This Project Report of Web Server contains the description of Linux Operating System Administration. This is based on Redhat Linux 6. In this, the topics covered are System Administration, Server Administration, Scheduling, Web Server, Samba Server and FTP Server. This also contains the information related to configuration file like passwd. This presentation was prepared as a record of Industrial training Project.
Case study of windows a product of microsoft including the history and related to operating system with MS-DOS its scheduling, networking, performance, etc. It also contains the windows architecture, it's system components like kernel, and scheduling through threads in windows.
History
Description of Windows Architecture
Layered Architecture
Portability
System Components
Processes & Threads
Kernel Scheduling
Object Manager
Virtual Memory Management
File System
Memory Management
Case study of windows a product of microsoft including the history and related to operating system with MS-DOS its scheduling, networking, performance, etc. It also contains the windows architecture, it's system components like kernel, and scheduling through threads in windows.
History
Description of Windows Architecture
Layered Architecture
Portability
System Components
Processes & Threads
Kernel Scheduling
Object Manager
Virtual Memory Management
File System
Memory Management
tybsc it sem 5 Linux administration notes of unit 1,2,3,4,5,6 version 3WE-IT TUTORIALS
Introduction: Introduction to UNIX, Linux, GNU and Linux distributions Duties of the System Administrator, The Linux System Administrator, Installing and Configuring Servers, Installing and Configuring Application Software,
Creating and Maintaining User Accounts, Backing Up and Restoring Files, Monitoring and Tuning Performance, Configuring a Secure System, Using Tools
to Monitor Security Booting and shutting down: Boot loaders-GRUB, LILO, Bootstrapping, Init
process, rc scripts, Enabling and disabling services.
The File System: Understanding the File System Structure, Working with Linux- Supported File Systems, Memory and Virtual
System Configuration Files: System wide Shell Configuration Scripts, System Environmental Settings, Network Configuration Files, Managing the init Scripts,
Configuration Tool, Editing Your Network Configuration
TCP/IP Networking: Understanding Network Classes, Setting Up a Network nterface Card (NIC), Understanding Subnetting, Working with Gateways and Routers, Configuring Dynamic Host Configuration Protocol, Configuring the Network Using the Network
The Network File System: NFS Overview, Planning an NFS Installation, Configuring an NFS Server, Configuring an NFS Client, Using Automount Services, Examining NFS Security
Connecting to Microsoft Networks: Installing Samba, Configuring the Samba Server, Creating Samba Users 3, Starting the Samba Server, Connecting to a Samba
Client, Connecting from a Windows PC to the Samba Server Additional Network Services: Configuring a Time Server, Providing a Caching Proxy Server
Internet Services: Secure Services, SSH, scp, sftp Less Secure Services (Telnet ,FTP, sync,rsh ,rlogin,finger,talk and ntalk, Linux Machine as a Server, Configuring
the xinetd Server, Comparing xinetd and Standalone, Configuring Linux Firewall Packages, Domain Name System: Understanding DNS, Understanding Types of Domain Servers, Examining Server Configuration Files, Configuring a Caching DNS Server, Configuring a Secondary Master DNS Server, Configuring a Primary
Master Server, Checking Configuration
Configuring Mail Services: Tracing the Email Delivery Process, Mail User Agent (MUA), Introducing SMTP, Configuring Sendmail, Using the Postfix Mail Server,
Serving Email with POP3 and IMAP, Maintaining Email Security Configuring FTP Services: Introducing vsftpd, Configuring vsftpd, Advanced FTP Server Configuration, Using SFTP
Configuring a Web Server: Introducing Apache, Configuring Apache, Implementing SSI, Enabling CGI, Enabling PHP, Creating a Secure Server with SSL System Administration: Administering Users and Groups Installing and Upgrading Software Packages
Linux History
Design Principles
Kernel Modules
Process Management
Scheduling
Memory Management
File Systems
Input and Output
Interprocess Communication
Network Structure
Security
Basics of Linux Commands, Git and GithubDevang Garach
Teachers Day 2020 - Basics of Linux Commands, Git and Github
History of Linux? (Fast Forward)
Brief overview of Linux OS files/ folders system
Basics Commands on Linux (Useful in daily routine)
What is Git? How to use?
Difference between Git and GitHub
How can we host HTML based website,
and to get github.io domain, Free of cost ₹ 0/-
tybsc it sem 5 Linux administration notes of unit 1,2,3,4,5,6 version 3WE-IT TUTORIALS
Introduction: Introduction to UNIX, Linux, GNU and Linux distributions Duties of the System Administrator, The Linux System Administrator, Installing and Configuring Servers, Installing and Configuring Application Software,
Creating and Maintaining User Accounts, Backing Up and Restoring Files, Monitoring and Tuning Performance, Configuring a Secure System, Using Tools
to Monitor Security Booting and shutting down: Boot loaders-GRUB, LILO, Bootstrapping, Init
process, rc scripts, Enabling and disabling services.
The File System: Understanding the File System Structure, Working with Linux- Supported File Systems, Memory and Virtual
System Configuration Files: System wide Shell Configuration Scripts, System Environmental Settings, Network Configuration Files, Managing the init Scripts,
Configuration Tool, Editing Your Network Configuration
TCP/IP Networking: Understanding Network Classes, Setting Up a Network nterface Card (NIC), Understanding Subnetting, Working with Gateways and Routers, Configuring Dynamic Host Configuration Protocol, Configuring the Network Using the Network
The Network File System: NFS Overview, Planning an NFS Installation, Configuring an NFS Server, Configuring an NFS Client, Using Automount Services, Examining NFS Security
Connecting to Microsoft Networks: Installing Samba, Configuring the Samba Server, Creating Samba Users 3, Starting the Samba Server, Connecting to a Samba
Client, Connecting from a Windows PC to the Samba Server Additional Network Services: Configuring a Time Server, Providing a Caching Proxy Server
Internet Services: Secure Services, SSH, scp, sftp Less Secure Services (Telnet ,FTP, sync,rsh ,rlogin,finger,talk and ntalk, Linux Machine as a Server, Configuring
the xinetd Server, Comparing xinetd and Standalone, Configuring Linux Firewall Packages, Domain Name System: Understanding DNS, Understanding Types of Domain Servers, Examining Server Configuration Files, Configuring a Caching DNS Server, Configuring a Secondary Master DNS Server, Configuring a Primary
Master Server, Checking Configuration
Configuring Mail Services: Tracing the Email Delivery Process, Mail User Agent (MUA), Introducing SMTP, Configuring Sendmail, Using the Postfix Mail Server,
Serving Email with POP3 and IMAP, Maintaining Email Security Configuring FTP Services: Introducing vsftpd, Configuring vsftpd, Advanced FTP Server Configuration, Using SFTP
Configuring a Web Server: Introducing Apache, Configuring Apache, Implementing SSI, Enabling CGI, Enabling PHP, Creating a Secure Server with SSL System Administration: Administering Users and Groups Installing and Upgrading Software Packages
Linux History
Design Principles
Kernel Modules
Process Management
Scheduling
Memory Management
File Systems
Input and Output
Interprocess Communication
Network Structure
Security
Basics of Linux Commands, Git and GithubDevang Garach
Teachers Day 2020 - Basics of Linux Commands, Git and Github
History of Linux? (Fast Forward)
Brief overview of Linux OS files/ folders system
Basics Commands on Linux (Useful in daily routine)
What is Git? How to use?
Difference between Git and GitHub
How can we host HTML based website,
and to get github.io domain, Free of cost ₹ 0/-
Linux has become integral part of Embedded systems. This three part presentation gives deeper perspective of Linux from system programming perspective. Stating with basics of Linux it goes on till advanced aspects like thread and IPC programming.
In February, 2016 I had the privilege of working with employees of STARR Computers on a course to orient them to Linux. The course was delivered over a series of 90-120 minute sessions. It was designed so that
This is a compilation of the slides which were used. There were some other resources which were shared. There were practice exercises which were designed to reinforce some concepts.
Check http://churchroadman.blogspot.com/2016/04/basic-orientation-to-linux-course.html for some other details.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Online aptitude test management system project report.pdfKamal Acharya
The purpose of on-line aptitude test system is to take online test in an efficient manner and no time wasting for checking the paper. The main objective of on-line aptitude test system is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their convenience and time and there is no need of using extra thing like paper, pen etc. This can be used in educational institutions as well as in corporate world. Can be used anywhere any time as it is a web based application (user Location doesn’t matter). No restriction that examiner has to be present when the candidate takes the test.
Every time when lecturers/professors need to conduct examinations they have to sit down think about the questions and then create a whole new set of questions for each and every exam. In some cases the professor may want to give an open book online exam that is the student can take the exam any time anywhere, but the student might have to answer the questions in a limited time period. The professor may want to change the sequence of questions for every student. The problem that a student has is whenever a date for the exam is declared the student has to take it and there is no way he can take it at some other time. This project will create an interface for the examiner to create and store questions in a repository. It will also create an interface for the student to take examinations at his convenience and the questions and/or exams may be timed. Thereby creating an application which can be used by examiners and examinee’s simultaneously.
Examination System is very useful for Teachers/Professors. As in the teaching profession, you are responsible for writing question papers. In the conventional method, you write the question paper on paper, keep question papers separate from answers and all this information you have to keep in a locker to avoid unauthorized access. Using the Examination System you can create a question paper and everything will be written to a single exam file in encrypted format. You can set the General and Administrator password to avoid unauthorized access to your question paper. Every time you start the examination, the program shuffles all the questions and selects them randomly from the database, which reduces the chances of memorizing the questions.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
2. Systems Administration
O Administering the system?
O Keep the system up in a consistent state
O Monitor performance
O Babysit users, make changes on their behalf
O Install, configure, upgrade, maintain
O Backup, restore, disaster recovery
3. Sysadmins
O System administration handled by various
people
O Full time dedicated sysadmins on site
O Remote services
O Generic ‘IT’ personnel
O That user that seems to know what they’re
doing
O Can be a skill set central to a career path, or
a means to an end
4. Privilege Hierarchy
O Want to divide system privilege by account
O First step is file level permissions
O Default permissions limit end users in what
configuration files they can read and which
programs they can run
O Next level is within system programs
O Limit certain functions to only users with
‘elevated’ privileges
5. The Superuser
O By default, one account has elevated
privileges to issue any command, access
any file, and perform every function
O Superuser, a.k.a. root
O Technically, can change to anything – but
don’t
O User and group number 0
7. Booting the System
O Power on, POST, hardware initialization
O Boot device selected by BIOS/user
interaction
O Master boot record of boot device read
O Initializes the bootloader
O lilo (LInux LOader)
O grub (GRand Unified Bootloader)
8. Booting, cont
O Boot loader selects and loads an OS kernel
O Kernel stored as an compiled image file
O Kernel loads modules for hardware and
software functions
O Interrupts, device management, memory
management, paging
O Last thing kernel does is call init
9. init
O First non-kernel code loaded
O Process number 1
O Acts as parent to all other processes on
system
O Handles starting services and programs
O Based on runlevel, runs the appropriate
scripts
10. Runlevels
O A set of defined system states that init can
bring the system into (varies on distro)
O 0: Halt/shutdown
O 1: Single user mode
O 2: Multiuser mode
O 3: Multiuser mode with networking
O 4: Not used
O 5: Multiuser mode with networking and GUI
O 6: Reboot
11. Runlevels, cont
O On boot, init checks /etc/inittab to see what
runlevel to bring system to
O To change runlevel after boot
O telinit runlevel
O shutdown/halt/reboot
O Any time the runlevel changes, init consults
a set of scripts to determine what to
stop/start
12. Scripts
O Init works with run command (rc) scripts
O Found in /etc/rc.d
O All scripts housed in /etc/rc.d/init.d
O Each script takes a parameter for changing
operation (start/stop/halt/reboot)
O Each runlevel has it’s own directory
O /etc/rc.d/rcN.d
13. Single User Mode
O Runlevel 1
O Console only – no terminals
O Very minimal environment
O Some filesystems might not be mounted
O Maintenance of filesystems
O Fixing configuration errors
O Disaster recovery
14. Multiuser Mode
O Runlevels 2-5
O Runlevel 2 allows terminal logins
O Runlevel 3 allows remote terminal logins
O Runlevel 5 enable X11 graphical
environment
O Runlevels 3 and 5 are the most common
levels for day-to-day operations
15. Shutting Down the System
O Syntax:
shutdown [options] time [message]
O Time: XX:XX or +X or NOW
O -k: don’t really shutdown, just send message
O -r: reboot
O -h: halt
O -c: cancel a shutdown
O halt: calls shutdown –h
O reboot: calls shutdown -r
16. Scheduling
O Linux systems uses the Cron system for time-
based job scheduling
O Allows users to schedule jobs to run
O Allows sysadmins to run jobs and batch
processes
O Different distros implement the structures
differently
O Most use /etc/crontab as primary set of
instructions
O Sometimes other files are used, like
/var/spool/cron/*
17. crontab
O Each line schedules a job
O Syntax:
* * * * * command
O First field is minutes (0-59)
O Second field is hours (0-23)
O Third is day of the month (1-31)
O Fourth is month of year (1-12)
O Fifth is day of week (0-6, starting with Sun)
18. Filesystem Management
O A Linux installation can be comprised of
many different filesystems
O Each filesystem (except for swap) is
connected to the filesystem hierarchy at a
specific point in the tree
O This is referred to as the mount point
O A sysadmin uses mount, umount and
/etc/fstab to manage these mounts
19. mount
O Syntax (most commonly):
mount –t type device directory
O Associates a device (partition, CD-ROM, etc)
formatted with a particular type of
filesystem with a specified directory in the
hierarchy
O Requires root privileges to mount in most
cases
O mount with no arguments displays list of
mounted filesystems
20. umount
O Syntax:
umount directory | device
O Removes that association
O Cannot umount if device is still being
accessed (i.e. open files)
O Again, most likely requires root privileges
21. fstab
O For filesystems that should be mounted on
boot every time, put them in /etc/fstab
O Basically a tab delimited file that contains
the command line parameters you’d give to
mount
O Device
O Mount point (directory)
O FS type
O Options (Readonly, attributes, etc)
22. Creating New Filesystems
O First use fdisk device to create a
partition
O Similar in function to old fdisk from DOS
O Use ? to display commands, p to display
partition info
O Once partition created, must be formatted
O mkfs –t type filesystem
O Once formatted, you can mount it
23. Monitoring Disk Usage
O du – disk usage on files and directories
O df – reports filesystem utilization
O lsof – list open file handles
O quota – configure and display user quotas
O quotactl
O quotacheck
O quotaon
O edquota
24. Installing Software
O The open source movement has provided an
enormous volume of freely available
programs
O Two primary methods of installing programs
O By source
O By package manager
25. Installing by Source
O Download source code
O Usually comes in a compressed tar archive
(.tar.gz or similar)
O Extract source code
O Configure the installation (usually
./configure)
O Then compile (make)
O Then copy into filesystem (make install)
26. Package Managers
O There are a wide variety of package
managers available for different Linux
distributions
O In turn, there are several different types of
packages available for each of these
managers
O Packages are an archived version of the
source code
O Often tailored to a specific architecture or
distribution
27. RPM
O Red Hat Package Manager
O Package format and manager created by
Red Hat developers
O Used widely by Red Hat, Red Hat-based
distros, and many others
O System maintains a local RPM database to
maintain consistency and track installs
28. RPM, cont
O Many different utilities for managing RPMs
O rpm: command line package manager for
installing/removing/configuring packages
O up2date: command line package manager
that fetches packages from internet and
resolves dependencies
O yum, yast: similar to up2date
O Many GUI frontends available to these
utilities
29. User Administration
O User configuration stored in /etc/passwd
O File got it’s name because it originally
contained passwords as well
O Security problem – too many processes need
to read passwd
O A shadow file used now instead (more in a
sec)
O Each line contains info for one user
31. passwd, cont
O Originally passwd contained a user’s
password information
O How it works
O User picks a password
O A random number is generated (called the
salt)
O The salt and the password is passed into a
hash function (a one-way cryptographic
algorithm)
O The salt and result are stored in ASCII
32. passwd, cont
O Problem – user-level programs need to read
passwd
O Get user name, location
O Home directory, shell
O So passwd was world readable
O So anyone on system could see a user’s
salted hash
O It’s encrypted – what’s the big deal???
33. Adding Users
O If you really wanted to, edit /etc/passwd
by hand
O Some distributions have graphical or
simplified ways to add users
O Most widely available however is command
line utility useradd
34. Adding Users, cont
O Syntax:
useradd [options] [-g group] [-
d home]
[-s shell] username
O -g to define user’s initial group
O -d to define user’s home directory
O -s to define user’s default shell
O Other options for expiration, using defaults,
etc
35. Deleting Users
O Again, could just hack /etc/passwd
O More elegant:
O Syntax: userdel [-r] username
O -r to delete home directory and it’s contents
36. Modifying Users
O Syntax: usermod [options]
username
O Options are pretty much identical to those of
useradd
O Also, -l to change the user’s login name
O And –G to list additional groups to add user
to
37. Group Management
O Group info housed in /etc/group
O Similar to user management
O groupadd
O groupdel
O groupmod
38. Daemons as Users
O For the most part, Linux daemons (services)
each run as a unique user account
O Provides additional security by segregating
processes and files
O Running daemons as root usually a bad idea
O Accounts usually created automatically and
assigned passwords
O Usually disabled from logging into system
39. Networking
O Linux is a powerful networking operating
system
O Much of it developed in tandem with the
Internet
O Ability to work as a client, server, or network
device
O Proxies, firewalls, routers, bridges, etc
40. Networking, cont
O Overall networking usually governed by
/etc/rc.d/init.d/network
O Invoked in runlevels 3 and 5 usually
O Network device/interface configurations in
either /etc/sysconfig/networking
or in /etc/sysconfig/network-
scripts
O Can either edit manually, or use utilities to
manage
41. ifconfig
O Displays or alters network device configs
O Syntax:
ifconfig interface
[options]
O With no options, shows interface’s config
O If interface omitted as well, show all configs
O Options include flags, IP address, subnet
mask, etc
42. hostname
O Used to set/display the computer’s network
name
O Depending on what protocols your network
uses, may also need to look at
O domainname
O dnsdomainname
O Especially important for Internet-accessible
systems
O Can be defined in /etc/sysconfig/network
44. What is Samba Server ?
O Samba is an Open Source Suite, that provides
seamless file and print services to SMB/CIFS
clients.
O Samba is freely available. With Samba, you
can share a Linux files system with Windows
and vice versa.
O You can also share printers connected to
either Linux or a system with Windows.
O Samba enables a Linux or Unix server to
function as a file server for client PCs running
Windows software.
45. Samba Server
O What is SMB?
O SMB stands for – Server Message Block.
O It is a protocol by which a lot of PC-related
machines share files and printers and other
information such as lists of available files and
printers.
O Operating systems that support this natively
include Windows, OS/2, and Linux. What is
CIFS?
O CIFS – Common Internet File System is a
protocol that is basically an updated SMB.
47. Samba Server Installation
O Step 1: Install the vsftpd package:
O [root@localhost Desktop] # yum install
vsftpd
O Step 2: Configure the software:
O [root@localhost Desktop] # vim
/etc/vsftpd/vsftpd.conf
O Step 3: Starting the service:
O [root@localhost Desktop] # systemctl start
smb
O The service of Samba Web Server is started.
48. FTP Server
O FTP (File Transfer Protocol) is the simplest and most
secure way to exchange files over the Internet.
O Transferring files from a client computer to a server
computer is called "uploading" and transferring from
a server to a client is "downloading".
O To access an FTP server, users must be able to
connect to the Internet or an intranet (via a modem
or local area network) with an FTP client program.
O FTP doesn’t not really move, it copies files from one
computer to another
O FTP is the file transfer protocol in the Internet's
TCP/IP protocol suite’s Application Layer.
49. FTP Client
O Some commonly used FTP clients include the
following:
O FileZilla- a popular FTP client that is freely
available for Windows, Macintosh, and Linux users
Available as a free download from the Internet.
O Fire FTP- a plug-in for the popular Firefox web
browser that can be used just like a standalone
FTP program Installed through the FireFox
browser.
O Dreamweaver- page layout/design program,
which include FTP access as one of its many
features Available for purchase from Adobe
50. FTP Features
O The FTP protocol is used for transferring one file at a
time, in either direction, between the client machine
(the one which initiated the connection, i.e. the
calling machine) and the server machine (which
provided the FTP service, i.e. the called machine).
O The FTP protocol can also perform other actions,
such as creating and deleting directories (only if they
are empty), listing files, deleting and renaming files,
etc.
O FTP allows files to have ownership and access
restrictions
O FTP hides the details of individual computer systems
52. FTP Installation
O Step 1: Install the vsftpd package:
O [root@localhost Desktop] # yum
install vsftpd
O Step 2: Configure the software:
O [root@localhost Desktop] # vim
/etc/vsftpd/vsftpd.conf
O Step 3: Starting the service:
O [root@localhost Desktop] #
systemctl start vsftpd
53. Web Server
O A Web server is a program that generates and
transmits responses to client requests for Web
resources.
O Handling a client request consists of several key
steps:
O Parsing the request message
O Checking that the request is authorized
O Associating the URL in the request with a file
name
O Constructing the response message
O Transmitting the response message to the
requesting client
55. Hypertext Transfer Protocol
(HTTP)
O The Hypertext Transfer Protocol (HTTP) is an
application protocol for distributed, collaborative,
hypermedia information systems.
O HTTP is the foundation of data communication for
the World Wide Web.
O HTTP functions as a request–response protocol in
the client–server computing model
O HTTP is an application layer protocol designed within
the framework of the Internet Protocol Suite.
O HTTP resources are identified and located on the
network by uniform resource locators (URLs), using
the uniform resource identifier (URI) schemes http
and https.
56. Installation of HTPD
O Step 1: Install the httpd package:
O [root@localhost Desktop] # yum
install httpd
O Step 2: Configure the software:
O [root@localhost Desktop] # vim
/etc/httpd/conf/httpd.conf
O Step 3: Starting the service:
O [root@localhost Desktop] #
systemctl start httpd