Vous êtes sur la page 1sur 10

CS 214 Introduction to Internet and HTML

by Jayson G. Mauricio

CS 214: Introduction to Internet and HTML

LECTURE 4: Internet Tools and Services

by Jayson G. Mauricio Our Lady of Fatima University Antipolo Campus

Lecture 4: Internet Tools and Services

CS 214 Introduction to Internet and HTML

by Jayson G. Mauricio

LECTURE 4: Internet Tools and Services FTP (File Transfer Protocol)

File Transfer Protocol, is a method of transferring files from one computer to another. It means that the FTP can upload and download information from the Internet or any kind of network. The protocol is a set of rules that ensures a file is transmitted properly to the receiving computer. A computer that stores files that can be retrieved using FTP is called an FTP site or FTP server. FTP is part of the Transmission Control Protocol/Internet Protocol (TCP/IP), the system that enables different types of computers and networks on the Internet to communicate. FTP (File Transfer Protocol) is the usual way you send files to your server (or receive some). Using FTP, you can also update (delete, rename, move, and copy) files at a server. People who create Web home pages use FTP to get their files to the server where they will be accessed. FTP is one of the suite of protocols that are part of TCP/IP, the client/server program that every Internet server and your (client) PC or workstation uses. FTP has a user command interface for establishing contact with a server, logging in, and sending, receiving, or otherwise changing files. Or you may install a utility that offers a graphical interface. Many access providers include an FTP utility as part of the set-up. Among FTP utilities that can be downloaded from the Web are WS_FTP (http://www.ipswitch.com), CuteFTP (http://www.cuteftp.com) and FTP Explorer (http://www.winsite.com). At whatis.com, we've recently installed WS_FTP and find it to be easy and fast to use. What information can the user find in the FTP? The largest class of files at anonymous FTP sites is programs, but they arent the only thing youll find there. Frequently, text files are stored in a format that makes them accessible regardless of the type of computer accessing them. The programs you generally find in FTPs fall into two categories namely: 1. Shareware Programs Programs written by the softwares author and the released to the Internet at large. You can freely retrieve the software and use it for a certain amount of time. If you find it useful, youre encouraged to send the author some money, and in return you often get the upgraded versions with the new features and printed documentation. 2. Freeware Programs Programs that you can retrieve and use for as long as you like. You never have to pay the author a certain amount of money for the software since the author asks the user to use it. Essentials in uploading a data into an FTP 1. Host Name the location, server, or host where you will upload your data for it to be available for use of other users. Example: ftp://freeweb.webquest.com 2. Host Type - The type of host or server you are uploading your data to. Usually the type of Operating System that the server uses.

Lecture 4: Internet Tools and Services

CS 214 Introduction to Internet and HTML

by Jayson G. Mauricio

Example: a. UNIX b. IBM AS/400 c. Chameleon d. NetWare ver. 4.0 e. HP 3000 f. OS / 9 g. Sun Solaris 3. User ID The login name that was provided you by the Internet Service Provider or Host Computer. 4. Password The password for your login name that was provided you by the Internet Service Provider or Host Computer. Essentials in downloading a data into an FTP If the user is using a web browser there is no requirements in transferring a data from the server to the users computer but if the user is using an FTP software same essentials as of the uploading of data is needed. Sample FTP Softwares: 1. 2. 3. Cute FTP - by Alex Kunadze of GlobalSCAPE Inc. WS-FTP / FTP Client for Windows by John A. Junod Netscape Composer - Netscape Communications Corporation E-mail

E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication from one computer to another over an internet, intranet, or the Internet.. (Some publications spell it email; we prefer the currently more established spelling of e-mail.) Email messages are usually encoded in ASCII text. However, you can also send non-text files, such as graphic images and sound files, as attachments sent in binary streams. E-mail was one of the first uses of the Internet and is still the most popular use. A large percentage of the total traffic over the Internet is e-mail. E-mail can also be exchanged between online service users and in networks other than the Internet, both public and private. E-mail can be distributed to lists of people as well as to individuals. A shared distribution list can be managed by using an e-mail reflector. Some mailing lists allow you to subscribe by sending a request to the mailing list administrator. A mailing list that is administered automatically is called a list server. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP) suite of protocols. A popular protocol for sending e-mail is SMTP and a popular protocol for receiving it is POP3. Both Netscape and Microsoft include an e-mail utility with their Web browsers. Popular stand-alone e-mail programs are Qualcomm Communications' Eudora and Connectsoft's E-Mail Connection, a shareware program. E-mail users create and send messages from individual computers using commercial email programs or mail-user agents (MUAs). Most of these programs have a text editor for composing messages. The user sends a message to one or more recipients by specifying destination addresses. When a user sends an e-mail message to several recipients at once, it is sometimes called broadcasting. a. The address of an e-mail message includes the Source and

Lecture 4: Internet Tools and Services

CS 214 Introduction to Internet and HTML

by Jayson G. Mauricio

b.

Destination of the message.

Different addressing conventions are used depending upon the e-mail destination. An interoffice message distributed over an intranet, or internal computer network, may have a simple scheme, such as the employees name, for the e-mail address. E-mail messages sent outside of an intranet are addressed according to the following convention: The first part of the address contains the users name, followed by the symbol @, the domain name, the institutions or organizations name, and finally the country name. A typical e-mail address might be raymund@webquest.com In this example raymund is the users name, webquest is the domain namethe specific company, organization, or institution that the e-mail message is sent to or from, and the suffix com indicates the type of organization that webquest belongs tocom for commercial, org for organization, edu for educational, mil for military, and gov for governmental. An e-mail message that originates outside the United States or is sent from the United States to other countries has a supplementary suffix that indicates the country of origin or destination. Examples include uk for the United Kingdom, fr for France, and au for Australia. Here are the most familiar domains: com edu int gov mil net org a commercial organization, business, or company an educational institution an international organization a nonmilitary government entity a military organization a network administration other organizations: non-profit, non-academic, or non-governmental

E-mail data travels from the senders computer to a network tool called a message transfer agent (MTA) that, depending on the address, either delivers the message within that network of computers or sends it to another MTA for distribution over the Internet. The data file is eventually delivered to the private mailbox of the recipient, who retrieves and reads it using an e-mail program or MUA. The recipient may delete the message, store it, reply to it, or forward it to others. E-mail has had a great impact on the amount of information sent worldwide. It has become an important method of transmitting information previously relayed via regular mail, telephone, courier, fax, television, and radio. In 1995 alone, e-mail users sent approximately 25 billion messages. Typical e-mail components 1. To - Primary recipients of your message. 2. From From where the message came from. 3. Subject The Subject of the mail the user is sending. 4. CC - Carbon Copy, for secondary recipients. 5. BCC - Blind Carbon Copy, for secondary recipients not identified to the other recipients, including those in the CC list. 6. Attachment Other files attached to the mail. 7. Group or Discussion - Posting to a discussion group. 8. Text Area Where the user typically writes the message he/she wants to send. Sample e-mail Softwares:

Lecture 4: Internet Tools and Services

CS 214 Introduction to Internet and HTML

by Jayson G. Mauricio

1. Eudora Light - by Jeff Beckly, Julia Blumin, Craig Lauer and Willie Sakai of Qualicomm Incorporated 2. Eudora Pro 3. Netscape Messenger - Netscape Communications Corporation 4. Microsoft Exchange Microsoft Corporation Usenet

Usenet, worldwide computer network that encompasses thousands of discussion groups, called newsgroups that allow the exchange of news, comments, and questions on specific topics. Duke University graduate students Jim Ellis and Tom Truscott created Usenet in 1979. Most Usenet traffic now travels over the Internet. Usenet has no central management, but people who wish to establish new groups and people who post articles to Usenet groups are expected to observe certain procedures, and the content of some groups is filtered by a moderator, a person who checks messages. Usenet's original protocol was UNIX-to-UNIX Copy (UUCP), but other protocols are more prevalent today. UUCP (UNIX-to-UNIX Copy Protocol) UUCP (UNIX-to-UNIX Copy Protocol) is a set of UNIX programs for copying (sending) files between different UNIX systems and for sending commands to be executed on another system. The main UUCP commands (each supported by a UUCP program) are: Newsgroup A newsgroup is a posted discussion group on Usenet, a worldwide network of newsgroups. Newsgroups are organized into subject hierarchies, with the first few letters of the newsgroup name indicating the major subject category and sub-categories represented by a subtopic name. Many subjects have multiple levels of subtopics. Some major subject categories are: news, rec (recreation), soc (society), sci (science), comp (computers), and so forth (there are many more). Users can post to existing newsgroups, respond to previous posts, and create new newsgroups. Newcomers to newsgroups are requested to learn basic Usenet "netiquette" and to get familiar with a newsgroup before posting to it. A FAQ is provided. The rules can be found when you start to enter the Usenet through your browser or an online service. You can subscribe to the postings on a particular newsgroup. Some newsgroups are moderated by a designated person who decides which postings to allow or to remove. Most newsgroups are unmoderated. Here are some types of groups and their common topics. Group Common Topics Talk These groups are public debating forums for (normally controversial) topics like abortion, the death penalty, religion and political figures. Discussions rarely end because its normally impossible to find consensus among so many people standing on their soapboxes. These group can be a lot of fun. These groups deal with social issues, which can include political policies, social programs, or topics that exists on a societal level. These groups deal with computers and computer science. Since Internet users are by definition using computer in one way or another, different computers and computer professions are well represented. Subjects include mainframe and personal computer hardware and software troubleshooting, programming, and networking in addition to general

Soc Comp

Lecture 4: Internet Tools and Services

CS 214 Introduction to Internet and HTML

by Jayson G. Mauricio

interest. Sci These groups deal with subjects relating to the sciences and scientific research not dealing with computers, including engineering, social science (so there is some overlap with the soc category), and other technical disciplines. These groups discuss recreational topics, like hobbies, music, and art. These groups deal with the running, maintenance, and use of newsgroups, including Internet software for mainframes, general newsgroup questions and answers for new users, and newsgroup configuration. The only thing similar about groups is the alt hierarchy is that the topics are usually far from mainstream. You can find topics ranging from sex to new religions to general foolishness. There are some truly important alt groups, such as alt.winsock and alt.gopher (which discusses Internet programs and gophers, respectively). These are groups that deal with biology and biological science. These groups originate from a private business that compiles news from around the world. Not generally free, your ISP or system administrator must purchase a subscription to the Clarinet News Service before you can read it,

Rec News

Alt

Bionet Clari

IRC (Internet Relay Chat)

Internet Relay Chat (IRC) is a system for chatting that involves a set of rules and conventions and client/server software. On the Web, certain sites such as Talk City provide an IRC server and help you download an IRC client to your PC. You can start a chat group (called a channel) or join an existing one. There is a protocol for discovering existing chat groups and their members. Participants in some chat groups use nicknames that last only for the duration of the session (you can't "own" a nickname). Other channels encourage you to register a nickname that you always use and even offer space for a personal profile, picture, and personal home page link. Popular ongoing IRC channels are #chatzone and #chatters. A number of channels are set up and conducted in foreign languages. IRC stands for the Internet Relay Chat. It is a much better, multi user implementation of the rudimentary 'talk' program. On IRC, several persons can simultaneously participate in a discussion over a particular 'channel', or even multiple channels. There is no restriction to the number of people that can participate in a given discussion, or the number of channels that can be formed over IRC. All conversations take place in *real time*. That's one of the fortes of IRC, and IRC has been used extensively for live coverage of world events, news, sports commentary, etc. It

Lecture 4: Internet Tools and Services

CS 214 Introduction to Internet and HTML

by Jayson G. Mauricio

also serves as *extremely* inexpensive substitute for long distance calling. People from all corners of the world can be found over IRC. IRC was developed by Jarkko Oikarinen in Finland in the late eighties, and was originally intended to work as a better substitute for 'talk' on his bulletin board. Of course, since then, it attracted overwhelming popularity, especially after the Gulf war when IRC was used to carry live coverage of events, and its growth has been exponential after that. Since then, reports of the Russian coup, and the California earthquake have been carried *live* over IRC, with people located in Russia and California bringing in the eyewitness reports. Samples of IRC Programs are: 1. 2. 3. . 1. 2. in. 3. Gopher Gopher, a system that enables computer users to find servers and files on the Internet. Developed at the University of Minnesota in 1991, Gopher presents menus and submenus users can select to specify their search. Each Gopher server contains menus for local servers and files and is linked to other Gopher servers; its menus change as the resources available to the system change. There are hundreds of Gopher servers around the world. The system of all Gopher servers is called Gopherspace. mIRC by Khaled Mardam-Bey of Khaled Mardam-Bey & mIRC Co. Ltd. PIRCH PolarGeeks IRC Hack by Northwest Computer Services Yahoo Chat IRC Essentials IRC Server The host computer that hosts the IRC Channels - The location or group in the IRC environment where you want to reside Nickname The user name that you will use and be known in the IRC environment.

Gopher is the structure of information on Internet servers that preceded the World Wide Web. With access to a server that uses the Gopher protocol, you see a hierarchically structured menu of viewable files. The Web and its HTTP protocol added the ideas of hypertext links within documents to any other document on the Internet.

Although most Gopher browsers and files are text-based, Gopher browsers, notably HyperGopher, were developed that displayed graphic images (GIF and JPEG files) that were included in Gopher file directories. As Web growth continues, the Gopher protocol and the files that have been placed on Gopher servers will probably become less important. Presently, a large number of archived files are still available on Gopher servers. When necessary, your Web browser can access Gopher servers for you.
Two popular tools for searching Gopher file hierarchies are Veronica and Jughead. Examples: gopher://x500.tc.umn.edu:70/7%3F

Lecture 4: Internet Tools and Services

CS 214 Introduction to Internet and HTML

by Jayson G. Mauricio

gopher://microsoft.com

Veronica Veronica, a search engine which enables user to find subjects or files in the Gopherspace easily and accurately. By the end of 1994, there were more than 10 million Gopher menus at various points in the Internet, each pointing to a different file or a different set of submenus. Clearly, your chances of the following Gopher menus randomly until you come across a subject that you are looking for are very low. Even a decade ago, when there was only a tenth of the Gopher menus in existence that there are today, the wander method of searching for specific topics in a Gopher menu was pointless, so a simple searching method called Veronica was created. Veronica works by sending an automated program to Gopher menus that notes the words in each Gopher menu and document that a Gopher menu points to. This list of words is added to a master index, which is distributed to various Veronica sites all over the world. When you need to find Gopher menus or documents that have a specific word in them, you tell Veronica to search its index for that word, and it displays all the menus or files that contain it. Veronica is the only capable of searching for words, which is not necessarily the same thing as subjects. Most of the time, you can think of a word that is also the subject (such as Clinton, for example), but this isnt always true (using the word building when looking for the building codes of various states would get you lots of menus that had nothing to do with construction laws). Veronica has several options to make up for the inherent simplicity of a Veronica search, through, so it is far from useless. Example: gopher://veronica.scs.unr.edu/11/veronica Why is it called Veronica? Veronica is the acronym for very short rodent-oriented net-wide index of computerized archives, but many people think this was not the major reason for the name. Veronica is the name for one of the Archies girlfriend in the Archie comic strip. Archie Archie, A system of servers that searches for publicly available files in FTP archives. Finding specific topics or keywords in a Gopher menu is challenging, but finding a specific file among the worlds anonymous FTP site is something else altogether. There are probably 20 times the number of files available for downloading of anonymous FTP sites on the Net as there are gopher menus.

Lecture 4: Internet Tools and Services

CS 214 Introduction to Internet and HTML

by Jayson G. Mauricio

Fortunately, this problem was also recognized early in the Internets history, and steps were taken to ease the problem fairly early on. A group of programmers created a system that automatically went to every anonymous FTP site it knew about, made a copy of the directory listings, and created a searchable index. Copies of the software, along with the actual search routine, were copied to various locations on the Internet, where the task of searching every FTP site was divided among the sites. As it evolved, it was able to cycle through every FTP site every 20 days or so, ensuring the index is always current. The system was named Archie. Example: http://www.nexor.co.uk/archie.html http://www.sco.com/Third/archie.html

Jughead (Jonzy's Universal Gopher Hierarchy Excavation And Display)


Jughead is a tool used by researchers and librarians for searching the information on Gopher sites for particular subjects. It can also be used to build a searchable menu of a particular Gopher hierarchy of menus. Jughead is similar to Veronica, another Gopher search facility. However, it is less sophisticated and intended for searching a smaller Gopher area. As the files on Gopher servers are gradually converted to HTML files, Gopher (and therefore Veronica and Jughead) will become less important. Currently, however, many valuable files can be found only on Gopher servers. Jughead and Veronica are featured comic characters (along with Archie) in Archie Comics. The originator of the acronym was apparently Rhett "Jonzy" Jones, who developed Jughead in 1993 at the University of Utah. You can access Jughead at the University of Utah's Gopher service from your Web browser by entering: gopher://gopher.cc.utah.edu One user reports that, while Veronica searches all of gopherspace and provides more sophisticated search options, Jughead is faster for searching known Gopher sites or limited hierarchies. WAIS Wide-area information servers (WAIS) is an Internet system in which specialized subject databases are created at multiple server locations, kept track of by a directory of servers at one location, and made accessible for searching by users with WAIS client programs. The user of WAIS is provided with or obtains a list of distributed databases. The user enters a search argument for a selected database and the client then accesses all the servers on which the database is distributed. The results provide a description of each text that meets the search requirements. The use r can then retrieve the full text. WAIS (pronounced "ways") uses its own Internet protocol, an extension of the Z39.50 standard (Information Retrieval Service Definition and Protocol Specification for Library Applications) of the National Information Standards Organization. Web users can use WAIS by either downloading a WAIS client and a "gateway" to the Web browser or by using Telnet to

Lecture 4: Internet Tools and Services

CS 214 Introduction to Internet and HTML

by Jayson G. Mauricio

connect to a public WAIS client. Most Web users will find that the abundance of server files and search engines already available on the Web will make WAIS superfluous. However, librarians, medical researchers, and others may find some specialized information available through WAIS that is not currently available on the Web. Example: wais://quake.think.com/ Telnet

Telnet is the way you can access someone else's computer, assuming they have given you permission. (Such a computer is frequently called a host computer.) More technically, Telnet is a user command and an underlying TCP/IP protocol for accessing remote computers. The Web or HTTP protocol and the FTP protocol allow you to request specific files from remote computers, but not to actually be logged on as a user of that computer. With Telnet, you log on as a regular user with whatever privileges you may have been granted to the specific applications and data on that computer. A Telnet command request looks like this (the computer name is made-up): telnet the.libraryat.harvard.edu The result of this request would be an invitation to log on with a userid and a prompt for a password. If accepted, you would be logged on like any user who used this computer every day. Telnet is most likely to be used by program developers and anyone who has a need to use specific applications or data located at a particular host computer.

Lecture 4: Internet Tools and Services

10

Vous aimerez peut-être aussi