The detailed difference between 4G industrial router...   4G industrial router and 4G DTU both realize the wireless network data transmission function, and the differences between them are mainly from the use method, appearance interface and application environment, etc. Today, we will introduce some differences between 4G router and 4G DTU.   Different methods...


Application analysis of iot sensing technology   The Internet of things (iot) is widely used in the integration of networks through intelligent perception, recognition technology, pervasive computing and other communication perception technologies. The iot is understood as "Internet connected by things". The Internet of things (iot) connects all objects with...


What is a single/dual frequency wireless 4G router 1. Introduction to "single frequency" router The single-frequency router only works in the 2.4ghz band, which is generally supported by wireless terminals. However, the 2.4ghz band has large interference, which may affect the wireless rate and stability.   2. Introduction to "dual-frequency" router Dual-frequency...


Wireless communication DTU features Data Transfer unit (DTU) is a wireless terminal device specially used to convert serial Data into IP Data or convert IP Data into serial Data for transmission through wireless communication network.   DTU advantages: Rapid and flexible network, short construction cycle, low cost; Wide network coverage; Good...


The advantage of using wireless data transmission module... Data transmission can be simply divided into two major types: wired (including the installation of optical cables, cables or leased telecommunication lines) and wireless (including the establishment of dedicated wireless data transmission system or the borrowing of CDPD, GSM, CDMA and other public network information platforms).     In...



A Quick Understanding of FTP/SFTP/FTPS/TFTP

Category : 伊林思产品FAQ, 其他, 技术相关

File Transfer Protocol (FTP)

The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files from a server to a client using the Client–server model on a computer network.

FTP is built on a client-server model architecture and uses separate control and data connections between the client and the server. FTP users may authenticate themselves with a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS). SSH File Transfer Protocol (SFTP) is sometimes also used instead; it is technologically different.


SSH File Transfer Protocol(SFTP)

The SSH file transfer protocol (chronologically the second of the two protocols abbreviated SFTP) transfers files and has a similar command set for users, but uses the Secure Shell protocol (SSH) to transfer files. Unlike FTP, it encrypts both commands and data, preventing passwords and sensitive information from being transmitted openly over the network. It cannot interoperate with FTP software.

In computing, the SSH File Transfer Protocol (also Secure File Transfer Protocol, or SFTP) is a network protocol that provides file access, file transfer, and file management over any reliable data stream. It was designed by the Internet Engineering Task Force (IETF) as an extension of the Secure Shell protocol (SSH) version 2.0 to provide secure file transfer capabilities. The IETF Internet Draft states that, even though this protocol is described in the context of the SSH-2 protocol, it could be used in a number of different applications, such as secure file transfer over Transport Layer Security (TLS) and transfer of management information in VPN applications.

This protocol assumes that it is run over a secure channel, such as SSH, that the server has already authenticated the client, and that the identity of the client user is available to the protocol.

Simple File Transfer Protocol

Simple File Transfer Protocol (the first protocol abbreviated SFTP), as defined by RFC 913, was proposed as an (unsecured) file transfer protocol with a level of complexity intermediate between TFTP and FTP. It was never widely accepted on the Internet, and is now assigned Historic status by the IETF. It runs through port 115, and often receives the initialism of SFTP. It has a command set of 11 commands and support three types of data transmission: ASCII, binary and continuous. For systems with a word size that is a multiple of 8 bits, the implementation of binary and continuous is the same. The protocol also supports login with user ID and password, hierarchical folders and file management (including rename, delete, upload, download, download with overwrite, and download with append).


Explicit FTPS is an extension to the FTP standard that allows clients to request FTP sessions to be encrypted. This is done by sending the “AUTH TLS” command. The server has the option of allowing or denying connections that do not request TLS. This protocol extension is defined in RFC 4217. Implicit FTPS is an outdated standard for FTP that required the use of a SSL or TLS connection. It was specified to use different ports than plain FTP.

Trivial File Transfer Protocol(TFTP)

Trivial File Transfer Protocol (TFTP) is a simple, lock-step FTP that allows a client to get a file from or put a file onto a remote host. One of its primary uses is in the early stages of booting from a local area network, because TFTP is very simple to implement. TFTP lacks security and most of the advanced features offered by more robust file transfer protocols such as File Transfer Protocol. TFTP was first standardized in 1981 and the current specification for the protocol can be found in RFC 1350.


 (Information collected from Wekipedia)