Internet Business Foundations

Download Report

Transcript Internet Business Foundations

Internet Business
Foundations
© 2004 ProsoftTraining
All rights reserved
Lesson 6:
Internet Services and
Tools
Objectives










Use a news client
Use Telnet
Use FTP
Manage downloaded files
Use Virtual Network Computing (VNC) and
Microsoft Terminal Services
Use instant messaging applications
Identify the functions of peer-to-peer networks
Identify the functions of LDAP
Identify the functions of Concurrent Versions
System (CVS)
Troubleshoot Internet problems using TCP/IP
tools
Newsgroups






Purpose of newsgroups
Newsgroup postings
How to find newsgroups
Newsgroup categories
Newsgroup structure
Configuring a news client
Telnet






Telnet is a remote host connection
You log on to a server and access information as
if you were sitting in front of the server
Telnet provides a login shell (an environment that
allows you to issue commands)
Requires an account and password on the host
computer
A generic user name and password allow access
to public servers
SSH (Secure Shell) is a secure form of Telnet
File Transfer Protocol (FTP)







Used to transfer files between two computers
Public FTP servers generally allow anonymous
logon and allow downloading of files only
Files are downloaded via the FTP “get”
command
Corporate FTP servers usually require a user
name and password (you may upload files if
you have permission)
Files are uploaded via the FTP “put” command
You can use command-line FTP, a browser’s
built-in FTP client, or a specialized FTP client
Secure versions of FTP include:
• Secure Copy (SCP)
• SSH File Transfer Protocol (S/FTP)
• SSL/TLS-enabled FTP (FTPS)
Managing Download Files



You may need to define MIME types for files that
you download
Many files downloaded from FTP servers are
compressed (using a compression utility) and
must be decompressed before you can use them
Common compression utilities include:
• Zip/unzip
• Bzip2/bunzip2
• Bzip/bunzip
• Gzip/gunzip
• Compress/uncompress
• RAR/WinRAR
Virtual Network Computing
(VNC)




VNC allows you to control a computer at a
remote location as if you were sitting in front of it
VNC consists of two components: the server and
the viewer
VNC provides a fill GUI display and allows
authenticated users to log on and see the same
display they would see if they were sitting in
front of the (server) computer
The viewer and server do not need to be running
the same operating system
Instant Messaging (IM)






Computer-based method of communication in
which users can type and view messages sent to
one or more recipients and view the responses
immediately
Contacts must be online to receive messages
Can also be used to send files, view photos, send
Web links and talk to contacts
Becoming very popular in the workplace
Requires an instant messaging client and an
account for instant messaging service
There are several IM services, clients and servers
in widespread use
Peer-to-Peer Networks



In a peer-to-per network, each computer has
both client and server capabilities
On the Internet, a P2P network allows a group of
users to connect with each other and directly
share files among their hard drives
P2P networks are inexpensive and allow users to
share bandwidth
Lightweight Directory
Access Protocol (LDAP)





LDAP directories contain contact
information (name, address, e-mail
address, public keys, etc.)
Simplified version of X.500
Supports TCP/IP
Makes global directory service available to
everyone
Modern e-mail clients are capable of
searching an LDAP directory
Concurrent Versions System
(CVS)





Development tools for programmers
Used on Linux or other UNIX-based
systems
Controls different versions of the pieces of
a program as those pieces are developed
Allows programmers to use the latest
(debugged) versions of their co-workers’
code while developing their own portions
Allows a large program to be developed in a
much shorter time frame
Communicating Effectively
over the Internet





Netiquette
Internet ethics
Avoiding harassment
Creating effective messages
Blogging
Troubleshooting Using TCP/IP
Tools



Use ipconfig to display your system’s IP
configurations
Use ping to test connectivity between a
source system and a destination system
Use tracert to determine the path between
a source system and a destination system