The document provides information about File Transfer Protocol (FTP). It discusses that FTP is a standard network protocol used to transfer files between clients and servers. FTP uses separate control and data connections, with the control connection managing commands and the data connection transferring files. The document outlines the FTP model, including the protocol interpreter and data transfer process on both the client and server sides. It also discusses FTP commands, connections types, clients, advantages and disadvantages.
2. INTRODUCTION
The File Transfer Protocol is a standard network protocol used for the
transfer of computer files from a server to a client on a computer network.
FTP is built on a client-server model architecture using separate control
and data connections between the client and the server.
FTP (File Transfer Protocol) is the simplest and most secure way to
exchange files over the Internet.
Transferring files from a client computer to a server computer is called
"uploading" and transferring from a server to a client is "downloading“.
3. DEFINITION
File Transfer Protocol (FTP) is a standard Internet protocol for
transmitting files between computers on the Internet
over TCP/IP connections. FTP is a client-server protocol where
a client will ask for a file, and a local or remote server will
provide it.
-
PETER LOSHIN
(Tech Target Contributor)
4. HISTORY
The original specification for the File Transfer Protocol was written
by Abhay Bhushan and published as RFC 114 on 16 April 1971. Until
1980, FTP ran on NCP, the predecessor of TCP/IP.
The protocol was later replaced by a TCP/IP version, RFC 765 (June
1980) and RFC 959 (October 1985), the current specification.
Several proposed standards amend RFC 959.
Example:
RFC 1579 (February 1994) enables Firewall-Friendly FTP (passive
mode), RFC 2228 (June 1997) proposes security extensions, RFC 2428 (September
1998) adds support for IPv6 and defines a new type of passive mode.
5. OBJECTIVES OF FTP
It provides the sharing of files.
It is used to encourage the use of remote computers.
It transfers the data more reliably and efficiently.
7. FTP PROCESS
When an FTP client is connected to a FTP server, the USER-PI initiates
the connection to the server according to the Telnet protocol.
The client sends FTP commands to the server, the server interprets
them, runs its DTP, then sends a standard response.
Once the connection is established, the server-PI gives the port on
which data will be sent to the Client DTP.
The client DTP then listens on the specified port for data coming from
the server.
9. TYPES OF CONNECTION
•Control Connection:
The control connection uses very simple rules for
communication. Through control connection, we can
transfer a line of command or line of response at a time.
The control connection is made between the control
processes. The control connection remains connected
during the entire interactive FTP session.
•Data Connection:
The Data Connection uses very complex rules as data types
may vary. The data connection is made between data
transfer processes. The data connection opens when a
command comes for transferring the files and closes when
10. DTP&PI
DTP (Data Transfer Process) It establishes the
connection and managing the data channel. The server
side DTP is called SERVER-DTP, the client side DTP is
called USER-DTP.
PI (Protocol Interpreter) Controls DTP using
commands received over the control channel. It is
different on the client and the server:
PI
{Protocol
Interpreter}
SERVER-
PI
USER-PI
11. CONT.,
The SERVER-PI is responsible for listening to the
commands coming from a USER-PI over the control,
establishing the connection for the control channel,
receiving FTP commands from the USER-PI over this,
responding to them and running the SERVER-DTP.
The USER-PI is responsible for establishing the
connection with the FTP server, sending FTP
commands, receiving responses from the SERVER-PI
and controlling the USER-DTP if needed.
12. FTP CLIENTS
There are many FTP client programs, some of which
are run from a command-line (such as the command
ftp, a standard installed in many operating systems),
but a large majority allow the user to manipulate files
via a graphical interface, which makes file transfers
more user-friendly.
13. CONT.,
Some commonly used FTP clients include the following
FileZilla- a popular FTP client that is freely available for
Windows, Macintosh, and Linux users Available as a free
download from the Internet.
Fire FTP- a plug-in for the popular Firefox web browser
that can be used just like a standalone FTP program
Installed through the FireFox browser.
Dreamweaver- page layout/design program, which
include FTP access as one of its many features Available
for purchase from Adobe.
14. FTP MODLE
It is important to note that since the control and
data ports are separate channels, it is possible to
send commands from one machine and receive
data on another. So, for example it is possible to
transfer data between FTP servers by passing
through a client to send control instructions and
by transferring information between two server
processes connected on the right port.
15. FTP COMMANDS
There are three different types of FTP
commands:
Access control commands.
Example:
USER,PASS,ACCT,CWD,CDUP,SMNT,REIN,QUIT.
Transfer parameter commands.
Example:
PORT,PASU,TYPE,STRU,MODE.
16. CONT.,
FTP service commands.
Example:
RETR,STUR,STOU,APPE,ALLO,REST,RNER,RNTO,ABOR,D
ELE,RMD,MKD,PWD,LIST,NLST,SITE,SYST,STST.
17. THE FTP RESPONSES
The FTP responses make it possible to ensure
synchronization between the client and FTP server. So,
at each command sent by the client, the server will
potentially carry out an action and systematically send
back a response.
18. CONT.,
The response codes are made up of 3 numbers
the meanings of which are as follows:
The first number indicates the status of the response
(success or fail).
The second number indicates what the response
refers to.
The third number gives a more specific meaning
(relative to each second digit).
19. FIRST NUMBER DIGIT
1yz means Preliminary positive response:
The action requested is in progress, a second
response must be obtained before sending a second
command.
2yz Positive fulfilment response:
The action requested has been fulfilled, a new
command can be sent.
3yz Intermediary positive response:
The action request is temporarily suspended.
Additional information is awaited from the client.
20. CONT.,
4yz Negative fulfilment response
The action requested has not taken place because the
command has temporarily not been accepted. The
client is requested to try again later.
5yz Permanent negative response
The action requested has not taken place because the
command has not been accepted. The client is
requested to formulate a different request.
21. SECOND NUMBER DIGIT
x0z Syntax
The action has a syntax error, or is a command not
understood by the server.
x1z Information
This is a response sending back information .
x2z Connections
The response relates to the data channel.
22. CONT.,
x3z Authentication and accounts
The response relates to the (USER/PASS) login or the
request to change the account (CPT).
x4z Not used by the FTP protocol.
x5z File system
The response relates to the remote file system.
23. ADVANTAGES OF FTP
Speed:
One of the biggest advantages of FTP is speed. The
FTP is one of the fastest way to transfer the files from
one computer to another computer.
Efficient:
It is more efficient as we do not need to complete all
the operations to get the entire file.
24. CONT.,
Security:
To access the FTP server, we need to login with the
username and password. Therefore, we can say that
FTP is more secure.
Back & forth movement:
FTP allows us to transfer the files back and forth.
Suppose you are a manager of the company, you send
some information to all the employees, and they all
send information back on the same server.
25. DISADVANTAGES OF FTP
The standard requirement of the industry is that all
the FTP transmissions should be encrypted. However,
not all the FTP providers are equal and not all the
providers offer encryption. So, we will have to look out
for the FTP providers that provides encryption.
FTP serves two operations, to send and receive large
files on a network. However, the size limit of the file is
2GB that can be sent. It also doesn't allow you to run
simultaneous transfers to multiple receivers.
26. CONT.,
Passwords and file contents are sent in clear text that
allows unwanted eavesdropping. So, it is quite
possible that attackers can carry out the brute force
attack by trying to guess the FTP password.
It is not compatible with every system.
28. INTRODUCTION
E payments are payments that are made electronically
over the internet .
Earlier almost all the business transactions were done
through cash payments but now IT revolution has led
to the development of new forms of payment.
29. DEFINITION
Electronic payment system is a financial exchange that
takes place online between buyers and sellers.
There are different methods to pay electronically like credit
cards , electronic cash etc.
CUSTOM
ER
VIRTUAL
BUSINESS
30. PAYMENT GATEWAY
Payment Gateways are the entities that act as a
medium for transaction processing between the
entities ( e.g. mastercard visa) and Certification
authorities (CA) . They issue public key certificates to
entities.
32. PROBLEMS IN TRADITIONAL
PAYMENT SYSTEM
Lack of convenience.
Lack of security.
Lack of coverage.
Lack of eligibility.
Lack of support for micro transactions.
34. CREDIT CARDS
Two of credit cards on the market.
Credit cards issued by credit companies(e.g. Master
card, visa) and major banks (SBI, HDFC etc.).
Credit cards issed by the departmental stores(e.g.
Boygner) , oil companies(e.g. Shell).
35. DEBIT CARDS
Plastic card with a unique number.
Requires a bank account.
No interest charges related to this card
36. CHARGE CARDS
Are similar to credit cards except they have no revolving credit line
so they have make payments every month.
It similar to credit card and debit card in appearance bt it has a
small microprocessor chip embedded in it.
SMART CARDS
It similar to credit card and debit card in appearance but it has a
small microprocessor chip embedded in it.
37. ELECTRONIC CASH
In case of e-cash, both customer and merchant have
to sign up with the bank or company issuing e-cash.
Enables transactions between customers without the
need of banks.
38. E-WALLETS
A digital wallet refers to an electronic device that
allows an individual to make electronic transactions.
This can include purchasing items on-line with a
computer or using a smartphone to purchase
something at a store.
It is convenient & safe way to carry less cash.
Example: Mobile Wallet.
39. MICRO-PAYMENT SYSTEM
Small payments on web like billing by bank, financial institute etc.
Universal acceptance.
Comprehensive security.
Allows vendors to sell content.
40. E-CASH
Online payments via debit cards, credit cards or
smart card are the examples of e-money transactions.
E Cash is transferred directly from customer’s
desktop to the merchant’s site.
41. E-CHEQUE
E-Cheque is the result of co-operation between
several banks, government entities, technology
companies and e-commerce organizations.
These can be used for small and large organizations.