mgt 240 lecture the internet: computing at nd october 28, 2004

38
Mgt 240 Lecture Mgt 240 Lecture The Internet: Computing The Internet: Computing at ND at ND October 28, 2004 October 28, 2004

Post on 21-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

Mgt 240 LectureMgt 240 Lecture

The Internet: Computing at The Internet: Computing at NDND

October 28, 2004October 28, 2004

Page 2: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

Exam OneExam One

Grades will be posted on course web Grades will be posted on course web site this afternoonsite this afternoon

Range from 97.5 to 41.5Range from 97.5 to 41.5 Median of 73Median of 73 Average of 70Average of 70

Page 3: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

Exam OneExam One

Exam One Grade Distribution

3137

93

55

33

10

0

10

20

30

40

50

60

70

80

90

100

85 and above 80 to 85 70 to 80 60 to 70 50 to 60 40 to 50

Grade

Nu

mb

er o

f S

tud

ents

Page 4: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

Current Course Grade Current Course Grade DistributionDistribution

Mgt 240 Course Grade Distribution

48 49

39 38

26

20 19

5

911

0

10

20

30

40

50

60

A A- B+ B B- C+ C C- D F

Grade

Nu

mb

er

of

Stu

de

nts

Page 5: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

Exam OneExam One

If you would like to see your exam, If you would like to see your exam, you will need to come to my officeyou will need to come to my office

Extra office hours next week so that Extra office hours next week so that you can come and look at your examyou can come and look at your exam Tuesday 10-NoonTuesday 10-Noon Wednesday 10-NoonWednesday 10-Noon Thursday 10-NoonThursday 10-Noon

Page 6: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

Exam OneExam One

Things to think about when assessing your exam Things to think about when assessing your exam performanceperformance Did you attend all the lecture class sessions?Did you attend all the lecture class sessions? Did you do the readings and practice answering the Did you do the readings and practice answering the

reading questions as they were assigned?reading questions as they were assigned? To do well on the exam, you needed to do both To do well on the exam, you needed to do both

these thingsthese things What to do to improve your course gradeWhat to do to improve your course grade

Do well on homeworks, casesDo well on homeworks, cases Come to lecture and lab class sessionsCome to lecture and lab class sessions Do the assigned readings and tutorialsDo the assigned readings and tutorials

Page 7: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

Attendance – Section 1Attendance – Section 1Mgt 240 Lecture Section 01 Attendance Trends

93%

62%67%

51%

78%

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

9/2/2004 9/9/2004 9/16/2004 9/23/2004 9/30/2004 10/7/2004

Class Session Date

Pe

rce

nt

in C

las

s

.3 correlation between attendance and exam performance

7 point difference in the exam averages of students who attended 5 sessions versus 4

Page 8: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

Attendance – Section 2Attendance – Section 2

.33 correlation between attendance and exam performance

10 point difference in exam averages between students who attended all lecture classesand students who attended 2 or less

Page 9: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

What is the Internet?What is the Internet?

Global computer networkGlobal computer network Ad hoc linkage of many networks that Ad hoc linkage of many networks that

adhere to basic standardsadhere to basic standards TCP/IPTCP/IP

No single entity is in charge of the No single entity is in charge of the internetinternet

Perpetually evolvingPerpetually evolving Started as a DOD projectStarted as a DOD project

Page 10: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

How the Internet WorksHow the Internet Works

Internet Protocol (IP)Internet Protocol (IP) Standard for assigning computer Standard for assigning computer

addressesaddresses All computers connected to the internet All computers connected to the internet

have an IP addresshave an IP address Transport Control ProtocolTransport Control Protocol

Standard for controlling communications Standard for controlling communications between two computersbetween two computers

Page 11: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

Routing Messages Over the Routing Messages Over the InternetInternet

Page 12: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

Three Ways to Access the InternetThree Ways to Access the Internet

Page 13: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

A Representative List of Internet A Representative List of Internet Service ProvidersService Providers

Page 14: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

How We Use the InternetHow We Use the Internet

Use of internet constantly evolvingUse of internet constantly evolving Some of the many uses:Some of the many uses:

Sending emailSending email Exchanging files or dataExchanging files or data Making phone callsMaking phone calls CommerceCommerce Others?Others?

Page 15: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

U.S. Internet Usage by Age, U.S. Internet Usage by Age, Gender, Region, and IncomeGender, Region, and Income

Page 16: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

Summary of Internet ServicesSummary of Internet Services

Page 17: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

E-mailE-mail

SMTP – simple mail transfer protocolSMTP – simple mail transfer protocol IMAP (internet message access protocol)IMAP (internet message access protocol)

Stores mail on serverStores mail on server Allows use of server-based foldersAllows use of server-based folders Can access mail from any computer that can access Can access mail from any computer that can access

serverserver POP (post office protocol)POP (post office protocol)

Stores mail on server only until you access it with an Stores mail on server only until you access it with an email clientemail client

Designed to download mail to your pcDesigned to download mail to your pc Folders on pcFolders on pc

Page 18: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

E-mail at NDE-mail at ND

Server-based email: Server-based email: WebmailWebmail Access mail on the serverAccess mail on the server

Secure connection to server and user authenticationSecure connection to server and user authentication FoldersFolders Address bookAddress book FiltersFilters Directory serviceDirectory service Quota on mail serverQuota on mail server

Soft quota of 50MBSoft quota of 50MB Hard quota of 250MBHard quota of 250MB

Page 19: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

E-mail at NDE-mail at ND

PC-based email: Netscape, Eudora, PC-based email: Netscape, Eudora, Microsoft Outlook or Outlook ExpressMicrosoft Outlook or Outlook Express Obtaining an email clientObtaining an email client E-mail client set up instructionsE-mail client set up instructions PC-based email clients allow you toPC-based email clients allow you to

Secure connection to the mail server and user Secure connection to the mail server and user authenticationauthentication

Access your email on the serverAccess your email on the server Download your email to your PCDownload your email to your PC Organize your email into folders on your PCOrganize your email into folders on your PC Send, receive, categorize emailsSend, receive, categorize emails

Page 20: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

The World Wide WebThe World Wide Web

An Internet service comprising tens of thousands of An Internet service comprising tens of thousands of independently owned computers that work together as one.independently owned computers that work together as one.

Based on standards that web servers and web browsers Based on standards that web servers and web browsers understand:understand:

Hypertext transfer protocol (HTTP)Hypertext transfer protocol (HTTP) Hypertext markup language (HTML)Hypertext markup language (HTML) Uniform Resource Locator (URL)Uniform Resource Locator (URL)

Standard for web addressesStandard for web addresses http – high level protocol usedhttp – high level protocol used www – web serverwww – web server nd.edu – domain namend.edu – domain name

Page 21: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

Sample HTMLSample HTML

Page 22: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

URL ExamplesURL Examples

University of Notre DameUniversity of Notre Dame The White HouseThe White House WhiteHouse.comWhiteHouse.com

Page 23: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

U.S. Top-Level Domain AffiliationsU.S. Top-Level Domain Affiliations

.aero Aviation

.biz Business Organizations

.com Commercial

.coop Co-Operative Organizations

.edu Educational

.gov US Government

.info Open TLD

.int International Organizations

.mil US Dept of Defense

.museum Museums

.name Personal

.net Networks

.org Organizations

Page 24: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

Search EngineSearch Engine

Page 25: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

Web Resources at NDWeb Resources at ND

ND Web CentralND Web Central Using shared file space to publish a Using shared file space to publish a

web siteweb site

Page 26: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

Web Resources at NDWeb Resources at ND

Creating a personal web pageCreating a personal web page Create an html file named index.htmlCreate an html file named index.html Designate either the n: or h: drive as your Designate either the n: or h: drive as your

preferred web site locationpreferred web site location Place this file in your www folder on the drive Place this file in your www folder on the drive

you have chosenyou have chosen Now you should see the file when you type the Now you should see the file when you type the

url: http://www.nd.edu/~yournetidurl: http://www.nd.edu/~yournetid All other files that you link to your web page All other files that you link to your web page

must also be placed in this foldermust also be placed in this folder Limiting access to Notre Dame communityLimiting access to Notre Dame community

Page 27: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

File Transfer ProtocolFile Transfer Protocol Standard for transferring files over the Standard for transferring files over the

internetinternet Can be used to access your H: or N: drive Can be used to access your H: or N: drive

from any computer as an alternative to from any computer as an alternative to WebFileWebFile

Will be using ftp to upload web files to the Will be using ftp to upload web files to the web server when working on your web web server when working on your web assignments and projectsassignments and projects

There are a number of ways to use ftpThere are a number of ways to use ftp

Page 28: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

FTP TerminologyFTP Terminology Hosts and Clients

The machine on which you start FTP becomes the “client”

The machine you access with FTP becomes the “host”

Also, sometimes the client is called the “local” machine, and the host is called the “remote” machine

Page 29: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

FTPFTP

In order for a machine to be a host for you, that machine must be set up to accept you as a client. Typically, this is done by the system administrator.

Once this is done, you will be required to enter a login and password so that the host machine recognizes you as an approved client.

Uploading and Downloading When you transfer a file from the client machine to the

host machine, you are “uploading” the file. When you transfer a file from the host machine to the

client machine, you are “downloading” the file.

Page 30: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

Using FTP in DreamweaverUsing FTP in Dreamweaver

Page 31: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

Using FTP in DreamweaverUsing FTP in Dreamweaver

Page 32: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

FTP Using Your BrowserFTP Using Your Browser Let’s say you’re sitting in an airport and you would like to

be able to work on some of your AFS files via the internet, but you are using a machine that does not an FTP client program

This is no problem, because you can use a Netscape or Explorer web browser as a client also

All you need to do is enter the FTP address of the host in the ‘Address’ box of your browser. This address is almost identical to the address that you used with F-Secure, except you drop the ‘ s’ at the beginning.

This is what your FTP address should look like: ftp://[email protected]

Page 33: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

FTP Using Your Browser

Once you enter the FTP address, you will be asked to supply the required password.

You will then be able to see the folders of your AFS space within the web browser.

Downloading Files: When using the web-browser, performing file transfer is not quite as easy as with F-Secure. You cannot download a file by clicking and dragging a file from the host to the client. Rather, you must first right -click on the file in the host directory and then either open it or save it to a folder in your client directory.

Uploading Files: However, you may upload a file by clicking on a file in the client directory and dragging it to the host directory.

Page 34: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

FTP Using F-Secure

One of the easiest ways to use FTP is through a software package called F-secure, which can be downloaded for free from the Notre Dame OIT software package download page

This page can be accessed through: http://www.nd.edu/~ndoit/software/

Click on ‘Software Downloads’

Scroll down to ‘F-Secure for Windows’ and double click.

Now follow the downloading instructions, and you are in business.

Page 35: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

FTP Using F-SecureFTP Using F-Secure

F-Secure is an excellent way to easily transfer files between a host and client machine because it provides a very intuitive interface. You can transfer files between drives by click and drag.

When you first open F-Secure (open F-Secure SSH File Transfer), you will see at the bottom of the interface “Not Connected”. So now you’ve got to connect to a host (remote) drive by entering the host name or the IP address of the host machine.

Page 36: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

F-Secure: Entering the FTP F-Secure: Entering the FTP AddressAddress

You need to know the FTP address of the host machine that you are trying to access. For example: darwin.cc.nd.edu

Click on “Quick Access”

Enter darwin.cc.nd.edu for the Host Name/IP address

Then type in your user name (NetID): for example, dballou

Click ‘Connect.’

Now a window will pop up requesting your password.

Enter the correct AFS password, and then you will be connected.

Page 37: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

F-SecureF-Secure

Now that you are connected to the host using F-Secure, transferring files between the host and client is a snap

All you need to do to transfer a file is to select it—you can select multiple files by holding down the ctrl key while selecting—and drag it from one drive to the other

Or you can use the upload/download from the toolbar

Depending on the size of the file and the speed of your internet connection, the transfer of the file can take seconds or many minutes

Page 38: Mgt 240 Lecture The Internet: Computing at ND October 28, 2004

F-SecureF-Secure If you are using a dial-up modem, be very

careful of transferring huge data files--you’ll end up waiting for quite a while! However, if you have a high speed connection, even very large files can be transferred relatively quickly.

You can also open a file to view by right clicking on the file in the host directory and selecting ‘Open.’ You may also save and delete files directly within F-Secure.