![]() This section will only skim the bare minimum of commands needed to operate an FTP session. For more specific information, read the manual for your specific FTP program. While there have been many extensions to the various FTP clients out there, there is a de facto "standard" set that everyone expects to work. Also, remember that if it's past dinner time in Maine, it's still early afternoon in California- think in terms of the current time at the site that's being visited, not of local time. The possible effects of a large transfer will be less destructive at 2 a.m. To help be considerate of this, it's highly recommended that FTP sessions be held only after normal business hours for that site, preferably late at night. The effects of an FTP connection on a site and its link can vary the general rule of thumb is that any extra traffic created detracts from the ability of that site's users to perform their tasks. Any heavy activity takes away from the overall performance of the network as a whole. People using the network and the systems on it are doing so for a purpose, whether it be research, development, whatever. Lest we forget, the Internet is there for people to do work. If there are thirty people all FTPing from one site simultaneously, the load on the system (in addition to the network connection) will degrade the overall throughput of the transfer. Also, the traffic of all other users on that link will affect performance. A site that has a 9600bps SLIP connection will not get the same throughput as a system with a 56k leased line (see Section 1.5 for more on what kinds of connections can exist in a network). The speed of the transfer depends on the speed of the underlying link. (See Section 2.1, page 11 for information on email addresses). Name (:you): anonymous Password: and netiquette dictate that people respond to the Password: query with an email address so that the sites can track the level of FTP usage, if they desire. The process involves the "foreign" user (someone not on the system itself) creating an FTP connection and logging into the system as the user 'anonymous', with an arbitrary password: They include (Digital), (Washington University in Saint Louis), and (The Ohio State University). Some systems have dedicated entire disks or even entire computers to maintaining extensive archives of source code and information. With this, people can make files publicly available with little hassle. It essentially will let anyone in the world have access to a certain area of disk space in a non-threatening way. ![]() There is a good way around this restriction-the anonymous FTP service. ![]() This normally requires either a user id on both systems or a special configuration set up by the system administrator(s). Given proper permission, it's possible to copy a file from a computer in South Africa to one in Los Angeles at very fast speeds (on the order of 510K per second). On many systems, it's also the name of the program that implements the protocol. Zen and the Art of the Internet - Chapter 3įTP (File Transfer Protocol) is the primary method of transferring files over the Internet. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |