StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

File Transfer Protocol - Report Example

Cite this document
Summary
This report "File Transfer Protocol" presents the ability of FTP to access files from remote locations is an absolute necessity in this changing business environment. Every other business meeting, conversations, seminars, and conference require access to data and information…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.4% of users find it useful

Extract of sample "File Transfer Protocol"

File Transfer Protocol – FTP] [Course Name] [Student Name] [Instructor] [Class] File Transfer Protocol (FTP) Introduction File Transfer Protocol (FTP) is regarded as a standard networking protocol which is utilized for transferring files from a particular host to another host. The underlying networking structure is based on TCP-IP internet networking model. FTP is primarily based on client server architecture which requires separate data connection for transferring information. Moreover it should also be equipped with separate control and data connections between client and the server. FTP users can simply validate themselves by using clear text sign-in protocol which is usually in the form of username and password. Similarly the FTP server can also connect anonymously if the server has allowed access to a particular user who has configured the prescribed protocol (Khare, 1998). Why is FTP utilized? FTP is usually preferred in scenarios which require having a secure transmission which is able to hide username and password. Additionally the content which is transferred is also encrypted by the FTP server which is often secure with SSL/TLS. The SSH file Transfer Protocol (SFTP) is utilized but it is a technologically different. The initial FTP client applications were command-line applications which were designed before operating systems had graphical user interfaces. These FTP applications are now shipped with most Windows, Unix and Linux operating systems. There are numerous FTP clients and automation utilities are shipped with desktop systems, mobile devices, servers’ hardware and FTP which have been incorporated into hundreds of productivity applications including web page editors (Khare, 1998). FTP Development through Stages The initial development of FTP was segregated into two networks which were categorized into direct and indirect applications. Direct network applications allow users to access a remote host and use it accordingly for local transactions. The network is designed in a simple manner which further creates the illusion that the network does not even exist or minimize the implication of distance. Indirect networks make use of various resources from a remote host and then utilize it for local system. After the local resources are utilized it then transfers them back to the original resources. The developers of this application have segregated the network theoretically into two categories. This involves direct and indirect applications. Direct network application allows users to access a remote host and utilize it as a local entity. Moreover it also creates an illusion that the network does not exist or it can even minimize the significance of distance. Indirect network use mean acquiring resources from a remote host and then utilizing them on the local system and then transferring them back. These two models were then regarded as formalized TCP/IP networking applications (Robinson, 1994). The TCP/IP module requires Telnet for direct access and File Transfer Protocol (FTP) for having indirect network utilization. The first FTP standard was named as RFC 114, which was officially released on April 1971 before the existence of TCP and IP. This standard is defined for having basic commands of the protocol and the formalized means by which these devices can communicate further. At this specific time the predecessor of TCP which is regarded more as Network Control Protocol or NCP was utilized for smooth transition of network traffic. At that point in time there was no Internet support available, however the ARPAnet was existent which consists of only small number of development computers. Various subsequent RFCs were designed for refining the development of this operation of early version of FTP encompassing revisions published as RFC 172 in June 1971. Following this a new version was designed in November 1971 by the name of RFC 265. Soon there was a major revision was performed in July 1972 which was conducted in RFC 354. This model was designed to incorporate the complete modern TCP model which included various details of the existing protocol. Subsequently various additional RFC’s were designed and published which were defined with similar features for FTP. Ultimately the RFC 542 which was released in August 1973 which the first FTP specification which looks extremely similar to the one which in being utilized in today’s TCP/IP model. It has now been three decades which are being run over by NCP (U.S. Dept. of Commerce, 2001). After the development of subsequent RFCs for defining and discussing alteration the formal standard for modern FTP was released in June 1980 as RFC 765, File Transfer Protocol. This was the first standardized method for defining FTP operation over modem with the formalized name of TCP/IP. Following this there was some primary methods were also defined using standards of TCP/IP. Now in year 1985 in the month of October there were some revisions introduced to RFC 765 along with the addition of several new commands. It is now regarded as the base and underlining specification for FTP. After this several other security standards were also defined and published having similar extension to FTP which made security measures and other features more comprehensible. FTP usage over Internet File Transfer Protocol (FTP) is utilized for transferring data from one system to another over the Internet or through a particular network designed in an organization. More precisely FTP is a common protocol which is designed for exchanging files over any network that is able to support the TCP/IP protocol. The network which is compatible with TCP/IP is the Internet or an Intranet. There are two systems which are involved in FTP transfer which can be easily categorized as a server and the other as the client. The FTP server is required to having an FTP server software which is then only enabled to listen other systems present on the network for having connections. These connection requests are generated from several computers involved in the network. The client computer runs the FTP client software which is required to initiate a connection towards the server. As soon as the connection is received by the sever the connection is established and eventually the client can perform a number of file manipulation operations such as uploading files to the server, then consequently downloading the files from the server. Several other operations can also be executed on this client server association of FTP which includes renaming or deleting files on the server and so on (Gibbs, 1999). One of the biggest advantages of having FTP is that it allow users to send very large files to their peer systems without using any email facility. As we are all aware of this fact that many administrators have imposed several restrictions on the size of file attachments. This practice is now followed by every other mailing system which is done for maintaining a stable email system operation. FTP is regarded as the best alternative in this scenario as it is totally free to send files of any size to any place within a network. For instance we are required to send a set of files and documents to a large group of our business. Now what can be done at this stage is to upload all the files and documents to the FTP server and then send a short email having login instructions for documenting recipients (Khare, 1998). How to upload a file to the FTP Server First it is required to determine the sensitivity of the document. Once the nature of the document along with its sensitivity is determined it is required to apply password for having a secure and protected flow of information. At this stage another significant activity which is performed at this stage is encryption. Encryption is done for creating a strong barrier for the outsiders or hackers which may be trying to access the sensitive information through the dark corners of the internet. However if the documents are of not so sensitive nature this step of encryption can be neglected (Moozakis, 1998). After this it is required to create a password protected and encrypted zip file. The zip file can be created by using Windows Explorer navigational directory. The user will be required to right click the document and select Add to WinZip. After the completion of Zipping process it is required to encrypt the required file. A password prompt screen will appear which will ask about your required password. Make sure that password is masked. The encryption mode which must be selected is 256 bit AES encryption. After completing all these steps the file will be encrypted and zipped. Now this file can easily be transferred or post by making use of the FTP server. The FTP Model The user protocol interpreter is required for initiation of the control connection which is followed by a Telnet protocol. At the time of initiation phase of the user the standard FTP commands are generated by the user and then transmitted to the server process through the control connection. The user can also initiate a direct control connection to the server FTP from a TAC terminal and then generate the standardized FTP commands independently for executing the entire process by simply by passing the user FTP process. For having standard replies from the server to the user a specified control connection is created in response to the commands (Dhaka, 2009). The FTP commands are designed for specifying the parameters for the data connection having data port, transfer mode, type of representation and the associated structure. Moreover the nature of the file system operation is also recognized which involves store, retrieve, append, delete etc. The client on the other side is required to listen to the specified data port and then the server is asked for initiation of the data connection and data transfer according to the specified parameters. It is required to have a data port established in the same host which will initiate the FTP commands through the control connection. The user will be required to have FTP process which will listen on the specified data port. It is required to have a data connection which can handle simultaneous sending and receiving of messages (Stroud, 1999). The Relationship between FTP and Telnet The File Transfer Protocol (FTP) utilizes Telnet Protocol for having control connection. This can be obtained in two manners. The first is to have user-PI or it can be either server-PI which can implement the rules of the Telnet Protocol. We can have procedures directly in place which further allows ease of implementation, sharing of code along with modular programming. Every FTP transaction requires two systems in which the first is regarded as the client or it is known as the local host while the other is termed as the server or the remote host. Both client and server are designed for sending file and data from the server to the client or it can be done via client to the server. Moreover the hosted FTP is regarded as a fast method of backing up data files in a secured manner. FTP also supports hosted FTP which is considered a fast method of backing up data files. FTP has the ability to transport files in two manners either ASCII mode which uses plain text files while the other is binary mode which uses all other files including the ones having graphics, audio, video etc. The exact mode for transmitting file is determined using the file extension. FTP automatically selects the transfer mode when it is in the process of reading the file extension. It also allows selecting the best file transfer method before transferring the required data. If the file name is similar to photo.jpg then the best method for transferring the data will be using the binary mode whereas if the file name starts with report.doc then this file will be transferred using the ASCII mode (Anastasiadis & Chase, 2009 ). Future of FTP (File Transfer Protocol) When we think about the future of any technology we are bound to think about new hardware size combined with increased storage capacity. The future of every technology is thought of having greater security and amazing speed. The science of technology is continuously growing and has advanced substantially in critical areas. Meanwhile there is no apparent limit which is evident on the ongoing development and expansion of technological trends. FTP (File Transfer Protocol) is regarded as the base of Internet technology expansion and is one of the protocols that have contributed towards such a huge expansion of the internet. FTP hosting is the result of rapidly advanced technology which in future is expected to expand and include cloud solutions for businesses. FTP will be expanded to include cloud solutions for businesses which will be facing extreme challenges in a fast paced business community. FTP Moves into the Cloud The metaphor of cloud is used for specifying the central location which can handle a continual flow of file and data transfer for business and personal accounts. In near future it is expected to have technology that will be originated with FTP (File Transfer Protocol) which was initiated in 1971 will be continuously growing and will expand to include cloud technology. However it will still remain as the popular and most flexible large file transferring option. Large file sizes can be handled rapidly and smoothly. If the FTP structure is transformed into FTP cloud it will allow businesses, clients and several other organizations to swiftly transfer business data and credible information securely between two nodes. The sender and receiver will also be able to maintain a backup of transferred files and data automatically (Anastasiadis & Chase, 2009 ). FTP Transfers Files In Both Directions In near future it is expected that FTP will be enhanced with the ability to upload files to the host server along with the ability to download files from the same server. Hence this strategy will be regarded most suitable for the workers who are researching on a particular project are required to have collaboration. In this way each group member will be able to quickly upload download files, make editions in a particular file and then update it accordingly. This complete innovation introduced in FTP will allow worker productivity to be increased in a way that less time will be required for copying, preparing and updating files. Moreover the best part if transportation of file and data in a secure manner. Files can easily be updated within the FTP account which will eventually save hours of employee time which can be utilized for other working projects. Uploading Web Site Files with FTP There is another most favourable use of FTP which is utilized for transferring files to website servers. Once a particular file is completed with the assistance of Webmaster which constitutes a website the Webmaster is required to upload that file through FTP to the web hosting server. These files can also be downloaded from the server, updated and returned back to the server easily. The best part about FTP is that it is user friendly and allows Webmaster to upload all types of files without any complexity (Moozakis, 1998). FTP Promotes File Sharing Although FTP is simple yet is allows files and data sharing between various computers to be executed in a smooth manner. The use of FTP hosting service allows businesses to share files and data with employees and clients in a secure and timely manner. Moreover communication performed with FTP is fast and efficient. FTP is a versatile application protocol which is able to transfer any type of file between systems running varied operating systems. FTP Is Dependable The best part of FTP is that it has allowed a carving to be formulated in a niche which insures a long life of the original protocol. FTP works efficiently and in a fast manner and the best quality of this protocol is that a secure FTP is readily available and then security can never be a concern. To this time there is no competing protocol yet designed which can present a challenge to FTP. If we perceive FTP from a business perspective FTP is the one which has been able to keep clients connected on a single platform. Advantages of FTP It provides the ability to send bigger files and also offers fast transferring of large files and data. FTP provides benefit of transferring in both ASCII and binary modes. The double pane facility of FTP allows having a simultaneous view of the client and the server which is further facilitated with the option of transferring multiple files in a single session. Drag and drop options are also available for many hosts which also provides scheduling transferring of files which are left unattended. All in all it provides a reliable and secure solution. FTP – A Complete Business Solution The need for sending large files is increasing day by day. Every other business in the twenty first century is searching for fast communication and response. Hence for a business to succeed in a rapidly developing global community it is essential to embrace the advancements in technology. FTP is a strong technological solution which is able to handle the rapid communication and is currently the baseline of every business solution. The businesses are happy in adopting this technology for finding professional business solutions for their clients that will eventually help them in competing with confidence and professionalism. Businesses are looking for speed, reliability and accessibility which is all provided by FTP providers (Stroud, The new wave of FTP clients, 1999). FTP – A Personal Resolution Considering personal usage of FTP it is evident that people are now discovering the advantages offered for students, writers and other personal requirements. Auto backup of files is considered as a top priority for most individuals especially the ones who are artists and photographers. Personal systems offer less storage space but a hosted FTP account can easily be expanded as required for accommodating the secure storage space as required. Families can easily share files and personal snaps using FTP service. Conclusion The ability of FTP to access files from remote locations is an absolute necessity in this changing business environment. Every other business meeting, conversations, seminars and conferences require access to data and information where remote access service of FTP has come for rescue. FTP account can easily be connected with iPads, tablets smartphones and laptop devices and all operations whether it is personal or business can easily be carried out. Remote access allows working from home or on the road, and has made it so easy to update files as soon any change is made. This helps everything on the move; still there is more which can be discovered with this marvellous technology. References Anastasiadis, S. V., & Chase, J. S. (2009 ). Aggressive block reordering for large file transfers. ACM Transactions on Storage . Dhaka. (2009). No home-and-away for new FTP. The Financial Express. Gibbs, M. (1999). In case of emergency, FTP. Network World, 50. Khare, R. (1998). The Transfer Protocols. IEEE Internet Computing, 80-82. Moozakis, C. (1998). FTP Centralizes With OnWeb. InternetWeek, 1-14. Robinson, L. (1994). Transferring files with file transfer protocol (FTP). International Journal of Information Management, 390–391. Stroud, F. (1999). The new wave of FTP clients. ProQuest Central, 122-124. Stroud, F. (1999). The new wave of FTP clients. Penton Business Media, Inc. and Penton Media Inc., 122-124. U.S. Dept. of Commerce, O. o. (2001). FILE TRANSFER PROTOCOL (FTP) SERVICES. Federal Information & News Dispatch, Inc. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(File Transfer Protocol Report Example | Topics and Well Written Essays - 3000 words, n.d.)
File Transfer Protocol Report Example | Topics and Well Written Essays - 3000 words. https://studentshare.org/logic-programming/2050835-research-paper
(File Transfer Protocol Report Example | Topics and Well Written Essays - 3000 Words)
File Transfer Protocol Report Example | Topics and Well Written Essays - 3000 Words. https://studentshare.org/logic-programming/2050835-research-paper.
“File Transfer Protocol Report Example | Topics and Well Written Essays - 3000 Words”. https://studentshare.org/logic-programming/2050835-research-paper.
  • Cited: 0 times

CHECK THESE SAMPLES OF File Transfer Protocol

Network Operating Systems

Moreover, transferring files on a network incorporates File Transfer Protocol, Microsoft windows sharing, P2P networks etc.... ‘ftdp' enables the network administrator to configure FTP server in a simple way (, File Transfer Protocol (FTP) ).... , File Transfer Protocol (FTP) .... Different Data transfer Methods Information and communication technology continues to revolutionize technological trends including innovative ways to share files between different computing devices....
2 Pages (500 words) Coursework

TCP/IP - SDLC

Some of these are Internet Protocol (IP), File Transfer Protocol (FTP), and Transmission Control Protocol and Internet Protocol (TCP/IP).... Most of the Internet users are also aware of protocols such as Hypertext transfer protocol (HTTP) and Simple Mail transfer protocol (SMTP) (Naugle, 2009).... TCP/IP-SDLC Name: Professor: Institution: Course: Date: Transmission Control protocol and Internet protocol (TCP/IP) A protocol is a set of rules through which a computer must follow to communicate over a network....
3 Pages (750 words) Research Paper

Technological Evaluation and Recommendation

Technological Evaluation and Recommendation Name: Tutor: Course: Institution: Date: Executive Summary This paper focuses on evaluating and identifying ways through which issues of data leaks can be addressed in order to avoid exposure to financial looses and damages of reputation.... hellip; This paper will address a care where data leaks were caused by peer-to-pear sharing of files, through application that are installed in an employee's computer....
5 Pages (1250 words) Research Paper

Technology Infrastructure

File Transfer Protocol (FTP):Transferring of file to the remote location can be achieved by FTP, an internet stand for this purpose (Behrens, 2005, p.... The MAC addresses for Internet Port and LAN Port are different as the router on requires two different ports for communication between local network (through LAN port) and public network (through WAN port or Internet port)Internet protocol (IP) Address:In a TCP/IP network an IP address is a 32 bit logical identifier for the systems and networking devices....
2 Pages (500 words) Essay

P2P Bit Torrent (Torrents)

The load of the file transfer is distributed among the computer that is exchanging the files.... Bram Cohen an American computer programmer, widely recognized as the author of the (P2P) peer-to-peer BitTorrent protocol, made the first file sharing application to use the protocol also known as BitTorrent. BitTorrent is a protocol that makes it possible to download large… It is a freeware, costing nothing to use and does not have any spyware....
5 Pages (1250 words) Assignment

The Software Requirement Document

This document is intended to be used in health institutions to ease the keeping of records of patients, monitoring the procurement activities, monitoring the financial transactions in the hospitals and managing the public relation activities of the health institutions. This… They include medical doctors, nurses, hospital management officers and the public relations officers....
7 Pages (1750 words) Essay

Security on Computer Systems and Information Systems

Whereas some suite the purpose of one organization they may It is also vital to bridge protocol in the organisation in case of an extreme emergency that would otherwise cost the groups dearly.... Organizations face numerous malicious attacks and threats every other time.... What is essential to such an organization is to have is to have a plan on how to identify the risks and to… The nature of the attack determines the way the strategies being put in place....
5 Pages (1250 words) Coursework

Trusted Computer System Evaluation Criteria for Nessus vs Wireshark

The tool will penetrate within the corporate network and start scanning anonymous File Transfer Protocol (FTP) and for the client/server architecture, secure socket Layer (SSL) will provide an additional layer of security for report results.... The essay "Trusted Computer System Evaluation Criteria for Nessus vs Wireshark" compares famous network protocol analyzers using special evaluation methodology.... hellip; Wireshark is considered to be at top of the list for network protocol analyzers....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us