SlideShare a Scribd company logo
1 of 42
FILE TRANSFER PROTOCOL
PREPARED BY
Mr. Gowdham . P
INTRODUCTION
The File Transfer Protocol is a standard network protocol used for the
transfer of computer files from a server to a client on a computer network.
FTP is built on a client-server model architecture using separate control
and data connections between the client and the server.
FTP (File Transfer Protocol) is the simplest and most secure way to
exchange files over the Internet.
Transferring files from a client computer to a server computer is called
"uploading" and transferring from a server to a client is "downloading“.
DEFINITION
File Transfer Protocol (FTP) is a standard Internet protocol for
transmitting files between computers on the Internet
over TCP/IP connections. FTP is a client-server protocol where
a client will ask for a file, and a local or remote server will
provide it.
-
PETER LOSHIN
(Tech Target Contributor)
HISTORY
The original specification for the File Transfer Protocol was written
by Abhay Bhushan and published as RFC 114 on 16 April 1971. Until
1980, FTP ran on NCP, the predecessor of TCP/IP.
The protocol was later replaced by a TCP/IP version, RFC 765 (June
1980) and RFC 959 (October 1985), the current specification.
Several proposed standards amend RFC 959.
Example:
RFC 1579 (February 1994) enables Firewall-Friendly FTP (passive
mode), RFC 2228 (June 1997) proposes security extensions, RFC 2428 (September
1998) adds support for IPv6 and defines a new type of passive mode.
OBJECTIVES OF FTP
It provides the sharing of files.
It is used to encourage the use of remote computers.
It transfers the data more reliably and efficiently.
FTP MODLE
FTP PROCESS
When an FTP client is connected to a FTP server, the USER-PI initiates
the connection to the server according to the Telnet protocol.
The client sends FTP commands to the server, the server interprets
them, runs its DTP, then sends a standard response.
Once the connection is established, the server-PI gives the port on
which data will be sent to the Client DTP.
The client DTP then listens on the specified port for data coming from
the server.
FTP CONNECTIONS
FTP
CONNECTIONS
Control
connection
Data
connection
FTP CONNECTION TYPES
TYPES OF CONNECTION
•Control Connection:
The control connection uses very simple rules for
communication. Through control connection, we can
transfer a line of command or line of response at a time.
The control connection is made between the control
processes. The control connection remains connected
during the entire interactive FTP session.
•Data Connection:
The Data Connection uses very complex rules as data types
may vary. The data connection is made between data
transfer processes. The data connection opens when a
command comes for transferring the files and closes when
DTP&PI
DTP (Data Transfer Process) It establishes the
connection and managing the data channel. The server
side DTP is called SERVER-DTP, the client side DTP is
called USER-DTP.
PI (Protocol Interpreter) Controls DTP using
commands received over the control channel. It is
different on the client and the server:
PI
{Protocol
Interpreter}
SERVER-
PI
USER-PI
CONT.,
The SERVER-PI is responsible for listening to the
commands coming from a USER-PI over the control,
establishing the connection for the control channel,
receiving FTP commands from the USER-PI over this,
responding to them and running the SERVER-DTP.
The USER-PI is responsible for establishing the
connection with the FTP server, sending FTP
commands, receiving responses from the SERVER-PI
and controlling the USER-DTP if needed.
FTP CLIENTS
There are many FTP client programs, some of which
are run from a command-line (such as the command
ftp, a standard installed in many operating systems),
but a large majority allow the user to manipulate files
via a graphical interface, which makes file transfers
more user-friendly.
CONT.,
Some commonly used FTP clients include the following
FileZilla- a popular FTP client that is freely available for
Windows, Macintosh, and Linux users Available as a free
download from the Internet.
Fire FTP- a plug-in for the popular Firefox web browser
that can be used just like a standalone FTP program
Installed through the FireFox browser.
Dreamweaver- page layout/design program, which
include FTP access as one of its many features Available
for purchase from Adobe.
FTP MODLE
It is important to note that since the control and
data ports are separate channels, it is possible to
send commands from one machine and receive
data on another. So, for example it is possible to
transfer data between FTP servers by passing
through a client to send control instructions and
by transferring information between two server
processes connected on the right port.
FTP COMMANDS
There are three different types of FTP
commands:
 Access control commands.
Example:
USER,PASS,ACCT,CWD,CDUP,SMNT,REIN,QUIT.
 Transfer parameter commands.
Example:
PORT,PASU,TYPE,STRU,MODE.
CONT.,
 FTP service commands.
Example:
RETR,STUR,STOU,APPE,ALLO,REST,RNER,RNTO,ABOR,D
ELE,RMD,MKD,PWD,LIST,NLST,SITE,SYST,STST.
THE FTP RESPONSES
The FTP responses make it possible to ensure
synchronization between the client and FTP server. So,
at each command sent by the client, the server will
potentially carry out an action and systematically send
back a response.
CONT.,
The response codes are made up of 3 numbers
the meanings of which are as follows:
The first number indicates the status of the response
(success or fail).
The second number indicates what the response
refers to.
The third number gives a more specific meaning
(relative to each second digit).
FIRST NUMBER DIGIT
1yz means Preliminary positive response:
The action requested is in progress, a second
response must be obtained before sending a second
command.
2yz Positive fulfilment response:
The action requested has been fulfilled, a new
command can be sent.
3yz Intermediary positive response:
The action request is temporarily suspended.
Additional information is awaited from the client.
CONT.,
4yz Negative fulfilment response
The action requested has not taken place because the
command has temporarily not been accepted. The
client is requested to try again later.
5yz Permanent negative response
The action requested has not taken place because the
command has not been accepted. The client is
requested to formulate a different request.
SECOND NUMBER DIGIT
x0z Syntax
The action has a syntax error, or is a command not
understood by the server.
x1z Information
This is a response sending back information .
x2z Connections
The response relates to the data channel.
CONT.,
x3z Authentication and accounts
The response relates to the (USER/PASS) login or the
request to change the account (CPT).
x4z Not used by the FTP protocol.
x5z File system
The response relates to the remote file system.
ADVANTAGES OF FTP
Speed:
One of the biggest advantages of FTP is speed. The
FTP is one of the fastest way to transfer the files from
one computer to another computer.
Efficient:
It is more efficient as we do not need to complete all
the operations to get the entire file.
CONT.,
Security:
To access the FTP server, we need to login with the
username and password. Therefore, we can say that
FTP is more secure.
Back & forth movement:
FTP allows us to transfer the files back and forth.
Suppose you are a manager of the company, you send
some information to all the employees, and they all
send information back on the same server.
DISADVANTAGES OF FTP
The standard requirement of the industry is that all
the FTP transmissions should be encrypted. However,
not all the FTP providers are equal and not all the
providers offer encryption. So, we will have to look out
for the FTP providers that provides encryption.
FTP serves two operations, to send and receive large
files on a network. However, the size limit of the file is
2GB that can be sent. It also doesn't allow you to run
simultaneous transfers to multiple receivers.
CONT.,
Passwords and file contents are sent in clear text that
allows unwanted eavesdropping. So, it is quite
possible that attackers can carry out the brute force
attack by trying to guess the FTP password.
It is not compatible with every system.
ELECTRONIC PAYMENT
SYSTEM
INTRODUCTION
E payments are payments that are made electronically
over the internet .
Earlier almost all the business transactions were done
through cash payments but now IT revolution has led
to the development of new forms of payment.
DEFINITION
Electronic payment system is a financial exchange that
takes place online between buyers and sellers.
There are different methods to pay electronically like credit
cards , electronic cash etc.
CUSTOM
ER
VIRTUAL
BUSINESS
PAYMENT GATEWAY
Payment Gateways are the entities that act as a
medium for transaction processing between the
entities ( e.g. mastercard visa) and Certification
authorities (CA) . They issue public key certificates to
entities.
PAYMENT SYSTEMS
ARCHITECTURE
PROBLEMS IN TRADITIONAL
PAYMENT SYSTEM
Lack of convenience.
Lack of security.
Lack of coverage.
Lack of eligibility.
Lack of support for micro transactions.
TYPES OF e-PAYMENT
PAYMENT CARDS
CREDIT CARDS.
DEBIT CARDS.
CHARGE CARDS.
SMART CARDS.
CREDIT CARDS
Two of credit cards on the market.
Credit cards issued by credit companies(e.g. Master
card, visa) and major banks (SBI, HDFC etc.).
Credit cards issed by the departmental stores(e.g.
Boygner) , oil companies(e.g. Shell).
DEBIT CARDS
Plastic card with a unique number.
Requires a bank account.
No interest charges related to this card
CHARGE CARDS
Are similar to credit cards except they have no revolving credit line
so they have make payments every month.
It similar to credit card and debit card in appearance bt it has a
small microprocessor chip embedded in it.
SMART CARDS
It similar to credit card and debit card in appearance but it has a
small microprocessor chip embedded in it.
ELECTRONIC CASH
In case of e-cash, both customer and merchant have
to sign up with the bank or company issuing e-cash.
Enables transactions between customers without the
need of banks.
E-WALLETS
A digital wallet refers to an electronic device that
allows an individual to make electronic transactions.
This can include purchasing items on-line with a
computer or using a smartphone to purchase
something at a store.
It is convenient & safe way to carry less cash.
Example: Mobile Wallet.
MICRO-PAYMENT SYSTEM
Small payments on web like billing by bank, financial institute etc.
Universal acceptance.
Comprehensive security.
Allows vendors to sell content.
E-CASH
Online payments via debit cards, credit cards or
smart card are the examples of e-money transactions.
E Cash is transferred directly from customer’s
desktop to the merchant’s site.
E-CHEQUE
E-Cheque is the result of co-operation between
several banks, government entities, technology
companies and e-commerce organizations.
These can be used for small and large organizations.
Thank you all ! !

More Related Content

What's hot

Design an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing SoftwareDesign an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing Softwarenilabarai
 
Group20 Dynamic Networks
Group20 Dynamic NetworksGroup20 Dynamic Networks
Group20 Dynamic Networkshariprasadnr
 
Presentation 1
Presentation 1Presentation 1
Presentation 1aisadhsa
 
Domain name system (dns) , TELNET ,FTP, TFTP
Domain name system (dns) , TELNET ,FTP, TFTPDomain name system (dns) , TELNET ,FTP, TFTP
Domain name system (dns) , TELNET ,FTP, TFTPsaurav kumar
 
Application layer in network system
Application layer in network systemApplication layer in network system
Application layer in network systemSalauddin Rubel
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITDeepraj Bhujel
 
Unit 5 application layer
Unit 5 application layerUnit 5 application layer
Unit 5 application layerKritika Purohit
 
(Ftp) file transfer protocol
(Ftp)   file transfer protocol(Ftp)   file transfer protocol
(Ftp) file transfer protocolGouasmia Zakaria
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mailtumetr1
 
Lecture 7 -_ftp,_tftp,_telnet_and_ssh
Lecture 7 -_ftp,_tftp,_telnet_and_sshLecture 7 -_ftp,_tftp,_telnet_and_ssh
Lecture 7 -_ftp,_tftp,_telnet_and_sshSerious_SamSoul
 
Application layer
Application layerApplication layer
Application layerFarah Hunny
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocolguest029bcd
 
香港六合彩
香港六合彩香港六合彩
香港六合彩csukxnr
 

What's hot (15)

Design an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing SoftwareDesign an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing Software
 
Group20 Dynamic Networks
Group20 Dynamic NetworksGroup20 Dynamic Networks
Group20 Dynamic Networks
 
Presentation 1
Presentation 1Presentation 1
Presentation 1
 
Domain name system (dns) , TELNET ,FTP, TFTP
Domain name system (dns) , TELNET ,FTP, TFTPDomain name system (dns) , TELNET ,FTP, TFTP
Domain name system (dns) , TELNET ,FTP, TFTP
 
Application layer in network system
Application layer in network systemApplication layer in network system
Application layer in network system
 
Network Testing ques
Network Testing quesNetwork Testing ques
Network Testing ques
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - IT
 
Unit 5 application layer
Unit 5 application layerUnit 5 application layer
Unit 5 application layer
 
(Ftp) file transfer protocol
(Ftp)   file transfer protocol(Ftp)   file transfer protocol
(Ftp) file transfer protocol
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mail
 
Lecture 7 -_ftp,_tftp,_telnet_and_ssh
Lecture 7 -_ftp,_tftp,_telnet_and_sshLecture 7 -_ftp,_tftp,_telnet_and_ssh
Lecture 7 -_ftp,_tftp,_telnet_and_ssh
 
Application layer
Application layerApplication layer
Application layer
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
 
Application layer
Application layerApplication layer
Application layer
 

Similar to FTP File Transfer Protocol Guide

File Transfer Protocol - FTP
File Transfer Protocol - FTPFile Transfer Protocol - FTP
File Transfer Protocol - FTPMahfuzRahman94
 
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4Syed Ariful Islam Emon
 
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSSWeb Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSSKajal Singh
 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinitashach22
 
FILE TRANSFER PROTOCOL.pptx
FILE TRANSFER PROTOCOL.pptxFILE TRANSFER PROTOCOL.pptx
FILE TRANSFER PROTOCOL.pptxsatvikkushwaha1
 
filetranferprotocolseminarpresentation.pptx
filetranferprotocolseminarpresentation.pptxfiletranferprotocolseminarpresentation.pptx
filetranferprotocolseminarpresentation.pptxDSPL
 
Telnet and FTP.ppt
Telnet and FTP.pptTelnet and FTP.ppt
Telnet and FTP.pptssuser1774d3
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptxazmerawAnna1
 
六合彩 » SlideShare
六合彩 » SlideShare六合彩 » SlideShare
六合彩 » SlideSharemvtqyygx
 
六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideSharedqxjlhfc
 
香港六合彩-六合彩
香港六合彩-六合彩香港六合彩-六合彩
香港六合彩-六合彩qiohms
 
六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShareyqtvdsbl
 
六合彩-香港六合彩 » SlideShare
六合彩-香港六合彩 » SlideShare六合彩-香港六合彩 » SlideShare
六合彩-香港六合彩 » SlideSharemmfirkhw
 

Similar to FTP File Transfer Protocol Guide (20)

File Transfer Protocol - FTP
File Transfer Protocol - FTPFile Transfer Protocol - FTP
File Transfer Protocol - FTP
 
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
 
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSSWeb Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
 
Dcn ppt 150050705008
Dcn ppt 150050705008Dcn ppt 150050705008
Dcn ppt 150050705008
 
Introduction to telnet
Introduction to telnetIntroduction to telnet
Introduction to telnet
 
FILE TRANSFER PROTOCOL.pptx
FILE TRANSFER PROTOCOL.pptxFILE TRANSFER PROTOCOL.pptx
FILE TRANSFER PROTOCOL.pptx
 
Sem 1 Ch 11
Sem 1 Ch 11Sem 1 Ch 11
Sem 1 Ch 11
 
filetranferprotocolseminarpresentation.pptx
filetranferprotocolseminarpresentation.pptxfiletranferprotocolseminarpresentation.pptx
filetranferprotocolseminarpresentation.pptx
 
Telnet and FTP.ppt
Telnet and FTP.pptTelnet and FTP.ppt
Telnet and FTP.ppt
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
application layer
application layerapplication layer
application layer
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
六合彩 » SlideShare
六合彩 » SlideShare六合彩 » SlideShare
六合彩 » SlideShare
 
六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare
 
香港六合彩-六合彩
香港六合彩-六合彩香港六合彩-六合彩
香港六合彩-六合彩
 
六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare
 
六合彩-香港六合彩 » SlideShare
六合彩-香港六合彩 » SlideShare六合彩-香港六合彩 » SlideShare
六合彩-香港六合彩 » SlideShare
 

Recently uploaded

Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 

Recently uploaded (20)

Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 

FTP File Transfer Protocol Guide

  • 1. FILE TRANSFER PROTOCOL PREPARED BY Mr. Gowdham . P
  • 2. INTRODUCTION The File Transfer Protocol is a standard network protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client-server model architecture using separate control and data connections between the client and the server. FTP (File Transfer Protocol) is the simplest and most secure way to exchange files over the Internet. Transferring files from a client computer to a server computer is called "uploading" and transferring from a server to a client is "downloading“.
  • 3. DEFINITION File Transfer Protocol (FTP) is a standard Internet protocol for transmitting files between computers on the Internet over TCP/IP connections. FTP is a client-server protocol where a client will ask for a file, and a local or remote server will provide it. - PETER LOSHIN (Tech Target Contributor)
  • 4. HISTORY The original specification for the File Transfer Protocol was written by Abhay Bhushan and published as RFC 114 on 16 April 1971. Until 1980, FTP ran on NCP, the predecessor of TCP/IP. The protocol was later replaced by a TCP/IP version, RFC 765 (June 1980) and RFC 959 (October 1985), the current specification. Several proposed standards amend RFC 959. Example: RFC 1579 (February 1994) enables Firewall-Friendly FTP (passive mode), RFC 2228 (June 1997) proposes security extensions, RFC 2428 (September 1998) adds support for IPv6 and defines a new type of passive mode.
  • 5. OBJECTIVES OF FTP It provides the sharing of files. It is used to encourage the use of remote computers. It transfers the data more reliably and efficiently.
  • 7. FTP PROCESS When an FTP client is connected to a FTP server, the USER-PI initiates the connection to the server according to the Telnet protocol. The client sends FTP commands to the server, the server interprets them, runs its DTP, then sends a standard response. Once the connection is established, the server-PI gives the port on which data will be sent to the Client DTP. The client DTP then listens on the specified port for data coming from the server.
  • 9. TYPES OF CONNECTION •Control Connection: The control connection uses very simple rules for communication. Through control connection, we can transfer a line of command or line of response at a time. The control connection is made between the control processes. The control connection remains connected during the entire interactive FTP session. •Data Connection: The Data Connection uses very complex rules as data types may vary. The data connection is made between data transfer processes. The data connection opens when a command comes for transferring the files and closes when
  • 10. DTP&PI DTP (Data Transfer Process) It establishes the connection and managing the data channel. The server side DTP is called SERVER-DTP, the client side DTP is called USER-DTP. PI (Protocol Interpreter) Controls DTP using commands received over the control channel. It is different on the client and the server: PI {Protocol Interpreter} SERVER- PI USER-PI
  • 11. CONT., The SERVER-PI is responsible for listening to the commands coming from a USER-PI over the control, establishing the connection for the control channel, receiving FTP commands from the USER-PI over this, responding to them and running the SERVER-DTP. The USER-PI is responsible for establishing the connection with the FTP server, sending FTP commands, receiving responses from the SERVER-PI and controlling the USER-DTP if needed.
  • 12. FTP CLIENTS There are many FTP client programs, some of which are run from a command-line (such as the command ftp, a standard installed in many operating systems), but a large majority allow the user to manipulate files via a graphical interface, which makes file transfers more user-friendly.
  • 13. CONT., Some commonly used FTP clients include the following FileZilla- a popular FTP client that is freely available for Windows, Macintosh, and Linux users Available as a free download from the Internet. Fire FTP- a plug-in for the popular Firefox web browser that can be used just like a standalone FTP program Installed through the FireFox browser. Dreamweaver- page layout/design program, which include FTP access as one of its many features Available for purchase from Adobe.
  • 14. FTP MODLE It is important to note that since the control and data ports are separate channels, it is possible to send commands from one machine and receive data on another. So, for example it is possible to transfer data between FTP servers by passing through a client to send control instructions and by transferring information between two server processes connected on the right port.
  • 15. FTP COMMANDS There are three different types of FTP commands:  Access control commands. Example: USER,PASS,ACCT,CWD,CDUP,SMNT,REIN,QUIT.  Transfer parameter commands. Example: PORT,PASU,TYPE,STRU,MODE.
  • 16. CONT.,  FTP service commands. Example: RETR,STUR,STOU,APPE,ALLO,REST,RNER,RNTO,ABOR,D ELE,RMD,MKD,PWD,LIST,NLST,SITE,SYST,STST.
  • 17. THE FTP RESPONSES The FTP responses make it possible to ensure synchronization between the client and FTP server. So, at each command sent by the client, the server will potentially carry out an action and systematically send back a response.
  • 18. CONT., The response codes are made up of 3 numbers the meanings of which are as follows: The first number indicates the status of the response (success or fail). The second number indicates what the response refers to. The third number gives a more specific meaning (relative to each second digit).
  • 19. FIRST NUMBER DIGIT 1yz means Preliminary positive response: The action requested is in progress, a second response must be obtained before sending a second command. 2yz Positive fulfilment response: The action requested has been fulfilled, a new command can be sent. 3yz Intermediary positive response: The action request is temporarily suspended. Additional information is awaited from the client.
  • 20. CONT., 4yz Negative fulfilment response The action requested has not taken place because the command has temporarily not been accepted. The client is requested to try again later. 5yz Permanent negative response The action requested has not taken place because the command has not been accepted. The client is requested to formulate a different request.
  • 21. SECOND NUMBER DIGIT x0z Syntax The action has a syntax error, or is a command not understood by the server. x1z Information This is a response sending back information . x2z Connections The response relates to the data channel.
  • 22. CONT., x3z Authentication and accounts The response relates to the (USER/PASS) login or the request to change the account (CPT). x4z Not used by the FTP protocol. x5z File system The response relates to the remote file system.
  • 23. ADVANTAGES OF FTP Speed: One of the biggest advantages of FTP is speed. The FTP is one of the fastest way to transfer the files from one computer to another computer. Efficient: It is more efficient as we do not need to complete all the operations to get the entire file.
  • 24. CONT., Security: To access the FTP server, we need to login with the username and password. Therefore, we can say that FTP is more secure. Back & forth movement: FTP allows us to transfer the files back and forth. Suppose you are a manager of the company, you send some information to all the employees, and they all send information back on the same server.
  • 25. DISADVANTAGES OF FTP The standard requirement of the industry is that all the FTP transmissions should be encrypted. However, not all the FTP providers are equal and not all the providers offer encryption. So, we will have to look out for the FTP providers that provides encryption. FTP serves two operations, to send and receive large files on a network. However, the size limit of the file is 2GB that can be sent. It also doesn't allow you to run simultaneous transfers to multiple receivers.
  • 26. CONT., Passwords and file contents are sent in clear text that allows unwanted eavesdropping. So, it is quite possible that attackers can carry out the brute force attack by trying to guess the FTP password. It is not compatible with every system.
  • 28. INTRODUCTION E payments are payments that are made electronically over the internet . Earlier almost all the business transactions were done through cash payments but now IT revolution has led to the development of new forms of payment.
  • 29. DEFINITION Electronic payment system is a financial exchange that takes place online between buyers and sellers. There are different methods to pay electronically like credit cards , electronic cash etc. CUSTOM ER VIRTUAL BUSINESS
  • 30. PAYMENT GATEWAY Payment Gateways are the entities that act as a medium for transaction processing between the entities ( e.g. mastercard visa) and Certification authorities (CA) . They issue public key certificates to entities.
  • 32. PROBLEMS IN TRADITIONAL PAYMENT SYSTEM Lack of convenience. Lack of security. Lack of coverage. Lack of eligibility. Lack of support for micro transactions.
  • 33. TYPES OF e-PAYMENT PAYMENT CARDS CREDIT CARDS. DEBIT CARDS. CHARGE CARDS. SMART CARDS.
  • 34. CREDIT CARDS Two of credit cards on the market. Credit cards issued by credit companies(e.g. Master card, visa) and major banks (SBI, HDFC etc.). Credit cards issed by the departmental stores(e.g. Boygner) , oil companies(e.g. Shell).
  • 35. DEBIT CARDS Plastic card with a unique number. Requires a bank account. No interest charges related to this card
  • 36. CHARGE CARDS Are similar to credit cards except they have no revolving credit line so they have make payments every month. It similar to credit card and debit card in appearance bt it has a small microprocessor chip embedded in it. SMART CARDS It similar to credit card and debit card in appearance but it has a small microprocessor chip embedded in it.
  • 37. ELECTRONIC CASH In case of e-cash, both customer and merchant have to sign up with the bank or company issuing e-cash. Enables transactions between customers without the need of banks.
  • 38. E-WALLETS A digital wallet refers to an electronic device that allows an individual to make electronic transactions. This can include purchasing items on-line with a computer or using a smartphone to purchase something at a store. It is convenient & safe way to carry less cash. Example: Mobile Wallet.
  • 39. MICRO-PAYMENT SYSTEM Small payments on web like billing by bank, financial institute etc. Universal acceptance. Comprehensive security. Allows vendors to sell content.
  • 40. E-CASH Online payments via debit cards, credit cards or smart card are the examples of e-money transactions. E Cash is transferred directly from customer’s desktop to the merchant’s site.
  • 41. E-CHEQUE E-Cheque is the result of co-operation between several banks, government entities, technology companies and e-commerce organizations. These can be used for small and large organizations.