Prev

Next

The advantage of using wireless data transmission module... Data transmission can be simply divided into two major types: wired (including the installation of optical cables, cables or leased telecommunication lines) and wireless (including the establishment of dedicated wireless data transmission system or the borrowing of CDPD, GSM, CDMA and other public network information platforms).     In...

更多文章

Industrial-grade 4G router TCP/IP network architecture 1. Layering of TCP/IP network system   TCP/IP (TransmissionControlProtocol/InternetProtocol), transmission control protocol/Internet protocol. It was developed by the defense advanced research projects agency in the 1970s, and was later integrated into UNIX and popularized. It emerged in the 1980s as the Internet's...

更多文章

The structure of 4G DTU The main function of DTU is to transmit data from remote devices back to the background center via wired/wireless. Different data transmission modes of DTU include all-network-connected DTU, GPRS DTU, WIFI DTU, CAN DTU and 4G DTU. Today, we will have a look at the structure and work flow of DTU.   To complete...

更多文章

What are the wireless connection technologies of the... Internet of things (iot) applications have been deeply rooted in our lives. The E-Lins H685 industrial-grade router is a small industrial-grade wireless router with single or double LAN ports. TDD/ fdd-lte, 4G, 3G, GPRS network optional. Besides, what are the wireless connectivity technologies for the Internet of things?   1....

更多文章

The use of industrial wireless routers Industrial-grade wireless router adopts high performance 32-bit industrial-grade ARM9 communication processor, which is widely used in finance, electric power, postal, water conservancy, environmental protection, meteorology and other industries.   Industrial router is mainly used in intelligent transportation,...

更多文章

twitter

A Quick Understanding of FTP/SFTP/FTPS/TFTP

Category : 伊林思产品FAQ, 其他, 技术相关

File Transfer Protocol (FTP)

The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files from a server to a client using the Client–server model on a computer network.

FTP is built on a client-server model architecture and uses separate control and data connections between the client and the server. FTP users may authenticate themselves with a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS). SSH File Transfer Protocol (SFTP) is sometimes also used instead; it is technologically different.

 

SSH File Transfer Protocol(SFTP)

The SSH file transfer protocol (chronologically the second of the two protocols abbreviated SFTP) transfers files and has a similar command set for users, but uses the Secure Shell protocol (SSH) to transfer files. Unlike FTP, it encrypts both commands and data, preventing passwords and sensitive information from being transmitted openly over the network. It cannot interoperate with FTP software.

In computing, the SSH File Transfer Protocol (also Secure File Transfer Protocol, or SFTP) is a network protocol that provides file access, file transfer, and file management over any reliable data stream. It was designed by the Internet Engineering Task Force (IETF) as an extension of the Secure Shell protocol (SSH) version 2.0 to provide secure file transfer capabilities. The IETF Internet Draft states that, even though this protocol is described in the context of the SSH-2 protocol, it could be used in a number of different applications, such as secure file transfer over Transport Layer Security (TLS) and transfer of management information in VPN applications.

This protocol assumes that it is run over a secure channel, such as SSH, that the server has already authenticated the client, and that the identity of the client user is available to the protocol.

Simple File Transfer Protocol

Simple File Transfer Protocol (the first protocol abbreviated SFTP), as defined by RFC 913, was proposed as an (unsecured) file transfer protocol with a level of complexity intermediate between TFTP and FTP. It was never widely accepted on the Internet, and is now assigned Historic status by the IETF. It runs through port 115, and often receives the initialism of SFTP. It has a command set of 11 commands and support three types of data transmission: ASCII, binary and continuous. For systems with a word size that is a multiple of 8 bits, the implementation of binary and continuous is the same. The protocol also supports login with user ID and password, hierarchical folders and file management (including rename, delete, upload, download, download with overwrite, and download with append).

FTPS

Explicit FTPS is an extension to the FTP standard that allows clients to request FTP sessions to be encrypted. This is done by sending the “AUTH TLS” command. The server has the option of allowing or denying connections that do not request TLS. This protocol extension is defined in RFC 4217. Implicit FTPS is an outdated standard for FTP that required the use of a SSL or TLS connection. It was specified to use different ports than plain FTP.

Trivial File Transfer Protocol(TFTP)

Trivial File Transfer Protocol (TFTP) is a simple, lock-step FTP that allows a client to get a file from or put a file onto a remote host. One of its primary uses is in the early stages of booting from a local area network, because TFTP is very simple to implement. TFTP lacks security and most of the advanced features offered by more robust file transfer protocols such as File Transfer Protocol. TFTP was first standardized in 1981 and the current specification for the protocol can be found in RFC 1350.

 

 (Information collected from Wekipedia)