SlideShare a Scribd company logo
Lecture 7:
File Transfer and
Remote File Access
BITS 2513
INTERNET TECHNOLOGY


                      1
Using FTP to Transfer Files
   Web servers (using HTTP) and e-mail software
    (using SMTP) must encode data so it appears
    as text when it travels over the Internet.
   FTP (File Transfer Protocol) offers an
    alternative.
   An FTP site is a computer running an FTP
    server application.
   On FTP server a program called daemon allows
    to download and upload files

                                                   2
Using FTP to Transfer Files (cont.)

   FTP can transfer binary files over the Internet
    without the encoding and decoding overhead,
    making it a popular protocol for moving files over
    the Internet.
   FTP also use to upload files from your computer
    to another computer on the internet




                                                     3
Using FTP to Transfer Files
(cont.)
   Large organizations might maintain several FTP sites in
    different parts of the world to speed up download time
    across the globe.
   These are called mirror sites.
   A mirror site is a server that contains the same set of
    files as a heavily used server to off-load some of the
    burden of providing the files to the community using
    them.
   Mirror sites also serve as a backup for the main server in
    case the main server fails.


                                                             4
How FTP Works
   An FTP server identifies users on an FTP site by their
    user IDs.
   FTP client and server software create a session after
    you are logged on.
   The FTP client has access to the file system on the
    server.
   The local computer (the client) issues character-like
    commands, and the remote computer (the server) replies
    with numbers that are interpreted by the local computer.


                                                           5
How FTP Works (cont.)
   FTP client and server software can access their
    individual file system and transfer files in either
    direction
    Local host                                Remote host

       File      FTP
                                      FTP          File
      System     Client
                                     Server       System




                                                           6
How FTP Works (cont.)
   FTP server usually listen at port 21 for client
    activity
   Most Web servers have FTP service running to
    receive changes to Web pages files from web
    developers
   FTP server normally run on the same computer
    that is running a Web server



                                                      7
Requirements for using FTP
   An FTP client installed on the computer.
   Login details of the FTP server to which you want to
    connect:
       The FTP server address. This looks a lot like the address you
        type in Internet Explorer to browse websites. One such example
        is “ftp://ftmk.kutkm.edu.my”.

       The user name and password required for the FTP connection.
        Some FTP servers let you connect to them anonymously. For
        anonymous connections, you do not need a user name and
        password.



                                                                         8
FTP Via a Web Browser
   Have you ever attempted to download software
    from a Web site and clicked a hyperlink that
    says “Click here to download now” or a similar
    message?


   If you carefully note the URL after you click to
    download the software, you will see that the
    protocol changes from http:// to ftp:// in the Web
    browser’s Address box.
                                                         9
How to use FTP
   Logging on to an FTP site with a Web browser




                                                   10
How to use FTP
      When you log on to an FTP site, you can browse through the
       available files by changing directories, seeing listing of all files and
       etc.




Using Windows
Explorer to
access FTP site
                                                                                  11
How to use FTP
   An error occur when you attempt to upload a file to an
    FTP site where you don’t have write permission




                                                             12
FTP from a Command Prompt
   Most operating systems, including Windows 9x,
    Windows NT, Windows 2000, and Windows XP,
    offer FTP client software that runs from a
    command prompt.

   A batch file is a file with a .bat file extension that
    contains a list of DOS-like commands that can
    be executed as a group.
                                                        13
FTP from a Command Prompt
cont.)
   Another protocol similar to FTP is TFTP (Trivial
    FTP).

   TFTP has fewer commands than FTP and can
    be used only to send and receive files.

   It can be used for multicasting in which a file is
    sent to more than one client at the same time
    using the UDP (User Datagram Protocol).
                                                         14
FTP session using
Windows XP FTP
utility




                    15
FTP Commands
Opening and closing connection
 ftp - starts an FTP session
 open hostname - connects to the specified host
 close - closes the connection (but not the FTP session!)
 quit - terminates the FTP session


Browsing on a remote machine
 dir - gives a full directory listing on the remote machine
 dir test* - displays only files and directories whose name begins with
   "test..."
 ls - same as dir, but provides a simplified listing of filenames


Directories in FTP
 pwd - prints the name of the current remote directory
 cd remote-directory - changes working directory on remote host
 cd .. - moves up one level in the directory structure on the remote host
 lcd directory - changes the default directory on local host

                                                                             16
Trivial File Transfer Protocol:
TFTP Usage and Design
   Transfer files between processes.
   Minimal overhead (no security).
   Designed for UDP, although could be used with
    many transport protocols.
   Easy to implement
   Small - possible to include in firmware
   Used to bootstrap workstations and network
    devices.

                                                    17
Diskless Workstation Booting 1
The call for help
                   Help! I don't know who I am!
                   My Ethernet address is:
                   4C:23:17:77:A6:03



                                   RARP

      Diskless
     Workstation




                                                  18
The answer from the all-knowing


   I know all! You are to be know as:
                                         RARP
   128.113.45.211
                                         Server




       Diskless
      Workstation
                            RARP REPLY




                                                  19
The request for instructions

                   I need the file named
                    boot-128.113.45.211




      Diskless
     Workstation
                    TFTP Request (Broadcast)




                                               20
The dialog

              here is part 1
                                                TFTP
                    I got part 1                Server


                       here is part 2

      Diskless
     Workstation

       boot file
                           TFTP File Transfer




                                                         21
TFTP Protocol
      5 message types:
         Read  request
         Write request
         Data
         ACK (acknowledgment)
         Error




                                 22
Messages
   Each is an independent UDP Datagram

   Each has a 2 byte opcode (1st 2 bytes)

   The structure of the rest of the datagram
    depends on the opcode.



                                                23
Message Formats
 OPCODE      FILENAME   0      MODE     0




 OPCODE    BLOCK#           DATA



 OPCODE    BLOCK#




 OPCODE    BLOCK#       ERROR MESSAGE   0



 2 bytes   2 bytes
                                            24
Read Request
      01                filename            0            mode                  0



             null terminated ascii string       null terminated ascii string
             containing name of file            containing transfer mode



2 byte opcode
network byte order



                                     variable length fields!
                                                                               25
Write Request
      02                filename            0            mode                  0



             null terminated ascii string       null terminated ascii string
             containing name of file            containing transfer mode



2 byte opcode
network byte order



                                     variable length fields!
                                                                               26
TFTP Data Packet
         03          block #                  data 0 to 512 bytes




                2 byte block number
                network byte order

2 byte opcode                         all data packets have 512 bytes
network byte order                    except the last one.




                                                                        27
TFTP Acknowledgment

                     04      block #




                          2 byte block number
2 byte opcode
                          network byte order
network byte order




                                                28
TFTP Error Packet
         05          errcode                   errstring                  0



                                     null terminated ascii error string
2 byte opcode
network byte order


                2 byte error code
                network byte order




                                                                              29
TFTP transfer modes
   “netascii” : for transferring text files.
     alllines end with rn (CR,LF).
     provides standard format for transferring text files.
     both ends responsible for converting to/from
      netascii format.
   “octet” : for transferring binary files.
     no    translation done.




                                                              30
NetAscii Transfer Mode
         Unix - end of line marker is just 'n'

   receiving a file
       you need to remove 'r' before storing data.
   sending a file
     you  need to replace every 'n' with "rn" before
        sending




                                                           31
TELNET



         32
Initiating and Using Telnet
Sessions
   Telnet enable user to;

     create   a remote command console session on a host.

     run command line programs, shell commands, and
      scripts in a remote command console session just as
      though you were locally logged on to the host and
      using a local command prompt window.



                                                         33
Telnet
   Telnet is a protocol used to pass commands
    and replies between the client the UNIX
    computer.

   All UNIX systems support some form of Telnet.

   Windows versions also include Telnet Client and
    Telnet Server components.


                                                    34
How Telnet Works
   To use Telnet you need to know IP address of
    the host where the resource you want to use
   When you contact the host, the distant computer
    and your computer negotiate how to
    communicate with each other
   When client and server communicate they use
    Telnet protocol



                                                  35
How Telnet Works
   You can start the service manually every time
    you want to connect to a host,
   Or you can configure the service so that it starts
    every time your computer starts.
   Telnet clients cannot connect to a host unless a
    Telnet server program (or service) is running
    and listening for connection requests.



                                                     36
How Telnet Works
   When run a Telnet client, it makes a connection request
    to the host (Telnet server).
   If a Telnet server responds to the request, the Telnet
    client and server negotiate the details of the connection,
    such as flow control settings, window size, and terminal
    type.
   After the connection details are successfully negotiated,
    and logon credentials are validated, the Telnet server
    program creates a Telnet command console session.



                                                             37
Telnet in Windows XP
   Use Run dialog box,
     type   telnet mydomain.com


   Use web browser
     Enter   telnet://mydomain.com in the address box




                                                         38
Telnet in DOS prompt




                       39
Telnet in HyperTerminal




                          40
Examples of TELNET client/server

   Tlntsvr.exe (Telnet Server) - preinstalled in
    Windows OS
   Telnet.exe (Telnet Server) – preinstalled in
    Windows OS




                                                    41
Telnet Commands
   open - to open hostname port number to
    establish a Telnet connection to a host.
   close - to close an existing Telnet connection
   quit - to exit from Telnet
   status - to determine whether the Telnet client is
    connected.




                                                    42
Telnet Limitations
   Telnet is a character-based communication
    protocol and not designed to transmit cursor
    movements or GUI information.
   Can only run command line programs, shell
    commands, scripts, and batch files
   Some editing programs, such as vi and Edit, can
    be run over a Telnet connection
   However, these interactive programs are not
    true GUI programs because cursor movement is
    controlled by the keyboard, not the mouse.
                                                  43
Telnet Limitations (cont.)
   By default, Telnet does not encrypt any data
    sent over the connection (including passwords),
    and so it is trivial to eavesdrop on the
    communications and use the password later for
    malicious purposes.
   Lacks an authentication scheme that makes it
    possible to ensure that communication is carried
    out between the two desired hosts


                                                   44
Using Secure Shell (SSH) Protocol

   SSH enables two computer to negotiate and
    establish secure connection that use encryption
   May stop cracker who try to sniff password and
    data
   Provide secure communication for doing email,
    accessing Web, login to remote site and
    publishing file in FTP (SFTP)



                                                  45
Using SSH Protocol (cont.)
   It uses public-key cryptography to authenticate the
    remote computer and to allow the remote computer to
    authenticate the user
   SSH provides confidentiality and integrity of data
    exchanged between the two computers using
       encryption
       message authentication codes (MACs).
   PuTTY is a free SSH client and multiplatform - establish
    a secure channel between a local and a remote
    computer


                                                           46
Summary
   FTP sites can be accessed by client software,
    such as Web browsers, operating system
    command utilities, or GUI software dedicated to
    FTP, such as WS_FTP Pro.
   FTP also can be accessed from a command
    prompt.




                                                      47
Summary (cont.)
   Telnet program runs on the computer and
    connects PC to a server on the network.
   Enter commands through the Telnet program
    and they will be executed as if you were entering
    them directly on the server console.
   Enables you to control the server and
    communicate with other servers on the network



                                                   48

More Related Content

PPTX
What is Server? (Web Server vs Application Server)
PPTX
Users and groups
PPT
PPTX
Access control list acl - permissions in linux
PPT
Server configuration
ODP
Linux commands
PDF
Hypervisors
What is Server? (Web Server vs Application Server)
Users and groups
Access control list acl - permissions in linux
Server configuration
Linux commands
Hypervisors

What's hot (20)

PPTX
Introduction 2 linux
PPT
Interprocess communication (IPC) IN O.S
PDF
Intro to Linux Shell Scripting
PPTX
Multi processor scheduling
PPS
Virus & Computer security threats
PPTX
Linux file system
PDF
Users and groups in Linux
PDF
Linux Basic Commands
PPTX
Linux booting process - Linux System Administration
PPTX
Introduction to Unix
PPT
Linux Administration
PPTX
Presentation on Operating System & its Components
PPTX
Presentation on samba server
PPT
cpu scheduling in os
PPTX
Remote login
PPTX
Pipes in Windows and Linux.
PDF
Lesson 2 Understanding Linux File System
PDF
Linux introduction
PPTX
File permissions
PPTX
Troubleshooting complex layer 2 issues ppt 16 bsit098
Introduction 2 linux
Interprocess communication (IPC) IN O.S
Intro to Linux Shell Scripting
Multi processor scheduling
Virus & Computer security threats
Linux file system
Users and groups in Linux
Linux Basic Commands
Linux booting process - Linux System Administration
Introduction to Unix
Linux Administration
Presentation on Operating System & its Components
Presentation on samba server
cpu scheduling in os
Remote login
Pipes in Windows and Linux.
Lesson 2 Understanding Linux File System
Linux introduction
File permissions
Troubleshooting complex layer 2 issues ppt 16 bsit098
Ad

Viewers also liked (20)

PPTX
An overview of ftp
PPTX
Telnet & SSH
PDF
TELNET Protocol
PPT
Dns ppt
PPTX
Manejo de filezilla
PPTX
Ftp server
PPT
Het ABC van social networking
PPTX
Psdn and ccitt x series
PPTX
PPTX
Telnet
PPTX
3 public key cryptography
PPTX
FTP Client and Server | Computer Science
PPT
PPTX
Team 5 presentation
PDF
An introduction to SSH
PDF
Protocolos; SNMP, TELNET, SSH
PPT
PPT
Oracle database - Get external data via HTTP, FTP and Web Services
PPTX
TCP/IP and DNS
PDF
Important tips on Router and SMTP mail routing
An overview of ftp
Telnet & SSH
TELNET Protocol
Dns ppt
Manejo de filezilla
Ftp server
Het ABC van social networking
Psdn and ccitt x series
Telnet
3 public key cryptography
FTP Client and Server | Computer Science
Team 5 presentation
An introduction to SSH
Protocolos; SNMP, TELNET, SSH
Oracle database - Get external data via HTTP, FTP and Web Services
TCP/IP and DNS
Important tips on Router and SMTP mail routing
Ad

Similar to Lecture 7 -_ftp,_tftp,_telnet_and_ssh (20)

PPT
Ftp.75 to 76
PPTX
BITM3730Week10.pptx
PDF
10 Lecture Ftp
PPT
Telnet and FTP.ppt
PPT
Using an FTP client - Client server computing
PPT
file transfer and access utilities
PPTX
File transfer protocol- Gowdham
DOCX
File transfer protocol
PDF
Tftp errors
PDF
Lec 8(FTP Protocol)
PPT
六合彩,香港六合彩 » SlideShare
PPT
香港六合彩 » SlideShare
PPT
香港六合彩-六合彩
PPT
六合彩-香港六合彩
PPT
香港六合彩
PPT
六合彩,香港六合彩 » SlideShare
PPT
六合彩 » SlideShare
PPT
六合彩-香港六合彩 » SlideShare
PPT
patelchodu
PPT
ftp.07f.ppt
Ftp.75 to 76
BITM3730Week10.pptx
10 Lecture Ftp
Telnet and FTP.ppt
Using an FTP client - Client server computing
file transfer and access utilities
File transfer protocol- Gowdham
File transfer protocol
Tftp errors
Lec 8(FTP Protocol)
六合彩,香港六合彩 » SlideShare
香港六合彩 » SlideShare
香港六合彩-六合彩
六合彩-香港六合彩
香港六合彩
六合彩,香港六合彩 » SlideShare
六合彩 » SlideShare
六合彩-香港六合彩 » SlideShare
patelchodu
ftp.07f.ppt

More from Serious_SamSoul (11)

PDF
Lecture 13 -_e-commmerce_e-banking_and_advanced_tech
PDF
Lecture 12 -_internet_security
PDF
Lecture 11 client_server_interaction
PDF
Lecture 9 electronic_mail_representation_and_transfer
PPT
Lecture 6 -_presentation_layer
PPT
Lecture 5 internet-protocol_assignments
PPT
Lecture 4 -_internet_infrastructure_2_updated_2011
PPT
Lecture 3 -_internet_infrastructure_updated_2011
PPT
Lecture 2 -_understanding_networks_with_presenter_notes
PPT
Lecture 1 -_overview_of_the_internet-1-
PPT
Lecture 1 -_overview_of_the_internet-1-
Lecture 13 -_e-commmerce_e-banking_and_advanced_tech
Lecture 12 -_internet_security
Lecture 11 client_server_interaction
Lecture 9 electronic_mail_representation_and_transfer
Lecture 6 -_presentation_layer
Lecture 5 internet-protocol_assignments
Lecture 4 -_internet_infrastructure_2_updated_2011
Lecture 3 -_internet_infrastructure_updated_2011
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 1 -_overview_of_the_internet-1-
Lecture 1 -_overview_of_the_internet-1-

Recently uploaded (20)

PPTX
Cell Types and Its function , kingdom of life
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Computing-Curriculum for Schools in Ghana
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
RMMM.pdf make it easy to upload and study
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
master seminar digital applications in india
Cell Types and Its function , kingdom of life
human mycosis Human fungal infections are called human mycosis..pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Computing-Curriculum for Schools in Ghana
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Supply Chain Operations Speaking Notes -ICLT Program
RMMM.pdf make it easy to upload and study
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Sports Quiz easy sports quiz sports quiz
Insiders guide to clinical Medicine.pdf
Microbial diseases, their pathogenesis and prophylaxis
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
GDM (1) (1).pptx small presentation for students
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
2.FourierTransform-ShortQuestionswithAnswers.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
master seminar digital applications in india

Lecture 7 -_ftp,_tftp,_telnet_and_ssh

  • 1. Lecture 7: File Transfer and Remote File Access BITS 2513 INTERNET TECHNOLOGY 1
  • 2. Using FTP to Transfer Files  Web servers (using HTTP) and e-mail software (using SMTP) must encode data so it appears as text when it travels over the Internet.  FTP (File Transfer Protocol) offers an alternative.  An FTP site is a computer running an FTP server application.  On FTP server a program called daemon allows to download and upload files 2
  • 3. Using FTP to Transfer Files (cont.)  FTP can transfer binary files over the Internet without the encoding and decoding overhead, making it a popular protocol for moving files over the Internet.  FTP also use to upload files from your computer to another computer on the internet 3
  • 4. Using FTP to Transfer Files (cont.)  Large organizations might maintain several FTP sites in different parts of the world to speed up download time across the globe.  These are called mirror sites.  A mirror site is a server that contains the same set of files as a heavily used server to off-load some of the burden of providing the files to the community using them.  Mirror sites also serve as a backup for the main server in case the main server fails. 4
  • 5. How FTP Works  An FTP server identifies users on an FTP site by their user IDs.  FTP client and server software create a session after you are logged on.  The FTP client has access to the file system on the server.  The local computer (the client) issues character-like commands, and the remote computer (the server) replies with numbers that are interpreted by the local computer. 5
  • 6. How FTP Works (cont.)  FTP client and server software can access their individual file system and transfer files in either direction Local host Remote host File FTP FTP File System Client Server System 6
  • 7. How FTP Works (cont.)  FTP server usually listen at port 21 for client activity  Most Web servers have FTP service running to receive changes to Web pages files from web developers  FTP server normally run on the same computer that is running a Web server 7
  • 8. Requirements for using FTP  An FTP client installed on the computer.  Login details of the FTP server to which you want to connect:  The FTP server address. This looks a lot like the address you type in Internet Explorer to browse websites. One such example is “ftp://ftmk.kutkm.edu.my”.  The user name and password required for the FTP connection. Some FTP servers let you connect to them anonymously. For anonymous connections, you do not need a user name and password. 8
  • 9. FTP Via a Web Browser  Have you ever attempted to download software from a Web site and clicked a hyperlink that says “Click here to download now” or a similar message?  If you carefully note the URL after you click to download the software, you will see that the protocol changes from http:// to ftp:// in the Web browser’s Address box. 9
  • 10. How to use FTP  Logging on to an FTP site with a Web browser 10
  • 11. How to use FTP  When you log on to an FTP site, you can browse through the available files by changing directories, seeing listing of all files and etc. Using Windows Explorer to access FTP site 11
  • 12. How to use FTP  An error occur when you attempt to upload a file to an FTP site where you don’t have write permission 12
  • 13. FTP from a Command Prompt  Most operating systems, including Windows 9x, Windows NT, Windows 2000, and Windows XP, offer FTP client software that runs from a command prompt.  A batch file is a file with a .bat file extension that contains a list of DOS-like commands that can be executed as a group. 13
  • 14. FTP from a Command Prompt cont.)  Another protocol similar to FTP is TFTP (Trivial FTP).  TFTP has fewer commands than FTP and can be used only to send and receive files.  It can be used for multicasting in which a file is sent to more than one client at the same time using the UDP (User Datagram Protocol). 14
  • 15. FTP session using Windows XP FTP utility 15
  • 16. FTP Commands Opening and closing connection  ftp - starts an FTP session  open hostname - connects to the specified host  close - closes the connection (but not the FTP session!)  quit - terminates the FTP session Browsing on a remote machine  dir - gives a full directory listing on the remote machine  dir test* - displays only files and directories whose name begins with "test..."  ls - same as dir, but provides a simplified listing of filenames Directories in FTP  pwd - prints the name of the current remote directory  cd remote-directory - changes working directory on remote host  cd .. - moves up one level in the directory structure on the remote host  lcd directory - changes the default directory on local host 16
  • 17. Trivial File Transfer Protocol: TFTP Usage and Design  Transfer files between processes.  Minimal overhead (no security).  Designed for UDP, although could be used with many transport protocols.  Easy to implement  Small - possible to include in firmware  Used to bootstrap workstations and network devices. 17
  • 18. Diskless Workstation Booting 1 The call for help Help! I don't know who I am! My Ethernet address is: 4C:23:17:77:A6:03 RARP Diskless Workstation 18
  • 19. The answer from the all-knowing I know all! You are to be know as: RARP 128.113.45.211 Server Diskless Workstation RARP REPLY 19
  • 20. The request for instructions I need the file named boot-128.113.45.211 Diskless Workstation TFTP Request (Broadcast) 20
  • 21. The dialog here is part 1 TFTP I got part 1 Server here is part 2 Diskless Workstation boot file TFTP File Transfer 21
  • 22. TFTP Protocol 5 message types:  Read request  Write request  Data  ACK (acknowledgment)  Error 22
  • 23. Messages  Each is an independent UDP Datagram  Each has a 2 byte opcode (1st 2 bytes)  The structure of the rest of the datagram depends on the opcode. 23
  • 24. Message Formats OPCODE FILENAME 0 MODE 0 OPCODE BLOCK# DATA OPCODE BLOCK# OPCODE BLOCK# ERROR MESSAGE 0 2 bytes 2 bytes 24
  • 25. Read Request 01 filename 0 mode 0 null terminated ascii string null terminated ascii string containing name of file containing transfer mode 2 byte opcode network byte order variable length fields! 25
  • 26. Write Request 02 filename 0 mode 0 null terminated ascii string null terminated ascii string containing name of file containing transfer mode 2 byte opcode network byte order variable length fields! 26
  • 27. TFTP Data Packet 03 block # data 0 to 512 bytes 2 byte block number network byte order 2 byte opcode all data packets have 512 bytes network byte order except the last one. 27
  • 28. TFTP Acknowledgment 04 block # 2 byte block number 2 byte opcode network byte order network byte order 28
  • 29. TFTP Error Packet 05 errcode errstring 0 null terminated ascii error string 2 byte opcode network byte order 2 byte error code network byte order 29
  • 30. TFTP transfer modes  “netascii” : for transferring text files.  alllines end with rn (CR,LF).  provides standard format for transferring text files.  both ends responsible for converting to/from netascii format.  “octet” : for transferring binary files.  no translation done. 30
  • 31. NetAscii Transfer Mode Unix - end of line marker is just 'n'  receiving a file  you need to remove 'r' before storing data.  sending a file  you need to replace every 'n' with "rn" before sending 31
  • 32. TELNET 32
  • 33. Initiating and Using Telnet Sessions  Telnet enable user to;  create a remote command console session on a host.  run command line programs, shell commands, and scripts in a remote command console session just as though you were locally logged on to the host and using a local command prompt window. 33
  • 34. Telnet  Telnet is a protocol used to pass commands and replies between the client the UNIX computer.  All UNIX systems support some form of Telnet.  Windows versions also include Telnet Client and Telnet Server components. 34
  • 35. How Telnet Works  To use Telnet you need to know IP address of the host where the resource you want to use  When you contact the host, the distant computer and your computer negotiate how to communicate with each other  When client and server communicate they use Telnet protocol 35
  • 36. How Telnet Works  You can start the service manually every time you want to connect to a host,  Or you can configure the service so that it starts every time your computer starts.  Telnet clients cannot connect to a host unless a Telnet server program (or service) is running and listening for connection requests. 36
  • 37. How Telnet Works  When run a Telnet client, it makes a connection request to the host (Telnet server).  If a Telnet server responds to the request, the Telnet client and server negotiate the details of the connection, such as flow control settings, window size, and terminal type.  After the connection details are successfully negotiated, and logon credentials are validated, the Telnet server program creates a Telnet command console session. 37
  • 38. Telnet in Windows XP  Use Run dialog box,  type telnet mydomain.com  Use web browser  Enter telnet://mydomain.com in the address box 38
  • 39. Telnet in DOS prompt 39
  • 41. Examples of TELNET client/server  Tlntsvr.exe (Telnet Server) - preinstalled in Windows OS  Telnet.exe (Telnet Server) – preinstalled in Windows OS 41
  • 42. Telnet Commands  open - to open hostname port number to establish a Telnet connection to a host.  close - to close an existing Telnet connection  quit - to exit from Telnet  status - to determine whether the Telnet client is connected. 42
  • 43. Telnet Limitations  Telnet is a character-based communication protocol and not designed to transmit cursor movements or GUI information.  Can only run command line programs, shell commands, scripts, and batch files  Some editing programs, such as vi and Edit, can be run over a Telnet connection  However, these interactive programs are not true GUI programs because cursor movement is controlled by the keyboard, not the mouse. 43
  • 44. Telnet Limitations (cont.)  By default, Telnet does not encrypt any data sent over the connection (including passwords), and so it is trivial to eavesdrop on the communications and use the password later for malicious purposes.  Lacks an authentication scheme that makes it possible to ensure that communication is carried out between the two desired hosts 44
  • 45. Using Secure Shell (SSH) Protocol  SSH enables two computer to negotiate and establish secure connection that use encryption  May stop cracker who try to sniff password and data  Provide secure communication for doing email, accessing Web, login to remote site and publishing file in FTP (SFTP) 45
  • 46. Using SSH Protocol (cont.)  It uses public-key cryptography to authenticate the remote computer and to allow the remote computer to authenticate the user  SSH provides confidentiality and integrity of data exchanged between the two computers using  encryption  message authentication codes (MACs).  PuTTY is a free SSH client and multiplatform - establish a secure channel between a local and a remote computer 46
  • 47. Summary  FTP sites can be accessed by client software, such as Web browsers, operating system command utilities, or GUI software dedicated to FTP, such as WS_FTP Pro.  FTP also can be accessed from a command prompt. 47
  • 48. Summary (cont.)  Telnet program runs on the computer and connects PC to a server on the network.  Enter commands through the Telnet program and they will be executed as if you were entering them directly on the server console.  Enables you to control the server and communicate with other servers on the network 48