Copyright © 2012 Certification Partners, LLC -- All Rights Reserved LESSON 9  Internet Services and Tools for Business.

Slides:



Advertisements
Similar presentations
Network Security.
Advertisements

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
File Transfer Methods : A Security Perspective. What is FTP FTP refers to the File Transfer Protocol, one of the protocols within the TCP/IP protocol.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
The Internet Useful Definitions and Concepts About the Internet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Remote Networking Architectures
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
Reliability and Performance Application protection IIS Reliable Restart Socket pooling Multisite hosting Process throttling Bandwidth throttling.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
CHAPTER 6 OPEN SOURCE SOFTWARE AND FREE SOFTWARE
2440: 141 Web Site Administration Remote Web Server Access Tools Instructor: Enoch E. Damson.
BASIC NETWORK CONCEPTS (PART 6). Network Operating Systems NNow that you have a general idea of the network topologies, cable types, and network architectures,
L ESSON 9: I NTERNET S ERVICES AND T OOLS FOR B USINESS.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Copyright © Texas Education Agency, All rights reserved.1 Web Technologies Web Administration.
1 Web Server Administration Chapter 9 Extending the Web Environment.
Module 4: Add Client Computers and Devices to the Network.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
14 Publishing a Web Site Section 14.1 Identify the technical needs of a Web server Evaluate Web hosts Compare and contrast internal and external Web hosting.
© 2011 Delmar, Cengage Learning Chapter 7 Managing a Web Server and Files.
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
THE INTERNET Chapter 13. Internet- Interconnection and Networks “the Net” Computers have played a significant role in our everyday life Growth in popularity.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols Network Fundamentals.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Linux+ Guide to Linux Certification, Second Edition Chapter 14 Network Configuration.
AE6382 Secure Shell Usually referred to as ssh, the name refers to both a program and a protocol. The program ssh is one of the most useful networking.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
1 Welcome to CSC 301 Web Programming Charles Frank.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Teaching and Learning with Technology ck to edit Master title style  Allyn and Bacon 2002 Teaching and Learning with Technology k to edit Master title.
Application Layer Honolulu Community College Cisco Academy Training Center Semester 1 Version
Networking in Linux. ♦ Introduction A computer network is defined as a number of systems that are connected to each other and exchange information across.
Kuliah Pengantar Teknologi Informasi Coky Fauzi Alfi cokyfauzialfi.wordpress.com Internet (2)
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
Administering Microsoft Windows Server 2003 Chapter 2.
Newsgroup World Wide Web (WWW) Conservation Over the Internet e.g.ICQ File Transfer Protocol (FTP) Includes 6 main services: Electronic Mail Remote.
Remote Access Usages. Remote Desktop Remote desktop technology makes it possible to view another computer's desktop on your computer. This means you can.
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Part 2.  Transmission methods used  Bandwidth:  The speed at which Data can be carried.
Guide to Parallel Operating Systems with Windows 7 and Linux Chapter 11 Networking.
Cygwin CMSC 104 UMBC.  CygWin is a collection of free software tools originally developed by Cygnus Solutions to allow various versions of Microsoft.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Security Management. Security Management is the organizational processes and relationships for managing risk – Policies, Procedures, Standards, Guidelines,
Chapter 13 FTP and Telnet Cisco Learning Institute Network+ Fundamentals and Certification Copyright ©2005 by Pearson Education, Inc. Upper Saddle River,
Click to edit Master subtitle style
Instructor Materials Chapter 5 Providing Network Services
Application Layer Honolulu Community College
FTP Lecture supp.
FTP - File Transfer Protocol
File Transfer Protocol
Section 14.1 Section 14.2 Identify the technical needs of a Web server
Configuring Internet-related services
Application Layer Functionality and Protocols
Radoslaw Jedynak, PhD Poland, Technical University of Radom
Computer Networks Protocols
Presentation transcript:

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved LESSON 9  Internet Services and Tools for Business

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved MASS AND TEXTING SERVICES  Two popular mass-marketing technologies used to push advertisements, promotions and emergency broadcasts to customers are:  Opt-in marketing  Opt-in mass texting services

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved LIST SERVERS  List server – collects and distributes information to and from listserve groups  List servers:  LISTSERV (  Majordomo (  Lyris (  Listserve group – participants who subscribe to a mailing list through a list server

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved FILE TRANSFER PROTOCOL (FTP)  Used to transfer files between two computers  Public FTP servers generally allow anonymous logon and allow downloading of files only  Files are downloaded via the FTP "get" command  Corporate FTP servers usually require a user name and password (you may upload files if you have permission)  Files are uploaded via the FTP "put" command  You can use command-line FTP, a browser’s built-in FTP client or a specialized FTP client  Secure versions of FTP include:  Secure Copy (SCP)  SSH File Transfer Protocol (S/FTP)  SSL/TLS-enabled FTP (FTPS)

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved MANAGING DOWNLOAD FILES  You may need to define MIME types for files that you download  Many files downloaded from FTP servers are compressed (using a compression utility) and must be decompressed before you can use them  Common compression utilities include:  Zip/unzip  Bzip2/bunzip2  Bzip/bunzip  Gzip/gunzip  Compress/uncompress  RAR/WinRAR

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved VIRTUAL NETWORK COMPUTING (VNC)  VNC allows you to control a computer at a remote location as if you were sitting in front of it  VNC consists of two components: the server and the viewer  The viewer and server do not need to be running the same operating system

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved REMOTE DESKTOP CONNECTION  Remote Desktop Connection is part of Microsoft Terminal Services, which is a suite of tools that enables computers to function as dedicated clients to a server running Windows  You use Remote Desktop Connection to control a remote computer; similar to VNC

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved PEER-TO-PEER NETWORKS  In a peer-to-peer network, each computer has both client and server capabilities  On the Internet, a peer-to-peer (referred to as P2P) network allows a group of users to connect with each other and directly share files among their hard drives  P2P networks are inexpensive and allow users to share bandwidth  BitTorrent is a P2P application used for downloading huge files (more than a gigabyte)

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved TROUBLESHOOTING USING TCP/IP TOOLS  The ipconfig command – displays your system's IP configurations  The ping command – tests connectivity between a source system and a destination system  The tracert command – determines the path between a source system and a destination system

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved OPEN-SOURCE DEVELOPMENT  Open source – a peer-based development process in which the source code is available to anyone and can be developed concurrently  Open source encourages wide adoption of software because it is not associated with a specific vendor  Open-source licenses:  GNU General Public License (GPL)  BSD License  Apache License  Mozilla Public License (MPL)  Common Public License (CPL)

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved PROPRIETARY SOFTWARE AND EULAS  Proprietary software – software that is owned by an author or entity  End-user license agreement (EULA) – a legal contract between the software's author and the end user who uses the software  A typical EULA:  Copyrights the code so that it belongs to the author  Specifies exactly how an end user may use the software

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved SOFTWARE PATENTS  Patent – a set of exclusive rights granted to an inventor for a fixed period of time upon disclosure of the invention  Patent jurisdiction:  Patents do not apply worldwide  You must apply to a specific patent office belonging to a particular country or group of countries  Patent controversy:  Patents can squelch creativity  Patents can increase cost  Patents are difficult to enforce and apply