SlideShare una empresa de Scribd logo
1 de 48
Descargar para leer sin conexión
Lecture 7:
File Transfer and
Remote File Access
BITS 2513
INTERNET TECHNOLOGY


                      1
Using FTP to Transfer Files
   Web servers (using HTTP) and e-mail software
    (using SMTP) must encode data so it appears
    as text when it travels over the Internet.
   FTP (File Transfer Protocol) offers an
    alternative.
   An FTP site is a computer running an FTP
    server application.
   On FTP server a program called daemon allows
    to download and upload files

                                                   2
Using FTP to Transfer Files (cont.)

   FTP can transfer binary files over the Internet
    without the encoding and decoding overhead,
    making it a popular protocol for moving files over
    the Internet.
   FTP also use to upload files from your computer
    to another computer on the internet




                                                     3
Using FTP to Transfer Files
(cont.)
   Large organizations might maintain several FTP sites in
    different parts of the world to speed up download time
    across the globe.
   These are called mirror sites.
   A mirror site is a server that contains the same set of
    files as a heavily used server to off-load some of the
    burden of providing the files to the community using
    them.
   Mirror sites also serve as a backup for the main server in
    case the main server fails.


                                                             4
How FTP Works
   An FTP server identifies users on an FTP site by their
    user IDs.
   FTP client and server software create a session after
    you are logged on.
   The FTP client has access to the file system on the
    server.
   The local computer (the client) issues character-like
    commands, and the remote computer (the server) replies
    with numbers that are interpreted by the local computer.


                                                           5
How FTP Works (cont.)
   FTP client and server software can access their
    individual file system and transfer files in either
    direction
    Local host                                Remote host

       File      FTP
                                      FTP          File
      System     Client
                                     Server       System




                                                           6
How FTP Works (cont.)
   FTP server usually listen at port 21 for client
    activity
   Most Web servers have FTP service running to
    receive changes to Web pages files from web
    developers
   FTP server normally run on the same computer
    that is running a Web server



                                                      7
Requirements for using FTP
   An FTP client installed on the computer.
   Login details of the FTP server to which you want to
    connect:
       The FTP server address. This looks a lot like the address you
        type in Internet Explorer to browse websites. One such example
        is “ftp://ftmk.kutkm.edu.my”.

       The user name and password required for the FTP connection.
        Some FTP servers let you connect to them anonymously. For
        anonymous connections, you do not need a user name and
        password.



                                                                         8
FTP Via a Web Browser
   Have you ever attempted to download software
    from a Web site and clicked a hyperlink that
    says “Click here to download now” or a similar
    message?


   If you carefully note the URL after you click to
    download the software, you will see that the
    protocol changes from http:// to ftp:// in the Web
    browser’s Address box.
                                                         9
How to use FTP
   Logging on to an FTP site with a Web browser




                                                   10
How to use FTP
      When you log on to an FTP site, you can browse through the
       available files by changing directories, seeing listing of all files and
       etc.




Using Windows
Explorer to
access FTP site
                                                                                  11
How to use FTP
   An error occur when you attempt to upload a file to an
    FTP site where you don’t have write permission




                                                             12
FTP from a Command Prompt
   Most operating systems, including Windows 9x,
    Windows NT, Windows 2000, and Windows XP,
    offer FTP client software that runs from a
    command prompt.

   A batch file is a file with a .bat file extension that
    contains a list of DOS-like commands that can
    be executed as a group.
                                                        13
FTP from a Command Prompt
cont.)
   Another protocol similar to FTP is TFTP (Trivial
    FTP).

   TFTP has fewer commands than FTP and can
    be used only to send and receive files.

   It can be used for multicasting in which a file is
    sent to more than one client at the same time
    using the UDP (User Datagram Protocol).
                                                         14
FTP session using
Windows XP FTP
utility




                    15
FTP Commands
Opening and closing connection
 ftp - starts an FTP session
 open hostname - connects to the specified host
 close - closes the connection (but not the FTP session!)
 quit - terminates the FTP session


Browsing on a remote machine
 dir - gives a full directory listing on the remote machine
 dir test* - displays only files and directories whose name begins with
   "test..."
 ls - same as dir, but provides a simplified listing of filenames


Directories in FTP
 pwd - prints the name of the current remote directory
 cd remote-directory - changes working directory on remote host
 cd .. - moves up one level in the directory structure on the remote host
 lcd directory - changes the default directory on local host

                                                                             16
Trivial File Transfer Protocol:
TFTP Usage and Design
   Transfer files between processes.
   Minimal overhead (no security).
   Designed for UDP, although could be used with
    many transport protocols.
   Easy to implement
   Small - possible to include in firmware
   Used to bootstrap workstations and network
    devices.

                                                    17
Diskless Workstation Booting 1
The call for help
                   Help! I don't know who I am!
                   My Ethernet address is:
                   4C:23:17:77:A6:03



                                   RARP

      Diskless
     Workstation




                                                  18
The answer from the all-knowing


   I know all! You are to be know as:
                                         RARP
   128.113.45.211
                                         Server




       Diskless
      Workstation
                            RARP REPLY




                                                  19
The request for instructions

                   I need the file named
                    boot-128.113.45.211




      Diskless
     Workstation
                    TFTP Request (Broadcast)




                                               20
The dialog

              here is part 1
                                                TFTP
                    I got part 1                Server


                       here is part 2

      Diskless
     Workstation

       boot file
                           TFTP File Transfer




                                                         21
TFTP Protocol
      5 message types:
         Read  request
         Write request
         Data
         ACK (acknowledgment)
         Error




                                 22
Messages
   Each is an independent UDP Datagram

   Each has a 2 byte opcode (1st 2 bytes)

   The structure of the rest of the datagram
    depends on the opcode.



                                                23
Message Formats
 OPCODE      FILENAME   0      MODE     0




 OPCODE    BLOCK#           DATA



 OPCODE    BLOCK#




 OPCODE    BLOCK#       ERROR MESSAGE   0



 2 bytes   2 bytes
                                            24
Read Request
      01                filename            0            mode                  0



             null terminated ascii string       null terminated ascii string
             containing name of file            containing transfer mode



2 byte opcode
network byte order



                                     variable length fields!
                                                                               25
Write Request
      02                filename            0            mode                  0



             null terminated ascii string       null terminated ascii string
             containing name of file            containing transfer mode



2 byte opcode
network byte order



                                     variable length fields!
                                                                               26
TFTP Data Packet
         03          block #                  data 0 to 512 bytes




                2 byte block number
                network byte order

2 byte opcode                         all data packets have 512 bytes
network byte order                    except the last one.




                                                                        27
TFTP Acknowledgment

                     04      block #




                          2 byte block number
2 byte opcode
                          network byte order
network byte order




                                                28
TFTP Error Packet
         05          errcode                   errstring                  0



                                     null terminated ascii error string
2 byte opcode
network byte order


                2 byte error code
                network byte order




                                                                              29
TFTP transfer modes
   “netascii” : for transferring text files.
     alllines end with rn (CR,LF).
     provides standard format for transferring text files.
     both ends responsible for converting to/from
      netascii format.
   “octet” : for transferring binary files.
     no    translation done.




                                                              30
NetAscii Transfer Mode
         Unix - end of line marker is just 'n'

   receiving a file
       you need to remove 'r' before storing data.
   sending a file
     you  need to replace every 'n' with "rn" before
        sending




                                                           31
TELNET



         32
Initiating and Using Telnet
Sessions
   Telnet enable user to;

     create   a remote command console session on a host.

     run command line programs, shell commands, and
      scripts in a remote command console session just as
      though you were locally logged on to the host and
      using a local command prompt window.



                                                         33
Telnet
   Telnet is a protocol used to pass commands
    and replies between the client the UNIX
    computer.

   All UNIX systems support some form of Telnet.

   Windows versions also include Telnet Client and
    Telnet Server components.


                                                    34
How Telnet Works
   To use Telnet you need to know IP address of
    the host where the resource you want to use
   When you contact the host, the distant computer
    and your computer negotiate how to
    communicate with each other
   When client and server communicate they use
    Telnet protocol



                                                  35
How Telnet Works
   You can start the service manually every time
    you want to connect to a host,
   Or you can configure the service so that it starts
    every time your computer starts.
   Telnet clients cannot connect to a host unless a
    Telnet server program (or service) is running
    and listening for connection requests.



                                                     36
How Telnet Works
   When run a Telnet client, it makes a connection request
    to the host (Telnet server).
   If a Telnet server responds to the request, the Telnet
    client and server negotiate the details of the connection,
    such as flow control settings, window size, and terminal
    type.
   After the connection details are successfully negotiated,
    and logon credentials are validated, the Telnet server
    program creates a Telnet command console session.



                                                             37
Telnet in Windows XP
   Use Run dialog box,
     type   telnet mydomain.com


   Use web browser
     Enter   telnet://mydomain.com in the address box




                                                         38
Telnet in DOS prompt




                       39
Telnet in HyperTerminal




                          40
Examples of TELNET client/server

   Tlntsvr.exe (Telnet Server) - preinstalled in
    Windows OS
   Telnet.exe (Telnet Server) – preinstalled in
    Windows OS




                                                    41
Telnet Commands
   open - to open hostname port number to
    establish a Telnet connection to a host.
   close - to close an existing Telnet connection
   quit - to exit from Telnet
   status - to determine whether the Telnet client is
    connected.




                                                    42
Telnet Limitations
   Telnet is a character-based communication
    protocol and not designed to transmit cursor
    movements or GUI information.
   Can only run command line programs, shell
    commands, scripts, and batch files
   Some editing programs, such as vi and Edit, can
    be run over a Telnet connection
   However, these interactive programs are not
    true GUI programs because cursor movement is
    controlled by the keyboard, not the mouse.
                                                  43
Telnet Limitations (cont.)
   By default, Telnet does not encrypt any data
    sent over the connection (including passwords),
    and so it is trivial to eavesdrop on the
    communications and use the password later for
    malicious purposes.
   Lacks an authentication scheme that makes it
    possible to ensure that communication is carried
    out between the two desired hosts


                                                   44
Using Secure Shell (SSH) Protocol

   SSH enables two computer to negotiate and
    establish secure connection that use encryption
   May stop cracker who try to sniff password and
    data
   Provide secure communication for doing email,
    accessing Web, login to remote site and
    publishing file in FTP (SFTP)



                                                  45
Using SSH Protocol (cont.)
   It uses public-key cryptography to authenticate the
    remote computer and to allow the remote computer to
    authenticate the user
   SSH provides confidentiality and integrity of data
    exchanged between the two computers using
       encryption
       message authentication codes (MACs).
   PuTTY is a free SSH client and multiplatform - establish
    a secure channel between a local and a remote
    computer


                                                           46
Summary
   FTP sites can be accessed by client software,
    such as Web browsers, operating system
    command utilities, or GUI software dedicated to
    FTP, such as WS_FTP Pro.
   FTP also can be accessed from a command
    prompt.




                                                      47
Summary (cont.)
   Telnet program runs on the computer and
    connects PC to a server on the network.
   Enter commands through the Telnet program
    and they will be executed as if you were entering
    them directly on the server console.
   Enables you to control the server and
    communicate with other servers on the network



                                                   48

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Rh436 pdf
Rh436 pdfRh436 pdf
Rh436 pdf
 
Windows Server 2019.pptx
Windows Server 2019.pptxWindows Server 2019.pptx
Windows Server 2019.pptx
 
What is Network Address Translation (NAT)
What is Network Address Translation (NAT)What is Network Address Translation (NAT)
What is Network Address Translation (NAT)
 
Implementation of Pipe in Linux
Implementation of Pipe in LinuxImplementation of Pipe in Linux
Implementation of Pipe in Linux
 
Semaphore
Semaphore Semaphore
Semaphore
 
Introduction to Shell script
Introduction to Shell scriptIntroduction to Shell script
Introduction to Shell script
 
RARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsRARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE Protocols
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating system
 
CPU Scheduling Algorithms
CPU Scheduling AlgorithmsCPU Scheduling Algorithms
CPU Scheduling Algorithms
 
Static route and rip and ospf
Static route and rip and ospfStatic route and rip and ospf
Static route and rip and ospf
 
Shadow paging
Shadow pagingShadow paging
Shadow paging
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
Case study
Case studyCase study
Case study
 
1.prallelism
1.prallelism1.prallelism
1.prallelism
 
Memory management
Memory managementMemory management
Memory management
 
Processes in unix
Processes in unixProcesses in unix
Processes in unix
 
Systems analysis methodologies(white)
Systems analysis methodologies(white)Systems analysis methodologies(white)
Systems analysis methodologies(white)
 
Mk ppt chapter 5
Mk ppt chapter 5Mk ppt chapter 5
Mk ppt chapter 5
 
Introduction to HDFS
Introduction to HDFSIntroduction to HDFS
Introduction to HDFS
 
Unix.system.calls
Unix.system.callsUnix.system.calls
Unix.system.calls
 

Destacado

Manejo de filezilla
Manejo de filezillaManejo de filezilla
Manejo de filezillaerwin0930
 
Het ABC van social networking
Het ABC van social networkingHet ABC van social networking
Het ABC van social networkingJan Krans
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptographyRutvik Mehta
 
FTP Client and Server | Computer Science
FTP Client and Server | Computer ScienceFTP Client and Server | Computer Science
FTP Client and Server | Computer ScienceTransweb Global Inc
 
Team 5 presentation
Team 5 presentationTeam 5 presentation
Team 5 presentationrob420
 
An introduction to SSH
An introduction to SSHAn introduction to SSH
An introduction to SSHnussbauml
 
Protocolos; SNMP, TELNET, SSH
Protocolos; SNMP, TELNET, SSHProtocolos; SNMP, TELNET, SSH
Protocolos; SNMP, TELNET, SSHPetterson Castro
 
Oracle database - Get external data via HTTP, FTP and Web Services
Oracle database - Get external data via HTTP, FTP and Web ServicesOracle database - Get external data via HTTP, FTP and Web Services
Oracle database - Get external data via HTTP, FTP and Web ServicesKim Berg Hansen
 
Important tips on Router and SMTP mail routing
Important tips on Router and SMTP mail routingImportant tips on Router and SMTP mail routing
Important tips on Router and SMTP mail routingjayeshpar2006
 

Destacado (20)

An overview of ftp
An overview of ftpAn overview of ftp
An overview of ftp
 
Telnet & SSH
Telnet & SSHTelnet & SSH
Telnet & SSH
 
TELNET Protocol
TELNET ProtocolTELNET Protocol
TELNET Protocol
 
Dns ppt
Dns pptDns ppt
Dns ppt
 
Manejo de filezilla
Manejo de filezillaManejo de filezilla
Manejo de filezilla
 
Ftp server
Ftp serverFtp server
Ftp server
 
Het ABC van social networking
Het ABC van social networkingHet ABC van social networking
Het ABC van social networking
 
Psdn and ccitt x series
Psdn and ccitt x seriesPsdn and ccitt x series
Psdn and ccitt x series
 
Telnet
TelnetTelnet
Telnet
 
Telnet
TelnetTelnet
Telnet
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
FTP Client and Server | Computer Science
FTP Client and Server | Computer ScienceFTP Client and Server | Computer Science
FTP Client and Server | Computer Science
 
Ch22
Ch22Ch22
Ch22
 
Team 5 presentation
Team 5 presentationTeam 5 presentation
Team 5 presentation
 
An introduction to SSH
An introduction to SSHAn introduction to SSH
An introduction to SSH
 
Protocolos; SNMP, TELNET, SSH
Protocolos; SNMP, TELNET, SSHProtocolos; SNMP, TELNET, SSH
Protocolos; SNMP, TELNET, SSH
 
Ch11
Ch11Ch11
Ch11
 
Oracle database - Get external data via HTTP, FTP and Web Services
Oracle database - Get external data via HTTP, FTP and Web ServicesOracle database - Get external data via HTTP, FTP and Web Services
Oracle database - Get external data via HTTP, FTP and Web Services
 
TCP/IP and DNS
TCP/IP and DNSTCP/IP and DNS
TCP/IP and DNS
 
Important tips on Router and SMTP mail routing
Important tips on Router and SMTP mail routingImportant tips on Router and SMTP mail routing
Important tips on Router and SMTP mail routing
 

Similar a Lecture 7 -_ftp,_tftp,_telnet_and_ssh

file transfer and access utilities
file transfer and access utilitiesfile transfer and access utilities
file transfer and access utilitiestumetr1
 
Using an FTP client - Client server computing
Using an FTP client -  Client server computingUsing an FTP client -  Client server computing
Using an FTP client - Client server computinglordmwesh
 
File tranfer protocol
File tranfer protocolFile tranfer protocol
File tranfer protocolKunalThorat9
 
香港六合彩
香港六合彩香港六合彩
香港六合彩csukxnr
 
六合彩 » SlideShare
六合彩 » SlideShare六合彩 » SlideShare
六合彩 » SlideSharemvtqyygx
 
六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShareyqtvdsbl
 
六合彩-香港六合彩 » SlideShare
六合彩-香港六合彩 » SlideShare六合彩-香港六合彩 » SlideShare
六合彩-香港六合彩 » SlideSharemmfirkhw
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideSharecxrcpdu
 
六合彩-香港六合彩
六合彩-香港六合彩六合彩-香港六合彩
六合彩-香港六合彩skpkcd
 
香港六合彩-六合彩
香港六合彩-六合彩香港六合彩-六合彩
香港六合彩-六合彩qiohms
 
六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideSharedqxjlhfc
 
Ftp: a slideshow on File transfer protocol
Ftp: a slideshow on File transfer protocol Ftp: a slideshow on File transfer protocol
Ftp: a slideshow on File transfer protocol Lina Guha Roy
 
Application layer
Application layerApplication layer
Application layerNeha Kurale
 
Application layer
Application layerApplication layer
Application layerNeha Kurale
 
application layer protocol for iot.pptx
application layer protocol for iot.pptxapplication layer protocol for iot.pptx
application layer protocol for iot.pptxaravind Guru
 

Similar a Lecture 7 -_ftp,_tftp,_telnet_and_ssh (20)

file transfer and access utilities
file transfer and access utilitiesfile transfer and access utilities
file transfer and access utilities
 
Ft pv2(1)
Ft pv2(1)Ft pv2(1)
Ft pv2(1)
 
Ftp.75 to 76
Ftp.75 to 76Ftp.75 to 76
Ftp.75 to 76
 
Using an FTP client - Client server computing
Using an FTP client -  Client server computingUsing an FTP client -  Client server computing
Using an FTP client - Client server computing
 
File tranfer protocol
File tranfer protocolFile tranfer protocol
File tranfer protocol
 
香港六合彩
香港六合彩香港六合彩
香港六合彩
 
六合彩 » SlideShare
六合彩 » SlideShare六合彩 » SlideShare
六合彩 » SlideShare
 
六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare
 
六合彩-香港六合彩 » SlideShare
六合彩-香港六合彩 » SlideShare六合彩-香港六合彩 » SlideShare
六合彩-香港六合彩 » SlideShare
 
香港六合彩 » SlideShare
香港六合彩 » SlideShare香港六合彩 » SlideShare
香港六合彩 » SlideShare
 
六合彩-香港六合彩
六合彩-香港六合彩六合彩-香港六合彩
六合彩-香港六合彩
 
香港六合彩-六合彩
香港六合彩-六合彩香港六合彩-六合彩
香港六合彩-六合彩
 
六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare六合彩,香港六合彩 » SlideShare
六合彩,香港六合彩 » SlideShare
 
FTP(In_Linux).pptx
FTP(In_Linux).pptxFTP(In_Linux).pptx
FTP(In_Linux).pptx
 
Ftp: a slideshow on File transfer protocol
Ftp: a slideshow on File transfer protocol Ftp: a slideshow on File transfer protocol
Ftp: a slideshow on File transfer protocol
 
Application layer
Application layerApplication layer
Application layer
 
Application layer
Application layerApplication layer
Application layer
 
application layer protocol for iot.pptx
application layer protocol for iot.pptxapplication layer protocol for iot.pptx
application layer protocol for iot.pptx
 
Application Layer
Application Layer Application Layer
Application Layer
 
Cita310chap09
Cita310chap09Cita310chap09
Cita310chap09
 

Más de Serious_SamSoul

Lecture 13 -_e-commmerce_e-banking_and_advanced_tech
Lecture 13 -_e-commmerce_e-banking_and_advanced_techLecture 13 -_e-commmerce_e-banking_and_advanced_tech
Lecture 13 -_e-commmerce_e-banking_and_advanced_techSerious_SamSoul
 
Lecture 12 -_internet_security
Lecture 12 -_internet_securityLecture 12 -_internet_security
Lecture 12 -_internet_securitySerious_SamSoul
 
Lecture 11 client_server_interaction
Lecture 11 client_server_interactionLecture 11 client_server_interaction
Lecture 11 client_server_interactionSerious_SamSoul
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferSerious_SamSoul
 
Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layerSerious_SamSoul
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsSerious_SamSoul
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Serious_SamSoul
 
Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Serious_SamSoul
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesSerious_SamSoul
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Serious_SamSoul
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Serious_SamSoul
 

Más de Serious_SamSoul (11)

Lecture 13 -_e-commmerce_e-banking_and_advanced_tech
Lecture 13 -_e-commmerce_e-banking_and_advanced_techLecture 13 -_e-commmerce_e-banking_and_advanced_tech
Lecture 13 -_e-commmerce_e-banking_and_advanced_tech
 
Lecture 12 -_internet_security
Lecture 12 -_internet_securityLecture 12 -_internet_security
Lecture 12 -_internet_security
 
Lecture 11 client_server_interaction
Lecture 11 client_server_interactionLecture 11 client_server_interaction
Lecture 11 client_server_interaction
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transfer
 
Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layer
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
 
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 4 -_internet_infrastructure_2_updated_2011
 
Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011Lecture 3 -_internet_infrastructure_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
 
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-
 

Último

FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 

Último (20)

FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 

Lecture 7 -_ftp,_tftp,_telnet_and_ssh

  • 1. Lecture 7: File Transfer and Remote File Access BITS 2513 INTERNET TECHNOLOGY 1
  • 2. Using FTP to Transfer Files  Web servers (using HTTP) and e-mail software (using SMTP) must encode data so it appears as text when it travels over the Internet.  FTP (File Transfer Protocol) offers an alternative.  An FTP site is a computer running an FTP server application.  On FTP server a program called daemon allows to download and upload files 2
  • 3. Using FTP to Transfer Files (cont.)  FTP can transfer binary files over the Internet without the encoding and decoding overhead, making it a popular protocol for moving files over the Internet.  FTP also use to upload files from your computer to another computer on the internet 3
  • 4. Using FTP to Transfer Files (cont.)  Large organizations might maintain several FTP sites in different parts of the world to speed up download time across the globe.  These are called mirror sites.  A mirror site is a server that contains the same set of files as a heavily used server to off-load some of the burden of providing the files to the community using them.  Mirror sites also serve as a backup for the main server in case the main server fails. 4
  • 5. How FTP Works  An FTP server identifies users on an FTP site by their user IDs.  FTP client and server software create a session after you are logged on.  The FTP client has access to the file system on the server.  The local computer (the client) issues character-like commands, and the remote computer (the server) replies with numbers that are interpreted by the local computer. 5
  • 6. How FTP Works (cont.)  FTP client and server software can access their individual file system and transfer files in either direction Local host Remote host File FTP FTP File System Client Server System 6
  • 7. How FTP Works (cont.)  FTP server usually listen at port 21 for client activity  Most Web servers have FTP service running to receive changes to Web pages files from web developers  FTP server normally run on the same computer that is running a Web server 7
  • 8. Requirements for using FTP  An FTP client installed on the computer.  Login details of the FTP server to which you want to connect:  The FTP server address. This looks a lot like the address you type in Internet Explorer to browse websites. One such example is “ftp://ftmk.kutkm.edu.my”.  The user name and password required for the FTP connection. Some FTP servers let you connect to them anonymously. For anonymous connections, you do not need a user name and password. 8
  • 9. FTP Via a Web Browser  Have you ever attempted to download software from a Web site and clicked a hyperlink that says “Click here to download now” or a similar message?  If you carefully note the URL after you click to download the software, you will see that the protocol changes from http:// to ftp:// in the Web browser’s Address box. 9
  • 10. How to use FTP  Logging on to an FTP site with a Web browser 10
  • 11. How to use FTP  When you log on to an FTP site, you can browse through the available files by changing directories, seeing listing of all files and etc. Using Windows Explorer to access FTP site 11
  • 12. How to use FTP  An error occur when you attempt to upload a file to an FTP site where you don’t have write permission 12
  • 13. FTP from a Command Prompt  Most operating systems, including Windows 9x, Windows NT, Windows 2000, and Windows XP, offer FTP client software that runs from a command prompt.  A batch file is a file with a .bat file extension that contains a list of DOS-like commands that can be executed as a group. 13
  • 14. FTP from a Command Prompt cont.)  Another protocol similar to FTP is TFTP (Trivial FTP).  TFTP has fewer commands than FTP and can be used only to send and receive files.  It can be used for multicasting in which a file is sent to more than one client at the same time using the UDP (User Datagram Protocol). 14
  • 15. FTP session using Windows XP FTP utility 15
  • 16. FTP Commands Opening and closing connection  ftp - starts an FTP session  open hostname - connects to the specified host  close - closes the connection (but not the FTP session!)  quit - terminates the FTP session Browsing on a remote machine  dir - gives a full directory listing on the remote machine  dir test* - displays only files and directories whose name begins with "test..."  ls - same as dir, but provides a simplified listing of filenames Directories in FTP  pwd - prints the name of the current remote directory  cd remote-directory - changes working directory on remote host  cd .. - moves up one level in the directory structure on the remote host  lcd directory - changes the default directory on local host 16
  • 17. Trivial File Transfer Protocol: TFTP Usage and Design  Transfer files between processes.  Minimal overhead (no security).  Designed for UDP, although could be used with many transport protocols.  Easy to implement  Small - possible to include in firmware  Used to bootstrap workstations and network devices. 17
  • 18. Diskless Workstation Booting 1 The call for help Help! I don't know who I am! My Ethernet address is: 4C:23:17:77:A6:03 RARP Diskless Workstation 18
  • 19. The answer from the all-knowing I know all! You are to be know as: RARP 128.113.45.211 Server Diskless Workstation RARP REPLY 19
  • 20. The request for instructions I need the file named boot-128.113.45.211 Diskless Workstation TFTP Request (Broadcast) 20
  • 21. The dialog here is part 1 TFTP I got part 1 Server here is part 2 Diskless Workstation boot file TFTP File Transfer 21
  • 22. TFTP Protocol 5 message types:  Read request  Write request  Data  ACK (acknowledgment)  Error 22
  • 23. Messages  Each is an independent UDP Datagram  Each has a 2 byte opcode (1st 2 bytes)  The structure of the rest of the datagram depends on the opcode. 23
  • 24. Message Formats OPCODE FILENAME 0 MODE 0 OPCODE BLOCK# DATA OPCODE BLOCK# OPCODE BLOCK# ERROR MESSAGE 0 2 bytes 2 bytes 24
  • 25. Read Request 01 filename 0 mode 0 null terminated ascii string null terminated ascii string containing name of file containing transfer mode 2 byte opcode network byte order variable length fields! 25
  • 26. Write Request 02 filename 0 mode 0 null terminated ascii string null terminated ascii string containing name of file containing transfer mode 2 byte opcode network byte order variable length fields! 26
  • 27. TFTP Data Packet 03 block # data 0 to 512 bytes 2 byte block number network byte order 2 byte opcode all data packets have 512 bytes network byte order except the last one. 27
  • 28. TFTP Acknowledgment 04 block # 2 byte block number 2 byte opcode network byte order network byte order 28
  • 29. TFTP Error Packet 05 errcode errstring 0 null terminated ascii error string 2 byte opcode network byte order 2 byte error code network byte order 29
  • 30. TFTP transfer modes  “netascii” : for transferring text files.  alllines end with rn (CR,LF).  provides standard format for transferring text files.  both ends responsible for converting to/from netascii format.  “octet” : for transferring binary files.  no translation done. 30
  • 31. NetAscii Transfer Mode Unix - end of line marker is just 'n'  receiving a file  you need to remove 'r' before storing data.  sending a file  you need to replace every 'n' with "rn" before sending 31
  • 32. TELNET 32
  • 33. Initiating and Using Telnet Sessions  Telnet enable user to;  create a remote command console session on a host.  run command line programs, shell commands, and scripts in a remote command console session just as though you were locally logged on to the host and using a local command prompt window. 33
  • 34. Telnet  Telnet is a protocol used to pass commands and replies between the client the UNIX computer.  All UNIX systems support some form of Telnet.  Windows versions also include Telnet Client and Telnet Server components. 34
  • 35. How Telnet Works  To use Telnet you need to know IP address of the host where the resource you want to use  When you contact the host, the distant computer and your computer negotiate how to communicate with each other  When client and server communicate they use Telnet protocol 35
  • 36. How Telnet Works  You can start the service manually every time you want to connect to a host,  Or you can configure the service so that it starts every time your computer starts.  Telnet clients cannot connect to a host unless a Telnet server program (or service) is running and listening for connection requests. 36
  • 37. How Telnet Works  When run a Telnet client, it makes a connection request to the host (Telnet server).  If a Telnet server responds to the request, the Telnet client and server negotiate the details of the connection, such as flow control settings, window size, and terminal type.  After the connection details are successfully negotiated, and logon credentials are validated, the Telnet server program creates a Telnet command console session. 37
  • 38. Telnet in Windows XP  Use Run dialog box,  type telnet mydomain.com  Use web browser  Enter telnet://mydomain.com in the address box 38
  • 39. Telnet in DOS prompt 39
  • 41. Examples of TELNET client/server  Tlntsvr.exe (Telnet Server) - preinstalled in Windows OS  Telnet.exe (Telnet Server) – preinstalled in Windows OS 41
  • 42. Telnet Commands  open - to open hostname port number to establish a Telnet connection to a host.  close - to close an existing Telnet connection  quit - to exit from Telnet  status - to determine whether the Telnet client is connected. 42
  • 43. Telnet Limitations  Telnet is a character-based communication protocol and not designed to transmit cursor movements or GUI information.  Can only run command line programs, shell commands, scripts, and batch files  Some editing programs, such as vi and Edit, can be run over a Telnet connection  However, these interactive programs are not true GUI programs because cursor movement is controlled by the keyboard, not the mouse. 43
  • 44. Telnet Limitations (cont.)  By default, Telnet does not encrypt any data sent over the connection (including passwords), and so it is trivial to eavesdrop on the communications and use the password later for malicious purposes.  Lacks an authentication scheme that makes it possible to ensure that communication is carried out between the two desired hosts 44
  • 45. Using Secure Shell (SSH) Protocol  SSH enables two computer to negotiate and establish secure connection that use encryption  May stop cracker who try to sniff password and data  Provide secure communication for doing email, accessing Web, login to remote site and publishing file in FTP (SFTP) 45
  • 46. Using SSH Protocol (cont.)  It uses public-key cryptography to authenticate the remote computer and to allow the remote computer to authenticate the user  SSH provides confidentiality and integrity of data exchanged between the two computers using  encryption  message authentication codes (MACs).  PuTTY is a free SSH client and multiplatform - establish a secure channel between a local and a remote computer 46
  • 47. Summary  FTP sites can be accessed by client software, such as Web browsers, operating system command utilities, or GUI software dedicated to FTP, such as WS_FTP Pro.  FTP also can be accessed from a command prompt. 47
  • 48. Summary (cont.)  Telnet program runs on the computer and connects PC to a server on the network.  Enter commands through the Telnet program and they will be executed as if you were entering them directly on the server console.  Enables you to control the server and communicate with other servers on the network 48