.
MMLIST Listserv User's Guide for ICORS.ORG
MMLIST Listserv User's Guide for ICORS.ORG 12/12/06 Version 1.1 To Send Mail to the Listserv: [email protected] Only Subscribed Users can send mail to the Listserv. Anyone can have a Subscription.
