SlideShare a Scribd company logo
FILE TRANSFER PROTOCOL
PREPARED BY
Mr. Gowdham . P
INTRODUCTION
The File Transfer Protocol is a standard network protocol used for the
transfer of computer files from a server to a client on a computer network.
FTP is built on a client-server model architecture using separate control
and data connections between the client and the server.
FTP (File Transfer Protocol) is the simplest and most secure way to
exchange files over the Internet.
Transferring files from a client computer to a server computer is called
"uploading" and transferring from a server to a client is "downloading“.
DEFINITION
File Transfer Protocol (FTP) is a standard Internet protocol for
transmitting files between computers on the Internet
over TCP/IP connections. FTP is a client-server protocol where
a client will ask for a file, and a local or remote server will
provide it.
-
PETER LOSHIN
(Tech Target Contributor)
HISTORY
The original specification for the File Transfer Protocol was written
by Abhay Bhushan and published as RFC 114 on 16 April 1971. Until
1980, FTP ran on NCP, the predecessor of TCP/IP.
The protocol was later replaced by a TCP/IP version, RFC 765 (June
1980) and RFC 959 (October 1985), the current specification.
Several proposed standards amend RFC 959.
Example:
RFC 1579 (February 1994) enables Firewall-Friendly FTP (passive
mode), RFC 2228 (June 1997) proposes security extensions, RFC 2428 (September
1998) adds support for IPv6 and defines a new type of passive mode.
OBJECTIVES OF FTP
It provides the sharing of files.
It is used to encourage the use of remote computers.
It transfers the data more reliably and efficiently.
FTP MODLE
FTP PROCESS
When an FTP client is connected to a FTP server, the USER-PI initiates
the connection to the server according to the Telnet protocol.
The client sends FTP commands to the server, the server interprets
them, runs its DTP, then sends a standard response.
Once the connection is established, the server-PI gives the port on
which data will be sent to the Client DTP.
The client DTP then listens on the specified port for data coming from
the server.
FTP CONNECTIONS
FTP
CONNECTIONS
Control
connection
Data
connection
FTP CONNECTION TYPES
TYPES OF CONNECTION
•Control Connection:
The control connection uses very simple rules for
communication. Through control connection, we can
transfer a line of command or line of response at a time.
The control connection is made between the control
processes. The control connection remains connected
during the entire interactive FTP session.
•Data Connection:
The Data Connection uses very complex rules as data types
may vary. The data connection is made between data
transfer processes. The data connection opens when a
command comes for transferring the files and closes when
DTP&PI
DTP (Data Transfer Process) It establishes the
connection and managing the data channel. The server
side DTP is called SERVER-DTP, the client side DTP is
called USER-DTP.
PI (Protocol Interpreter) Controls DTP using
commands received over the control channel. It is
different on the client and the server:
PI
{Protocol
Interpreter}
SERVER-
PI
USER-PI
CONT.,
The SERVER-PI is responsible for listening to the
commands coming from a USER-PI over the control,
establishing the connection for the control channel,
receiving FTP commands from the USER-PI over this,
responding to them and running the SERVER-DTP.
The USER-PI is responsible for establishing the
connection with the FTP server, sending FTP
commands, receiving responses from the SERVER-PI
and controlling the USER-DTP if needed.
FTP CLIENTS
There are many FTP client programs, some of which
are run from a command-line (such as the command
ftp, a standard installed in many operating systems),
but a large majority allow the user to manipulate files
via a graphical interface, which makes file transfers
more user-friendly.
CONT.,
Some commonly used FTP clients include the following
FileZilla- a popular FTP client that is freely available for
Windows, Macintosh, and Linux users Available as a free
download from the Internet.
Fire FTP- a plug-in for the popular Firefox web browser
that can be used just like a standalone FTP program
Installed through the FireFox browser.
Dreamweaver- page layout/design program, which
include FTP access as one of its many features Available
for purchase from Adobe.
FTP MODLE
It is important to note that since the control and
data ports are separate channels, it is possible to
send commands from one machine and receive
data on another. So, for example it is possible to
transfer data between FTP servers by passing
through a client to send control instructions and
by transferring information between two server
processes connected on the right port.
FTP COMMANDS
There are three different types of FTP
commands:
 Access control commands.
Example:
USER,PASS,ACCT,CWD,CDUP,SMNT,REIN,QUIT.
 Transfer parameter commands.
Example:
PORT,PASU,TYPE,STRU,MODE.
CONT.,
 FTP service commands.
Example:
RETR,STUR,STOU,APPE,ALLO,REST,RNER,RNTO,ABOR,D
ELE,RMD,MKD,PWD,LIST,NLST,SITE,SYST,STST.
THE FTP RESPONSES
The FTP responses make it possible to ensure
synchronization between the client and FTP server. So,
at each command sent by the client, the server will
potentially carry out an action and systematically send
back a response.
CONT.,
The response codes are made up of 3 numbers
the meanings of which are as follows:
The first number indicates the status of the response
(success or fail).
The second number indicates what the response
refers to.
The third number gives a more specific meaning
(relative to each second digit).
FIRST NUMBER DIGIT
1yz means Preliminary positive response:
The action requested is in progress, a second
response must be obtained before sending a second
command.
2yz Positive fulfilment response:
The action requested has been fulfilled, a new
command can be sent.
3yz Intermediary positive response:
The action request is temporarily suspended.
Additional information is awaited from the client.
CONT.,
4yz Negative fulfilment response
The action requested has not taken place because the
command has temporarily not been accepted. The
client is requested to try again later.
5yz Permanent negative response
The action requested has not taken place because the
command has not been accepted. The client is
requested to formulate a different request.
SECOND NUMBER DIGIT
x0z Syntax
The action has a syntax error, or is a command not
understood by the server.
x1z Information
This is a response sending back information .
x2z Connections
The response relates to the data channel.
CONT.,
x3z Authentication and accounts
The response relates to the (USER/PASS) login or the
request to change the account (CPT).
x4z Not used by the FTP protocol.
x5z File system
The response relates to the remote file system.
ADVANTAGES OF FTP
Speed:
One of the biggest advantages of FTP is speed. The
FTP is one of the fastest way to transfer the files from
one computer to another computer.
Efficient:
It is more efficient as we do not need to complete all
the operations to get the entire file.
CONT.,
Security:
To access the FTP server, we need to login with the
username and password. Therefore, we can say that
FTP is more secure.
Back & forth movement:
FTP allows us to transfer the files back and forth.
Suppose you are a manager of the company, you send
some information to all the employees, and they all
send information back on the same server.
DISADVANTAGES OF FTP
The standard requirement of the industry is that all
the FTP transmissions should be encrypted. However,
not all the FTP providers are equal and not all the
providers offer encryption. So, we will have to look out
for the FTP providers that provides encryption.
FTP serves two operations, to send and receive large
files on a network. However, the size limit of the file is
2GB that can be sent. It also doesn't allow you to run
simultaneous transfers to multiple receivers.
CONT.,
Passwords and file contents are sent in clear text that
allows unwanted eavesdropping. So, it is quite
possible that attackers can carry out the brute force
attack by trying to guess the FTP password.
It is not compatible with every system.
ELECTRONIC PAYMENT
SYSTEM
INTRODUCTION
E payments are payments that are made electronically
over the internet .
Earlier almost all the business transactions were done
through cash payments but now IT revolution has led
to the development of new forms of payment.
DEFINITION
Electronic payment system is a financial exchange that
takes place online between buyers and sellers.
There are different methods to pay electronically like credit
cards , electronic cash etc.
CUSTOM
ER
VIRTUAL
BUSINESS
PAYMENT GATEWAY
Payment Gateways are the entities that act as a
medium for transaction processing between the
entities ( e.g. mastercard visa) and Certification
authorities (CA) . They issue public key certificates to
entities.
PAYMENT SYSTEMS
ARCHITECTURE
PROBLEMS IN TRADITIONAL
PAYMENT SYSTEM
Lack of convenience.
Lack of security.
Lack of coverage.
Lack of eligibility.
Lack of support for micro transactions.
TYPES OF e-PAYMENT
PAYMENT CARDS
CREDIT CARDS.
DEBIT CARDS.
CHARGE CARDS.
SMART CARDS.
CREDIT CARDS
Two of credit cards on the market.
Credit cards issued by credit companies(e.g. Master
card, visa) and major banks (SBI, HDFC etc.).
Credit cards issed by the departmental stores(e.g.
Boygner) , oil companies(e.g. Shell).
DEBIT CARDS
Plastic card with a unique number.
Requires a bank account.
No interest charges related to this card
CHARGE CARDS
Are similar to credit cards except they have no revolving credit line
so they have make payments every month.
It similar to credit card and debit card in appearance bt it has a
small microprocessor chip embedded in it.
SMART CARDS
It similar to credit card and debit card in appearance but it has a
small microprocessor chip embedded in it.
ELECTRONIC CASH
In case of e-cash, both customer and merchant have
to sign up with the bank or company issuing e-cash.
Enables transactions between customers without the
need of banks.
E-WALLETS
A digital wallet refers to an electronic device that
allows an individual to make electronic transactions.
This can include purchasing items on-line with a
computer or using a smartphone to purchase
something at a store.
It is convenient & safe way to carry less cash.
Example: Mobile Wallet.
MICRO-PAYMENT SYSTEM
Small payments on web like billing by bank, financial institute etc.
Universal acceptance.
Comprehensive security.
Allows vendors to sell content.
E-CASH
Online payments via debit cards, credit cards or
smart card are the examples of e-money transactions.
E Cash is transferred directly from customer’s
desktop to the merchant’s site.
E-CHEQUE
E-Cheque is the result of co-operation between
several banks, government entities, technology
companies and e-commerce organizations.
These can be used for small and large organizations.
Thank you all ! !

More Related Content

PPT
Ftp.75 to 76
DOCX
File Transfer Protocol(ftp)
PPT
file transfer and access utilities
PPT
Ftp
PPTX
Email HTTP And FTP
PPTX
Solving the Problems of FTP
PPTX
Ftp: a slideshow on File transfer protocol
PDF
Lec 8(FTP Protocol)
Ftp.75 to 76
File Transfer Protocol(ftp)
file transfer and access utilities
Ftp
Email HTTP And FTP
Solving the Problems of FTP
Ftp: a slideshow on File transfer protocol
Lec 8(FTP Protocol)

What's hot (15)

PPT
Design an Implementation of A Messaging and Resource Sharing Software
PPT
Group20 Dynamic Networks
PPTX
Presentation 1
PPTX
Domain name system (dns) , TELNET ,FTP, TFTP
PPTX
Application layer in network system
DOCX
Network Testing ques
PDF
Unit 3 - Protocols and Client-Server Applications - IT
PDF
Unit 5 application layer
PPT
(Ftp) file transfer protocol
PPT
retrieving the mail
PDF
Lecture 7 -_ftp,_tftp,_telnet_and_ssh
PPT
Application layer
PPTX
File Transfer Protocol
PPT
香港六合彩
PPTX
Application layer
Design an Implementation of A Messaging and Resource Sharing Software
Group20 Dynamic Networks
Presentation 1
Domain name system (dns) , TELNET ,FTP, TFTP
Application layer in network system
Network Testing ques
Unit 3 - Protocols and Client-Server Applications - IT
Unit 5 application layer
(Ftp) file transfer protocol
retrieving the mail
Lecture 7 -_ftp,_tftp,_telnet_and_ssh
Application layer
File Transfer Protocol
香港六合彩
Application layer
Ad

Similar to File transfer protocol- Gowdham (20)

PPTX
FTP-PPT.pptx
PPT
ftp.07f.ppt
PPTX
An overview of ftp
PPTX
Introduction to File Transfer Protocol with commands in FTP
PPTX
Computer network
DOCX
File transfer protocol
PPTX
filetranferprotocolseminarpresentation.pptx
PPTX
BITM3730Week10.pptx
PPTX
File tranfer protocol
PPTX
File Transfer Protocol
PPT
Telnet and FTP.ppt
PDF
File Transfer Protocol (FTP) in Computer Networks_ A Complete Guide.pdf
PPTX
File Transfer Protocol (FTP)
PPTX
File transfer protocol for computer science students
PPT
Ftp tftp
PPTX
File transfer protocol (ftp) in application
PPTX
File Transport Protocol
PPTX
File transfer protocol
PPT
patelchodu
PPTX
File Transfer Protocol(FTP)
FTP-PPT.pptx
ftp.07f.ppt
An overview of ftp
Introduction to File Transfer Protocol with commands in FTP
Computer network
File transfer protocol
filetranferprotocolseminarpresentation.pptx
BITM3730Week10.pptx
File tranfer protocol
File Transfer Protocol
Telnet and FTP.ppt
File Transfer Protocol (FTP) in Computer Networks_ A Complete Guide.pdf
File Transfer Protocol (FTP)
File transfer protocol for computer science students
Ftp tftp
File transfer protocol (ftp) in application
File Transport Protocol
File transfer protocol
patelchodu
File Transfer Protocol(FTP)
Ad

More from Gowdham P (6)

PPTX
Characteristics of Preceptor.pptx.rn rm gowdham p
PPTX
PATIENTS RIGHTS & CONSUMER PROTECTION Nursing Management - Gowdham PK
PPTX
The aida model- Gowdham
PPTX
Human resource management- Gowdham
PPTX
Characteristics of bussiness buye behaviour - Gowdham
PPTX
Developing effective & intensive listening & barriers- Gowdham
Characteristics of Preceptor.pptx.rn rm gowdham p
PATIENTS RIGHTS & CONSUMER PROTECTION Nursing Management - Gowdham PK
The aida model- Gowdham
Human resource management- Gowdham
Characteristics of bussiness buye behaviour - Gowdham
Developing effective & intensive listening & barriers- Gowdham

Recently uploaded (20)

PDF
System and Network Administraation Chapter 3
PDF
Understanding Forklifts - TECH EHS Solution
PDF
AI in Product Development-omnex systems
PPTX
Transform Your Business with a Software ERP System
PDF
medical staffing services at VALiNTRY
PPTX
ai tools demonstartion for schools and inter college
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
System and Network Administration Chapter 2
PPTX
history of c programming in notes for students .pptx
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
System and Network Administraation Chapter 3
Understanding Forklifts - TECH EHS Solution
AI in Product Development-omnex systems
Transform Your Business with a Software ERP System
medical staffing services at VALiNTRY
ai tools demonstartion for schools and inter college
Reimagine Home Health with the Power of Agentic AI​
System and Network Administration Chapter 2
history of c programming in notes for students .pptx
Softaken Excel to vCard Converter Software.pdf
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
How to Migrate SBCGlobal Email to Yahoo Easily
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus

File transfer protocol- Gowdham

  • 1. FILE TRANSFER PROTOCOL PREPARED BY Mr. Gowdham . P
  • 2. INTRODUCTION The File Transfer Protocol is a standard network protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client-server model architecture using separate control and data connections between the client and the server. FTP (File Transfer Protocol) is the simplest and most secure way to exchange files over the Internet. Transferring files from a client computer to a server computer is called "uploading" and transferring from a server to a client is "downloading“.
  • 3. DEFINITION File Transfer Protocol (FTP) is a standard Internet protocol for transmitting files between computers on the Internet over TCP/IP connections. FTP is a client-server protocol where a client will ask for a file, and a local or remote server will provide it. - PETER LOSHIN (Tech Target Contributor)
  • 4. HISTORY The original specification for the File Transfer Protocol was written by Abhay Bhushan and published as RFC 114 on 16 April 1971. Until 1980, FTP ran on NCP, the predecessor of TCP/IP. The protocol was later replaced by a TCP/IP version, RFC 765 (June 1980) and RFC 959 (October 1985), the current specification. Several proposed standards amend RFC 959. Example: RFC 1579 (February 1994) enables Firewall-Friendly FTP (passive mode), RFC 2228 (June 1997) proposes security extensions, RFC 2428 (September 1998) adds support for IPv6 and defines a new type of passive mode.
  • 5. OBJECTIVES OF FTP It provides the sharing of files. It is used to encourage the use of remote computers. It transfers the data more reliably and efficiently.
  • 7. FTP PROCESS When an FTP client is connected to a FTP server, the USER-PI initiates the connection to the server according to the Telnet protocol. The client sends FTP commands to the server, the server interprets them, runs its DTP, then sends a standard response. Once the connection is established, the server-PI gives the port on which data will be sent to the Client DTP. The client DTP then listens on the specified port for data coming from the server.
  • 9. TYPES OF CONNECTION •Control Connection: The control connection uses very simple rules for communication. Through control connection, we can transfer a line of command or line of response at a time. The control connection is made between the control processes. The control connection remains connected during the entire interactive FTP session. •Data Connection: The Data Connection uses very complex rules as data types may vary. The data connection is made between data transfer processes. The data connection opens when a command comes for transferring the files and closes when
  • 10. DTP&PI DTP (Data Transfer Process) It establishes the connection and managing the data channel. The server side DTP is called SERVER-DTP, the client side DTP is called USER-DTP. PI (Protocol Interpreter) Controls DTP using commands received over the control channel. It is different on the client and the server: PI {Protocol Interpreter} SERVER- PI USER-PI
  • 11. CONT., The SERVER-PI is responsible for listening to the commands coming from a USER-PI over the control, establishing the connection for the control channel, receiving FTP commands from the USER-PI over this, responding to them and running the SERVER-DTP. The USER-PI is responsible for establishing the connection with the FTP server, sending FTP commands, receiving responses from the SERVER-PI and controlling the USER-DTP if needed.
  • 12. FTP CLIENTS There are many FTP client programs, some of which are run from a command-line (such as the command ftp, a standard installed in many operating systems), but a large majority allow the user to manipulate files via a graphical interface, which makes file transfers more user-friendly.
  • 13. CONT., Some commonly used FTP clients include the following FileZilla- a popular FTP client that is freely available for Windows, Macintosh, and Linux users Available as a free download from the Internet. Fire FTP- a plug-in for the popular Firefox web browser that can be used just like a standalone FTP program Installed through the FireFox browser. Dreamweaver- page layout/design program, which include FTP access as one of its many features Available for purchase from Adobe.
  • 14. FTP MODLE It is important to note that since the control and data ports are separate channels, it is possible to send commands from one machine and receive data on another. So, for example it is possible to transfer data between FTP servers by passing through a client to send control instructions and by transferring information between two server processes connected on the right port.
  • 15. FTP COMMANDS There are three different types of FTP commands:  Access control commands. Example: USER,PASS,ACCT,CWD,CDUP,SMNT,REIN,QUIT.  Transfer parameter commands. Example: PORT,PASU,TYPE,STRU,MODE.
  • 16. CONT.,  FTP service commands. Example: RETR,STUR,STOU,APPE,ALLO,REST,RNER,RNTO,ABOR,D ELE,RMD,MKD,PWD,LIST,NLST,SITE,SYST,STST.
  • 17. THE FTP RESPONSES The FTP responses make it possible to ensure synchronization between the client and FTP server. So, at each command sent by the client, the server will potentially carry out an action and systematically send back a response.
  • 18. CONT., The response codes are made up of 3 numbers the meanings of which are as follows: The first number indicates the status of the response (success or fail). The second number indicates what the response refers to. The third number gives a more specific meaning (relative to each second digit).
  • 19. FIRST NUMBER DIGIT 1yz means Preliminary positive response: The action requested is in progress, a second response must be obtained before sending a second command. 2yz Positive fulfilment response: The action requested has been fulfilled, a new command can be sent. 3yz Intermediary positive response: The action request is temporarily suspended. Additional information is awaited from the client.
  • 20. CONT., 4yz Negative fulfilment response The action requested has not taken place because the command has temporarily not been accepted. The client is requested to try again later. 5yz Permanent negative response The action requested has not taken place because the command has not been accepted. The client is requested to formulate a different request.
  • 21. SECOND NUMBER DIGIT x0z Syntax The action has a syntax error, or is a command not understood by the server. x1z Information This is a response sending back information . x2z Connections The response relates to the data channel.
  • 22. CONT., x3z Authentication and accounts The response relates to the (USER/PASS) login or the request to change the account (CPT). x4z Not used by the FTP protocol. x5z File system The response relates to the remote file system.
  • 23. ADVANTAGES OF FTP Speed: One of the biggest advantages of FTP is speed. The FTP is one of the fastest way to transfer the files from one computer to another computer. Efficient: It is more efficient as we do not need to complete all the operations to get the entire file.
  • 24. CONT., Security: To access the FTP server, we need to login with the username and password. Therefore, we can say that FTP is more secure. Back & forth movement: FTP allows us to transfer the files back and forth. Suppose you are a manager of the company, you send some information to all the employees, and they all send information back on the same server.
  • 25. DISADVANTAGES OF FTP The standard requirement of the industry is that all the FTP transmissions should be encrypted. However, not all the FTP providers are equal and not all the providers offer encryption. So, we will have to look out for the FTP providers that provides encryption. FTP serves two operations, to send and receive large files on a network. However, the size limit of the file is 2GB that can be sent. It also doesn't allow you to run simultaneous transfers to multiple receivers.
  • 26. CONT., Passwords and file contents are sent in clear text that allows unwanted eavesdropping. So, it is quite possible that attackers can carry out the brute force attack by trying to guess the FTP password. It is not compatible with every system.
  • 28. INTRODUCTION E payments are payments that are made electronically over the internet . Earlier almost all the business transactions were done through cash payments but now IT revolution has led to the development of new forms of payment.
  • 29. DEFINITION Electronic payment system is a financial exchange that takes place online between buyers and sellers. There are different methods to pay electronically like credit cards , electronic cash etc. CUSTOM ER VIRTUAL BUSINESS
  • 30. PAYMENT GATEWAY Payment Gateways are the entities that act as a medium for transaction processing between the entities ( e.g. mastercard visa) and Certification authorities (CA) . They issue public key certificates to entities.
  • 32. PROBLEMS IN TRADITIONAL PAYMENT SYSTEM Lack of convenience. Lack of security. Lack of coverage. Lack of eligibility. Lack of support for micro transactions.
  • 33. TYPES OF e-PAYMENT PAYMENT CARDS CREDIT CARDS. DEBIT CARDS. CHARGE CARDS. SMART CARDS.
  • 34. CREDIT CARDS Two of credit cards on the market. Credit cards issued by credit companies(e.g. Master card, visa) and major banks (SBI, HDFC etc.). Credit cards issed by the departmental stores(e.g. Boygner) , oil companies(e.g. Shell).
  • 35. DEBIT CARDS Plastic card with a unique number. Requires a bank account. No interest charges related to this card
  • 36. CHARGE CARDS Are similar to credit cards except they have no revolving credit line so they have make payments every month. It similar to credit card and debit card in appearance bt it has a small microprocessor chip embedded in it. SMART CARDS It similar to credit card and debit card in appearance but it has a small microprocessor chip embedded in it.
  • 37. ELECTRONIC CASH In case of e-cash, both customer and merchant have to sign up with the bank or company issuing e-cash. Enables transactions between customers without the need of banks.
  • 38. E-WALLETS A digital wallet refers to an electronic device that allows an individual to make electronic transactions. This can include purchasing items on-line with a computer or using a smartphone to purchase something at a store. It is convenient & safe way to carry less cash. Example: Mobile Wallet.
  • 39. MICRO-PAYMENT SYSTEM Small payments on web like billing by bank, financial institute etc. Universal acceptance. Comprehensive security. Allows vendors to sell content.
  • 40. E-CASH Online payments via debit cards, credit cards or smart card are the examples of e-money transactions. E Cash is transferred directly from customer’s desktop to the merchant’s site.
  • 41. E-CHEQUE E-Cheque is the result of co-operation between several banks, government entities, technology companies and e-commerce organizations. These can be used for small and large organizations.