* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Chapter 9 - University of Scranton: Computing Sciences Dept.
Zero-configuration networking wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Deep packet inspection wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Internet protocol suite wikipedia , lookup
Chapter 9 How Do Users Share Computer Files? What is a File Server A (central) computer which stores files which can be accessed by network users. File Servers (Continued) Example: The CS dept has a file server in its network where each user can store files that can be accessed from other computers. It is easy to connect to from my department’s network and possible (but complicated) to access from elsewhere. My files are available to me and to no one else. If I wish to share my files I have to send copies to other individuals via e-mail or put them on a web site where others can download them. How are files accessed on a network? Download the file from the server and make changes to that file. This leaves the original on the server unchanged unless the user uploads the change (This is what I do to update my website). The user modifies the file on the server without downloading it. (I sometimes do this to fix something quick.) FTP (File Transfer Protocol) What you do to copy files to your Web site. It can also be used to copy files from your Web site. It can also be used independent of the Web to copy files from one computer to another as long as you have permission to use both resources. Remote File Access This technique is used when a program on your computer is acting on the file on the server and not a copy of it. Updating the (only) copy of the file Write-Through – immediate update, each change is automatically reflected in the document Write-on-close – the changes are reflected in the document when the user is finished. Write-delayed – batch updates, for example the file could be updated every two minutes. How are files shared? FTP We’ve covered this a bunch of times Anonymous FTP It’s just like regular FTP except that you don’t need a username and password to access the account. There is a standard username usually anonymous or possibly guest. The password is your e-mail address. So if you were to make something anonymously available to me I would use anonymous as my username and [email protected] as my password. How are files shared (continued) Remote File Access The problem occurs if several people have the right to access the file simultaneously, i.e. if you and I were editing the same paper at the same time or if you were reading it while I was editing it. Cache cohesion – the copy you’re reading is not the copy I’m editing so you’re out of sync Client-initiated update – the server version updates when I finish editing but you aren’t told Server-inititated update – when I finish your copy is automatically updated. Why can some computers access some files but not others? Necessities for file access Your computer must be able to physically connect to the server. You must have permission to access the server and the directory and the file in the way that you need to access the file. Your computer (software) must be able to interpret the data in the file. Encryption Common file format When someone wants a file from a server, how does the server know what method to use? TCP/IP (Transmission Control Protocol/Internet Protocol Data is sent in packets. Each packet consists of the data being sent plus a header for that packet. One of the items in the header is a 16 bit port address (which is essentially a number from 0 to 65535). The ports are associated with particular applications. For example ports 20 and 21 are associated with FTP, port 80 with HTTP. What makes TCP/IP work? Logical levels are used to subdivide the work to be done. The ISO (international standards organization) has specified OSI (open systems interconnection reference model) with seven levels: What Makes TCP/IP work (cont)? OSI Layers Layer 1: Physical Layer – listens to the cables to see if stuff is being sent and sends bits when the line is clear Layer 2: Data Link Layer – moves groups of bits called frames from machine to machine Layer 3: Network Layer – routes packets from source to destination Layer 4: Transport Layer – divides messages into packets Layer 5: Session Layer – higher level capabilities Layer 6: Presentation Layer – higher level capabilities Layer 7: Application Layer – higher level capabilities Summary Files can be shared in three different ways: Each member of a group can keep their own personal copy of the data and they can e-mail copies to each other and be personally responsible for keeping the copies in sync. The members could agree on a common file format and keep copies of the file on a server and use FTP to transfer between their machines and the server. They would work on the files on their own machines Summary (Continued) Files can be shared in three different ways The members could work on the file on the server itself using remote file access. The application that the group is using must insure that either only one person can work on a particular file at one time or that if several people work on a file simultaneously, that the correct copy is maintained. Summary (Continued) If different software (o/s) is used by different members of a team to view data, it may look different on different platforms. TCP/IP is probably the most common method of transmitting data through a network. Port numbers tell the receiving computer which application to use. These port numbers are standardized by ICANN. Terminology Anonymous FTP Cache Coherence Client Client-initiated update Concurrent update problem File Server File Transfer Protocol (FTP) Frame Location Independence Location Transparency Lock Port Address Packet Remote File Access Server Server-initiated Update Transmission Control Protocol/Internet Protocol (TCP/IP)