Download presentation
Presentation is loading. Please wait.
Published byScott Briggs Modified over 9 years ago
1
CE80N Introduction to Networks & The Internet Dr. Chane L. Fullmer UCSC Winter 2002
2
March 5, 2002CE80N -- Lecture #172 Class Information Web page tutorial available on-line Web page submission: –Email to venkat@cse.ucsc.eduvenkat@cse.ucsc.edu Subject: cmpe080n-assgn4 –Must be emailed on or before March 15 No extensions can be granted – don’t be late Final Exam –Last class session March 14, 2002 –Similar to midterm – open notes/open book
3
March 5, 2002CE80N -- Lecture #173 Personal Web Page of the Day A few brave souls…. Presenting: –http://members.cox.net/fumanstan/http://members.cox.net/fumanstan/
5
March 5, 2002CE80N -- Lecture #175 Facsimile (AKA as FAX) The first facsimile transmission: –1843 by Alexander Bain’s “Recording Telegraph” Early fax machines were expensive and proprietary – no interoperation between brands –Used by weather and news services (wire photos) 1984 – Standardized by the CCITT (The International Telegraph and Telephone Consultative Committee) –Uses basic telephone for interconnections –Today, millions sold annually… –Works globally – where ever there’s a phone.
6
March 5, 2002CE80N -- Lecture #176 Sending A Fax The Internet can be used to send a fax. –A document, image, etc. is converted to a file in facsimile format that can be transmitted via a fax modem to the destination fax machine. –A facsimile received via the fax modem from a fax machine is stored as a file that can later be viewed or printed. –C.L. Fullmer, et al “A TCP/IP Network Facsimile System built from publicly available software”, ACM 20 th Computer Science Conference, March 1992, Kansas City, Mo. Why bother? –Automated document retrieval/report generation –Saves money – no long distance/toll charges –Transmits faster than conventional fax Bandwidth in the Internet connection is often higher than the fixed voice circuit (64kbps)
7
March 5, 2002CE80N -- Lecture #177 The Internet Used To Copy Files E-mail or fax can be used to send short notes. Download should be used to send large volumes of data. –Large documents/images –Audio – CDs –Video clips –Software (ie, Free BSD)
8
March 5, 2002CE80N -- Lecture #178 Data Stored In Files Disks hold large volumes of data. –Stores data in files –Collects files together in folders (aka directories)
9
March 5, 2002CE80N -- Lecture #179 Copying A File The network can transfer a file from one computer disk to another. –Uses software developed early in ARPANET called file transfer –Uses a protocol called File Transfer Protocol (FTP) –Today, the application software itself is also called ftp.
10
March 5, 2002CE80N -- Lecture #1710 FTP Is Interactive A user invokes the FTP application. –Presents the user with a prompt –Waits for the user to enter a command
11
March 5, 2002CE80N -- Lecture #1711 Example FTP Commands Many FTP commands are available. You only need three simple commands to get a file from a remote machine:
12
March 5, 2002CE80N -- Lecture #1712 A User Can Store Or Retrieve A File FTP can retrieve (get) a copy of a file. –Contacts a remote computer –Obtains a copy of a file FTP can store (put) a copy of a file. –Contacts a remote computer –Sends a copy of a file (Uses the put command, instead of get)
13
March 5, 2002CE80N -- Lecture #1713 Commands For Binary And Text File Format There are two FTP file formats: –Using text Text files are not always obvious –Using binary Non text files may include: –Graphics – Audio –Video –Compressed data
14
March 5, 2002CE80N -- Lecture #1714 Choosing ASCII or Binary Transfer FTP does not understand the format or contents of a file. –Using the incorrect transfer type results in a malformed copy –Using binary to transfer a file is safer if in doubt
15
March 5, 2002CE80N -- Lecture #1715 Commands For Authorization And Anonymous FTP A remote FTP service asks users for authorization by: –Prompting for a login identifier –Prompting for a password Anonymous FTP allows anyone to access public files by: –Entering login of anonymous –Entering password of guest Sometimes email address is used for password
16
March 5, 2002CE80N -- Lecture #1716 FTP Live Demonstration
17
March 5, 2002CE80N -- Lecture #1717 A Browser Can Use FTP The URL specifies to the browser to use FTP. –ftp://www.soe.ucsc.edu/classes/cmpe080n/Winter02/lec1.pdfftp://www.soe.ucsc.edu/classes/cmpe080n/Winter02/lec1.pdf –ftp://ftp.cs.purdue.edu/pub/comer/exampleftp://ftp.cs.purdue.edu/pub/comer/example All the details are handled by the browser. –Uses anonymous FTP
18
March 5, 2002CE80N -- Lecture #1718 How FTP Works FTP uses the client-server approach. –Uses TCP/IP for data transfer –Acting as the client FTP application software User’s browser –Acting as the server Remote computer
19
FTP Client-Server example
20
March 5, 2002CE80N -- Lecture #1720 Impact and Significance Of FTP FTP data transfer caused more traffic on the early Internet than any other application. –Replaced by Web traffic in 1995
21
March 5, 2002CE80N -- Lecture #1721 Fax/FTP Summary Faxes can be converted to files and transported over the Internet FTP – File Transfer Protocol –Client-Server architecture –FTP is interactive –“Anonymous” FTP for public access to files Web browsers can use FTP
23
March 5, 2002CE80N -- Lecture #1723 Glossary Anonymous FTP –Use of the special login anonymous to obtain access to public files through the FTP service. Binary file –Term is used to refer to nontext files.
24
March 5, 2002CE80N -- Lecture #1724 Glossary Directory –A collection of files and other directories. Some computer systems use the term folder. File Transfer Protocol –(FTP) The Internet service used to transfer a copy of a file from one computer to another.
25
March 5, 2002CE80N -- Lecture #1725 Glossary Folder –A synonym for directory. Internet FAX –A fax sent across the Internet instead of a conventional telephone connection. Login –The process of entering an account identifier and password to obtain access to a timesharing computer.
26
March 5, 2002CE80N -- Lecture #1726 Glossary Password –The secret code a user enters to gain access to a timesharing system or to gain authorization for the FTP service. Public files –Files that are available to any Internet user. Text file –Any file that consists of textual characters separated into lines.
28
March 5, 2002CE80N -- Lecture #1728 Early Computers Used Textual Interfaces When the Internet was being invented, computers consisted of timesharing systems. –Allowed many users to access the system simultaneously –Appeared to operate the same as a personal computer
29
March 5, 2002CE80N -- Lecture #1729 A Timesharing System Requires User Identification Because multiple users can interact with a timesharing computer, the system requires each user to identify themselves when they begin. –Requires: a login identifier a password
30
March 5, 2002CE80N -- Lecture #1730 Remote Login Resembles Conventional Login Remote login service allows a user to access a remote timesharing computer system. –To use the service, a user: Invokes an application program Specifies the name of a remote computer Provides a login identification Specifies a password
31
March 5, 2002CE80N -- Lecture #1731 How Remote Login Works Remote login follows the client-server paradigm. The client: –Is the application that uses TCP/IP to connect The server: –Allows the user to interact with the remote computer –Sends output to the client
32
Remote Login Example Figure 28.1 Remote login across the Internet uses two programs. The user invokes an application on the local computer. The local application connects the user’s keyboard and display to the remote timesharing system.
33
March 5, 2002CE80N -- Lecture #1733 Escaping From Remote Login Client software provides a way for a user to escape and communicate with the local client. –Provides a key on the keyboard to abort a running program –Why do we need it? An application runs on the remote computer The remote login client is running on the local computer If one, or both applications freeze (fail in some way) we have a way to regain control of the local computer system.
34
March 5, 2002CE80N -- Lecture #1734 Displays And Windows On a computer system using windows, remote login operates as if the window is a small terminal screen.
35
March 5, 2002CE80N -- Lecture #1735 The Internet Remote Login Service Is TELNET The Internet standard for remote login service is found in a protocol known as TELNET. –Specifies how a remote client and a remote login server interacts –Uses a character oriented interface
36
March 5, 2002CE80N -- Lecture #1736 TELNET Live Demonstration
37
March 5, 2002CE80N -- Lecture #1737 Remote Access Can Display A Desktop Software can be placed on two computers that displays an exact copy of one computer’s screen on another computer.
38
Remote Desktop Example Figure 28.2 Illustration of a remote desktop service. Software permits the display on a user’s computer to show the screen image from a remoter computer.
39
March 5, 2002CE80N -- Lecture #1739 How Remote Desktops Operate A remote desktop service operates similar to a remote login service. –Invokes an application –Specifies a remote computer –Takes over the screen, keyboard, and mouse –See: www.uk.research.att.com/vnc/
40
March 5, 2002CE80N -- Lecture #1740 Assessment Of Remote Login and Desktops Internet remote access services are significant for three reasons. –Makes it possible to have computation remote from user –Is significant because of its generality –Is significant because many people use it
41
March 5, 2002CE80N -- Lecture #1741 Generality Makes Remote Login And Desktops Powerful The power of remote login arises because it provides general access to the program on a computer without requiring program modification.
42
March 5, 2002CE80N -- Lecture #1742 Remote Access Accommodates Multiple Types Of Computers Remote login service permits arbitrary brands of computers to communicate.
43
March 5, 2002CE80N -- Lecture #1743 Unexpected Results From Remote Access The user must remember that the application is running on a remote computer. –Cannot print a file using a local printer –Cannot save a file to the local computer (email of ftp the file to the local computer)
44
March 5, 2002CE80N -- Lecture #1744 Summary TELNET is the Internet remote login application Remote login resembles conventional login –Login account and password required –Client-server architecture –TCP/IP used for transport of data
45
March 5, 2002CE80N -- Lecture #1745 Glossary Login –The process of entering an account identifier and password to obtain access to a timesharing computer. Remote Desktop –A system that allows a user at one computer to connect their display, keyboard, and mouse to a remote computer.
46
March 5, 2002CE80N -- Lecture #1746 Glossary Remote Login –A service that allows a user on one computer to connect their keyboard and character-oriented display to a remote computer and run programs.
47
March 5, 2002CE80N -- Lecture #1747 Glossary TELNET –The Internet remote login service. TELNET allows a user at one site to interact with a remote timesharing system at another site as if the user’s terminal connected directly to the remote machine. Terminal –A device that enables you to communicate with a computer. Generally, a terminal is a combination of keyboard and display screen.
48
March 5, 2002CE80N -- Lecture #1748 Glossary Timesharing Computer –A computer system that permits multiple users to run programs at the same time. Window –A rectangular area on a screen devoted to one particular application program.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.