26.10.2012 Views

Internet Security - Dang Thanh Binh's Page

Internet Security - Dang Thanh Binh's Page

Internet Security - Dang Thanh Binh's Page

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

50 INTERNET SECURITY<br />

2.4 File Transfer<br />

The file transfer application allows users to send or receive a copy of a data file. Access<br />

to data on remote files takes two forms: whole-file copying and shared online access.<br />

FTP is the major file transfer protocol in the TCP/IP suite. TFTP provides a small, simple<br />

alternative to FTP for applications that need only file transfer. NFS provides online shared<br />

file access.<br />

2.4.1 File Transfer Protocol (FTP)<br />

File Transfer Protocol (FTP) is the standard mechanism provided by TCP/IP for copying<br />

a file from one host to another. The FTP protocol is defined in RFC959. It is further<br />

defined in RFC 2227, 2640, 2773 for updated documentation.<br />

In transferring files from one system to another, two systems may have different ways<br />

to represent text and data. Two systems may have different directory structures. All of<br />

these problems have been solved by FTP in a very simple and elegant way.<br />

FTP differs from other client–server applications in that it establishes two connections<br />

between the hosts. One connection is used for data transfer (port 20), the other for control<br />

information (port 21). The control connection port remains open during the entire FTP<br />

session and is used to send control messages and client commands between the client and<br />

server. A data connection is established using an ephemeral port. The data connection<br />

is created each time a file is transferred between the client and server. Separation of<br />

commands and data transfer makes FTP more efficient. FTP allows the client to specify<br />

whether a file contains text (ASCII or EBCDIC character sets) or binary integers. FTP<br />

requires clients to authorise themselves by sending a log name and password to the server<br />

before requesting file transfers.<br />

Since FTP is used only to send and receive files, it is very difficult for hackers to<br />

exploit.<br />

TEAMFLY<br />

2.4.2 Trivial File Transfer Protocol (TFTP)<br />

Trivial File Transfer Protocol (TFTP) is designed to simply copy a file without the need<br />

for all of the functionalities of the FTP protocol. TFTP is a protocol that quickly copies<br />

files because it does not require all the sophistication provided in FTP. TFTP can read or<br />

write a file for the client. Since TFTP restricts operations to simple file transfer and does<br />

not provide authentication, TFTP software is much smaller than FTP.<br />

2.4.3 Network File System (NFS)<br />

The Network File System (NFS), developed by Sun Microsystems, provides online shared<br />

file access that is transparent and integrated. The file access mechanism accepts the request<br />

and automatically passes it to either the local file system software or to the NFS client,<br />

depending on whether the file is on the local disk or on a remote machine. When it<br />

receives a request, the client software uses the NFS protocol to contact the appropriate<br />

server on a remote machine and performs the requested operation. When the remote server<br />

replies, the client software returns the results to the application program.<br />

Team-Fly ®

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!