Page 1 :
Step 4: Enter the desired criteria and click on the GO button., , Some other websites that provide the facility of finding people on the Internetare as follows:, , 1., 2, 3, 4., 5, , File Transfer Protocol (FTP), , File Transfer Protocol, or FTP, is a protocol used for, transferring files from one computer to another typically from your computer to a web server. FTP is, , http://www.facebook.com/, , http://pipl.com/, , http://www.indiabook.com/people/, , http://www.linkeclin.com/, http://www.anywho.com/, , Tip: Pipl is the world's largest people search engine., , , , t —, the preferred method of exchanging files because it is c », , faster than other protocols like HTTP or POP. The data, , FTP Client, , transfer is asynchronous. The File Transfer Protocol | on Client PC, , (FTP) was first submitted as a Request For Comments, , (RFC) in 1971., Objectives of FTP are:, 1,, 2s, 3., 4., , Some popular FTP software are:, , , , , ————) Commands, , FIP _—S> =>, , —— >, , , , _—_—_—==>, , FTP Server, , , , , , To promote sharing of files (computer programs and/or data),, , Figure 18, , To encourage indirect or implicit (via programs) use of remote computers,, , To shielda user from variations in file storage systems among hosts, and, , To transfer data reliably and efficiently., , , , Name, , License, , Platform, , , , ALFTP, , Proprietary, , Windows only, , , , Cerberus FTP Server, , Proprietary, Commercial, , Windows only, , , , Complete FTP Server, , Proprietary, Commercial, , Windows only, , , , CrushFTP Server, , Proprietary, Shareware, , Mac OS X, Windows, Linux,, *BSD, Solaris, etc., , , , , , FileZilla Server, , , , Open Source, Free Software, , , , Windows XP/Vista/7/Server 2003/, R2, 2008/R2, , , , , , UPLOADING AND DOWNLOADING FILES FROM FTP SERVER, , Upload Single File to FTP Server, , To upload file on FTP server use put command from FTP prompt. First, navigate to the desired directory on FTP, server where to upload a file and use the following command. It will upload local system file c:\;:files\filel.txt to, , uploads directory on FTP server., , an, , ca
Page 2 :
cduploads, putc:\files\ filel.txt, Download a Single File from FTP, , To download the file from FTP server, you use get command. Using this command, you can download one file at a, time. To download any file from FTP server first login to your FTP server, navigate to the directory and use the, following command to download. get filel.txt, , Upload Multiple Files to FTP, , To upload multiple files to FTP server you use mput command from FTP prompt. We can specify wildcard, character to upload multiple files to the server at a time. First, navigate to the desired directory on FTP server, where to upload a file and use the following command. It will upload local system files with .txt extension in c:files, directory to uploads directory on FTP server., , cduploads, , ledc:\\files, , mput*.txt, , Download Multiple Files from FTP, , To download multiple files from FTP server, you use mget command. Using that command, you can download, more than one files at a time. To download multiple files, specify wildcard character for specifying directory name, do download all files from the directory., , mget*.txt, TCP/IP, , TCP/IP protocol are a set of rules that are needed for the working of the Internet. When data is transferred from, one computer to another over the Internet, it is broken into pieces using Transmission Control Protocol (TCP)., These pieces are called packets that are numbered serially. Internet Protocol adds the IP address (a unique, address) of the sender computer (node) and the recipient computer (node) to each packet so that it reaches the, correct recipient., , The recipient computer receives packets in random manner (It may even receive 10 before 1 arrives). Ifa packet is, garbled or lost, it is demanded again. The packets are reassembled in the order they sent and the original message, is obtained., , , , , , , , STEP 2, t 7 ie protocol The packets travel from STEP 3, f breaks data router to router over the The TCP protocol 7 ], , Fis castes Internet according to the reassembles the, JO. PACKER. IP protocol. packets into the, , — i 7 original whole., , + _egt “GED..., , i, , , , , , , , , , , , , , , , , , Figure 19: Working of TCP/IP
Page 3 :
HTTP, , HTTP stands for Hyper Text Transfer Protocol. It is a protocol that defines a set of rules for exchanging information, on a network. HTTP is a high-level protocol used to exchange information between a browser and a server. The, HTTP protocol uses TCP/IP to locate and make a connection between the browser and the server. The messages, sent between the browser and server are either request or response messages,, , The request message contains, , @ Arequestline containing the name of the requested file and whether the request is a GET or POST., @ = = Aheader containing information such as the type of browser and operating system., , @ Abody containing data, for example, data entered into a form., , The response from the server will contain, , @ = Aresponse line witha code indicating that the requested file was found or an error code (almost everyone has, had to deal with the dreaded HTTP 404 Error- file not found) if there was a problem., , @ Header information suchas the type of server software., , Abody containing the HTML of the requested file. An HTTP request and response is illustrated in Figure20., , , , , , , , , , , , , , , , , , , = HTTP, ——— Request Message, SY, HTTP, Response Message, HTTP Clients, (Web Browser) HTTP over TCP/IP HTTP Server (Web Server), , , , , , , , Figure 20: Http Request and Response, , GET and POST: GET and POST: In the request line sent from the browser to the server is an HTTP command, called the method. The method is usually a GET ora POST. The GET method is a request for a specific URL. With, a GET request, the body is empty. The POST method tells the server that data will be sent in the body of the, request. The POST method is used when you submit forms., , HTTPS, , HTTPS stands for HTTP-Secure. It is a combination of HTTP with SSL(Secure Socket Layer). It is efficient in cases, where authenticity is required like the browser need to fill out forms, sign in, authenticate and carry out bank, transactions., , SSH PROTOCOL, , Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure, channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote, computer and (optionally) to allow the remote computer to authenticate the user. SSH provides confidentiality and, integrity of data exchanged between the two computers using encryption and message authentication codes
Page 4 :
(MACs). SSH is typically used to log into a remote machine and execute commands. The SSH server, by default,, listens on the standard TCP port 22., , Typical uses of the SSH Protocol, , The protocol is used in corporate networks for:, , The SSH protocol is a method for secure remote login from one computer to another., It provides secure access for users and automated processes., , It facilitates interactive and automated file transfers., , Ithelps issuing remote commands., , It manages network infrastructure and other mission-critical system components., Secure File Transfer Protocol (SSH File Transfer Protocol), , Secure File Transfer Protocol (SFTP) is a network protocol. It is used for accessing, transferring and managing files, onremote systems., , SFTP allows businesses to securely transfer billing data, funds and data recovery files. SFTP uses SSH to transfer, files and requires that the client be authenticated by the server. SFTP was developed by the Internet Engineering, Task Force (IETF) to securely transfer and manage files over a TCP/IP network., , SFTP is part of the SSH Protocol. This term is also known as SSH File Transfer Protocol. SFTP can work with many, protocols but is most commonly used with SSH to provide secure authentication. SFTP uses the same commands as, the standard file transfer protocol (FTP)., , Using SCP (Secure Copy), , The SCP command can be used to send a file to a server or retrieve a file from a server. Because it uses the SSH, protocol for authentication SCP is more secure than FTP which transmits passwords in plain text., , It provides file transfers between hosts on a network. With SCP, you can quickly transfer files between hosts along, with basic file attributes such as access permission and timestamps that are not always available via FTP., , SIMPLE MAIL TRANSFER PROTOCOL (SMTP), , This protocol is used for sending e-mail messages between servers. Most e-mail systems that send mail over the, Internet use SMTP to send messages from one server to another. The messages can then be retrieved with an e-mail, client using either POP or IMAP., , The Telnet Protocol (Remote Login), , Telnet is a type of software that makes it possible to connect remotely to another computer. Having access to a, software program of this nature can assist computer repair technicians and network administrators substantially., Telnet is a text-based program that allows you to connect to other computers, with permission., , Advantages of Telnet protocolare,, , @ Accessing Remote Computers: One of the biggest advantages of Telnet software is that it allows remote, access to someone else's computer., , @ Saves Time: Instead of physically traveling to another person's home, you can perform any task on his or her, computer almostimmediately., , @ Easy to Use: Youalso need to know the Internet protocol (IP) address of the computer you want to access and, have areliable Internet connection., , @ Universal: Among Telnet's more attractive features is the fact that you can use it on any computer.