Documente Academic
Documente Profesional
Documente Cultură
By :
ROSIADI BIN TAJUDIN
STEWARD JOHN
MOHD. FIRDAUS MAT KAMIL
NELLIE LIM
WARNIE BINTI MUSAH
NORAZMAL INDAWATI RAZALI
TO USE IT
7.0 LIST OF EXAMPLES OF SOFTWARE 20
8.0 COMPARISON BETWEEN TRADITIONAL 23
2
1.0 ABSTRACT
The purpose of this research paper is to study and know more about the FTP (File
technology. Most of us only know about the internet technology without knowing the
small portion of protocol that made it (internet). In this research paper, not only general
information are explained but also the important part of the core technology (FTP
technology), the potential of this technology and also future development or future plan
for existing FTP technology. By this research we are able to know more about the
effectiveness today’s technology especially internet technology, the current issues that
long has been discussed, prevention methods from attacker and also the best way to
3
2.0 INTRODUCTION
are using technology every single day. People are getting obsess by technology but
unaware that the main part of the technology used today came from small part then
combined into one. One of the most popular technology that been used nowadays is
Information Technology and Internet was one of it. Internet works with protocols that
FTP is abbreviation of File Transfer Protocol that allows user from one computer
to transfer files to another computer over a computer in a (TCP/IP) network. It means that
with FTP, we can transfer files from our computer (act as client) to other computer (act as
server) so that people could view it by entering the correct address. This is the protocol
that usually people used to transfer (upload) their website to the server to that people are
able to view it. FTP is a popular activity on the Internet since it is interactive and
4
relatively easy to get use and use it. Apart from that, FTP also commonly used as a
download programs that download files from the server to our computer.
There are many program and software that we can copy or download by using
FTP. FTP uses the Internet or TCP/IP (Transfer Control Protocol) protocol to make the
transferring data possible, like the other such as Hypertext Transfer Protocol that used to
view the content of websites and related files, and SMTP (Simple Mail Transfer Protocol)
that used to transfer e-mail from the server to our computer. Data is sent and received
FTP was first proposed in 1971 and was developed for implementation on hosts at
M.I.T (Massachusetts Institute of Technology, RFC 114). It has been evolutes over the
The RFC 114 has been upgraded into RFC 172 that provides a user-level oriented
protocol for file transfer between host computers. A revision of this as RFC 265, restated
FTP for additional review, while RFC 281 suggested further changes. The use of a "Set
Data Type" transaction was then proposed in RFC 294 in January 1982. Then the RFC
354 obsolete both RFC 264 and RFC 265. The File Transfer Protocol was now defined as
a protocol for file transfer between Hosts on the ARPANET, with the primary function of
FTP defined as transferring files efficiently and reliably among hosts and allowing the
5
Changes have been made to the proposal and RFC 385 further commented errors
on the previous version of FTP and emphasis the points, and add some additions to the
proposal. Not long after that more features has been added whereas, RFC 414 provides a
status report on the working server and user FTPs. RFC 430, issued in 1973 and
presented further comments on FTP. Finally, official FTP document was published as
RFC 454.
By July 1973, considerable changes from the last versions of FTP were made, but
the general structure remained the same. RFC 542 was published as a new official
In 1974, RFC 607 and RFC 614 continued comments on FTP. RFC 624 proposed
further design changes and minor modifications. In year 1975, RFC 686 entitled Leaving
Well Enough Alone has been published to discussed the differences between all of the
early and later versions of FTP. RFC 691 presented a minor revision of RFC 686,
Motivated by the transition from the NCP to the TCP as the underlying protocol, a
phoenix was born out of all of the above efforts in RFC 765 as the specification of FTP
6
4.0 PURPOSES
The objective of FTP is to promote files sharing (computer programs and/or data), to
encourage indirect or implicit (via programs) use of remote computers, to shield a user
from variations in file storage systems among hosts and to transfer data reliably and
efficiently. FTP, though usable directly by a user at a terminal, is designed mainly for use
by programs.
There are two machines involved in an ftp transaction, a client machine, which is
sometimes called the local host, and a server machine, which is sometimes called the
remote host. The client is always the machine that initiates the transfer. During an ftp
session, it is extremely important to keep track of which machine is the client and which
is the server, because this will determine whether you use a get command or a put
7
command to move files. The get command is always used to copy files from the server to
the client, and the put command is used to copy files from the client to the server.
Another use of FTP is to backup files. We should always make backup copies of
our files in preventing it from damage or lost. People often use ftp to send their
8
Figure: File Transfer Protocol model
FTP is operating system neutral. In example our PC might use FTP and Windows XP to
communicate with an FTP server running the UNIX operating system. (UNIX is a
makes no difference that the operating systems are different; FTP seamlessly transfers
files between them. Whether files are uploaded or downloaded, FTP is the protocol that
9
accomplishes the transfer.
Because we can use FTP to download almost any type of file, there are different
types of file transfer modes and which one we use depends on the type of file we are
downloading.
Many files, including web pages and e-mail messages, consist of ASCII (plain) text.
ASCII text contains symbols typed from the keyboard but does not include any
nonprintable, binary codes. Other files, such as pictures, movies, sound files, and
character formatting, such as bold or italics, is binary. FTP can transfer both ASCII and
binary files.
Files are transferred using one of two file transfer modes; usually the FTP
program chooses the file transfer mode for us automatically. ASCII mode is used to
transfer plain-text files; binary mode is used to transfer everything else. If we download
and open a file and it contains a bunch of codes, then we can suspect that the file was
transferred in the wrong mode. Simply execute the FTP operation again using the correct
transfer mode.
The decision to transfer a file using binary or ASCII mode is largely determined by
noting a file's type, much like Windows programs do. Programs such as Excel, Word, and
internet Explorer determine a file's type by the file extension. It is helpful to understand
10
the relationship between a file's extension and programs that manipulate that file type so
we can determine a file's general use and assess our ability to read the file before we
download it.
File extensions are added automatically by the program that created them based
on a widely agreed-upon convention for associating files with programs. Our computer's
operating system (Windows, for example) keeps track of most file extension associations
and maintains a list of file extensions and programs that can open files with those file
extensions. Each computer that we use maintains different information about the file
types stored on that computer. We can use Windows Explorer to learn about the file
Figure: Show the file extension and transfer mode for different types of File.
11
6.0 WHAT IS IT USED, WHO USE IT AND HOW TO USE IT
In the early age of file transmissions we use e-mail attachments to send files over the
Internet. E-mail is often a good way of transporting a file from one location to another, or
even to ourselves. For example, if we are working on a report in the university computer
lab and forget to bring our disk, we can attach the report to an e-mail message we address
to ourselves and when we get home and download our e-mail messages when we arrives
on our home computer. This method works for sending files to other people as well.
However, many e-mail servers limit the sizes of files we can attach to a single e-
mail message. E-mail servers might also limit the types of files we can send. For
example, some servers will not accept file attachments that can execute programs to
protect the e-mail server from viruses that might be hidden in those files.
To address storage issues and issues related to transmitting large files from one
location to another and between multiple users, we can use FTP. We can send any file
12
type to an FTP site, including spreadsheet, picture, video, sound, program, and text files.
When we send a file using FTP, we upload the file to send it from our computer to the
FTP site. When we receive a file, we download the file from the FTP site and receive it
computer and request it to either receive files from our computer or transfer files to our
computer. The FTP server receives file transfer requests and then manages the details of
To transfer files between computer and a remote computer, we must first connect to the
remote computer by using an FTP client program or use any web browser. Most of the
FTP client programs and browsers will select the file transfer mode of binary or ASCII
automatically.
The FTP client program resides on our pc and transfer files between our pc and FTP site.
Like other widows program, most of FTP client programs have menu bars or toolbars to
help us execute commands. One of the most popular FTP client programs is WS_FTP
13
FTP client programs transfer files quickly and provide features that let we resume
downloading a file when our connection is lost or interrupted. FTP client program can be
get either free or inexpensive. The features provided by an FTP client programs also vary
from one program to another. The other example of FTP client programs are CaptainFTP,
However, there are few criteria that we need to know on selecting an FTP client
program. We need to choose one that supports all or most of the following desirable
features:
• Provides a multipane display so we can see both the local and remote computer
directories simultaneously.
• Allow us to transfer multiple files in one FTP session. Some of the FTP clients
restrict the number of files we can transfer at one time. If we need to transfer
many files, this restriction can significantly increase the amount of time we will
• Permits drag and drop file transfers so we can use the mouse to drag and drop
• Simplifies the process of deleting directories and files on local and remote
computers.
• Allows us to set up scheduled file transfer at a future date and time so we can
• Recovers interrupted file transfers by continuing the transfer process from the
14
• Reconnects automatically to sites that disconnect a transfer when our connection
Content
of the
local
computer
Content
of the
remote
computer
Most Web browsers, including Microsoft Internet Explorer and Netscape Navigator,
support FTP, but they have limited functionality when compared to FTP client programs.
We can use a Web browser to upload and download files from FTP sites, but if we are
transferring a large number of files, we might find that it is difficult to use a browser
because it doesn't provide some of the features included in an FTP client program, such
15
Folder
containin
g more
files
Folder on
the site
6.2 How FTP Work in Transferring and Accessing File for FTP Servers
To use a remote computer, regardless of how we access it, we must identify ourselves, or
log on, by supplying our user name and a password. Some FTP sites provide public
access, which means anyone can connect to the FTP site. When we connect to a public
FTP site, our access is restricted to only those files and folders designated for access by
public users.
Many software companies provide public FTP sites so users can download
16
evaluation versions of their software and data to support their use of the program. Other
FTP sites provide a combination of public and restricted access; some sites are
completely restricted and do not allow public visitors. To access restricted FTP sites, we
Logging on to one of the many publicly accessible, remote computers connected to the
Internet is known as an anonymous login because we use anonymous as our user name.
our full e-mail address if we are prompted for a password. That way, the hosting
organization can identify who is accessing the public areas of its FTP site. When we
mous FTP session. When we connect to a public FTP site using a Web browser, the
browser might automatically supply the user name anonymous and an appropriate
password to access the site. If the site requires us to enter a user name and password, the
We can use many of the anonymous FTP sites connected to the Internet to
download files to our PC. Public FTP sites impose limits on uploading files or provide
only one publicly accessible directory to which we can upload files. Public FTP sites also
limit our access to selected directories and files on their systems. People using FTP sites
with anonymous logins usually cannot open and view all the directories and files on the
to open directories or examine files that are not accessible to anonymous users, we will
17
receive an error or warning message indicating that we do not have access to the
requested file or directory. If we find a file by that or a similar name, be sure to read it
Anonymous
User name
Figure: Show the example of Anonymous FTP session using Internet Explore
When we need to access an FTP site that is not public, such as one for our school or
employer, we will use full-privilege FTP, where we are given access to its content with a
user name and password. Even though we might have an account on a particular FTP site,
our access might be limited to transferring files in a specific directory. When we log on to
an FTP site with our user name and password, the system might automatically direct we
to a particular directory on that FTP site in which we have been given rights to upload
18
and download files. When we have an account on an FTP site, we can usually store files
Some public FTP sites allow users with anonymous FTP access to view only one
directory and any files or other directories it contains. That directory is usually named
pub (for public). Besides permitting download access by anonymous users, the site's
manager, also called the webmaster, might allow users to upload files, making them
available to anyone who connects to the site. Frequently, public directories provide a
temporary location for users to upload and share data or programs that they think others
might find useful. Most FTP sites place time limits, such as a few days or weeks, on how
long anonymous users can store files in the public directory. The webmaster determines
One problem with sites permitting users with upload privileges is that the
webmaster must monitor the files uploaded to a public directory on a regular basis. In
addition to worrying about viruses that might be hidden in uploaded files, the webmaster
must find and delete any copyrighted files that are illegally uploaded to the site for public
use. For example, uploading a program such as Microsoft Word to a public directory is a
clear copyright violation because Microsoft's license agreement prohibits us from sharing
the program with other users. Many FTP sites have specific policies that force we to
acknowledge, before uploading any files, that we are the owner of the material or that its
transfer to the FTP site will not violate any copyright or intellectual property restrictions.
Be sure to read the sites read me files to learn any rules about acceptable use
19
when we enter an FTP site.
Because most Internet users are adept at using a Web browser and know how
hyperlinks work, they will have no difficulty navigating an FTP site in search of files. If
we need to upload or download files to a site requiring full-privilege FTP access rights,
the browser will prompt us for our user name and password.
When we visit an FTP site, our first goal should be to become familiar with its
organization. FTP sites are organized hierarchically, much like the folders and files on a
computer's hard drive. When we access an FTP site, we usually enter at the site's root
directory, which contains other directories that contain files and other directories. Most
sites prevent users with anonymous logins from accessing some files and directories in
the root directory. When we enter a root directory for the first time, a message might
appear indicating which file contains important information about navigating the site.
An FTP site usually stores two types of items-directories (folders) and files. Most
Web browsers display directory and file links with different icons or notations so we can
distinguish directories from files. For example, in Internet Explore a yellow folder icon
identifies a directory; a file is identified with a file icon that indicates the file's type.
Double-clicking a file either opens the file in a new browser window or in a program
window so we can view the file or it begins downloading the file to our computer.
Double-clicking a directory opens the directory and displays its contents. To move up (or
20
Root
directory
Click this
link to
move up
one
directory
21
Directory
Directories
with
extensions
(such as.exe)
Filesfiles
are
Figure: Show the example directories and files both appear as hyperlink
in FTP site by using Navigator
FIRST PUBLIC
SOFTWARE CREATOR
RELEASE DATE
BitKinex FTP Barad-Dur, LLC. 2003
BulletProof FTP Client DigitalCandle, Inc. 1999
Captain FTP Xnet 2001
CoreFTP Core FTP 2003
CrossFTP CrossFTP 2005
22
CuteFTP Alex Kunadze 1994
Cyberduck David V. Kocher No Data
Direct FTP CoffeeCup No Data
Fetch Fetch Softworks No Data
FileZilla Tim Kosse, et al. January, 2001
FireFTP Mime Cuvalo September, 2004
FlashFXP iniCom Networks, Inc. 1998
FTP Client for Microsoft Windows Stratolabs Laboratories September, 2005
FTP Commander InternetSoft Corp. 1997
FTP Explorer FTPx No Data
FTP Voyager Rhino Software, Inc. February, 1997
University of Michigan Research
Fugu No Data
Systems Unix Group
gFTP Brian Masney 1998
Interarchy Stairways Software Pty Ltd 1993 (as Anarchie)
KFTPGrabber Jernej Kos 2003
lftp Alexander V. Lukyanov August, 1996
NcFTP NcFTP Software Inc. 1991
OneButton FTP Aaron Jacobs 2004
SftpDrive Magnetk LLC 2005
Secure FTP Glub Tech, Inc. 1999
Secure FTP Applet JSCAPE LLC 2004
SFTPPlus Pro:Atria Ltd 2005
SmartFTP SmartFTP GmbH 1998
SynchronEX+ Xellsoft 2001
Transmit Panic, Inc. No Data
WinSCP No Data May 2000
WS_FTP Ipswitch, Inc. No Data
23
Fetch No Yes No No No
FileZilla Yes No No No No
FireFTP Yes Yes Yes Yes Yes
FlashFXP Yes No No No No
FTP Commander Yes No No No No
FTP Explorer Yes No No No No
FTP Client 1 Yes Yes No No No
FTP Voyager Yes No No No No
Fugu No Yes No No No
gFTP Yes Yes Yes Yes Yes
Interarchy No Yes No No No
KFTPGrabber No No Yes Yes Yes
lftp Yes Yes Yes Yes Yes
NcFTP Yes Yes Yes Yes Yes
OneButton FTP No Yes No No No
pFTP Yes Yes Yes Yes Yes
Secure FTP Applet Yes Yes Yes Yes Yes
SftpDrive Yes No No No No
SFTPPlus Yes No Yes No Yes
SmartFTP Yes No No No No
SynchronEX+ Yes No Yes No Yes
Transmit No Yes No No No
WS_FTP Yes No No No No
Windows Mac OS X Linux BSD Unix
24
Figure: Example of FTP Software’s Interface. Interface of CuteFTP4.2 Left side panel
shows the “local files” and the right side represent files on the server, or the
"remote" files.
25
8.0 COMPARISON BETWEEN TRADITIONAL AND CURRENT
APPLICATIONS
FTP does not take any precautions to protect information transmitted during a session,
this includes username, password, and any files transmitted while SSH File Transfer
Protocol. SFTP encrypts the session, preventing the casual detection of username,
password or anything that been transmitted. SFTP also provides some verification that the
remote host is really the host it claims to be and its used is encouraged. It is clear here
that FTP doesn’t offer security in data that will be transmitted whereas the SFTP offer
more security in the data or information that have been sent or about to be sent.
While the File Transfer Protocol (FTP) implements a full set of command and
reply functionality that enables a user to perform a wide range of file movement and
manipulation tasks between two TCP/IP machines. This makes it very slow to operate
and sending data since it is too complex. The solution to this need was to create a “light”
version of FTP that would emphasize small program size and simplicity over
functionality. This new protocol, called the Trivial File Transfer Protocol (TFTP). While
FTP work in heavy mode, TFTP works in a light mode. Even though it runs in heavy
mode, FTP includes a rich set of commands to allow files to be sent, received, renamed,
deleted and so forth. TFTP only allows files to be sent and received. Moreover, TFTP
does not include some of FTP's fancy data representation options; it allows only simple
Even though FTP got many disadvantage but over Simple File Transfer Protocol
it has at least some advantage. SFTP (Simple File transfer) as defined by RFC 913, was
26
proposed as an (unsecured) file transfer protocol with a level of complexity intermediate
between TFTP and FTP. It was never widely accepted on the Internet, and is now
assigned Historic status by the IETF. It runs through port 115, and often receives the
acronym of SFTP.
27
9.0 ISSUES RELATED TO THE APPLICATIONS
Issues regarding to FTP is cross-platform transfer for example for MAC system to PC
system and from PC system to MAC system whereas transferring data may cause loss of
format and unreadable text files. There is no compatibility between both systems whereas
both can’t receive files from other system than the one they recognize.
The second issue regarding FTP is speed. There is some FTP sites are faster or slower
than others and that at times the transfer will have variable transfer rates, meaning that
the speed of FTP isn’t uniform but different with each other. There are several reasons
for these variations; it is mainly have to do with the server. Transfer rate is affected by:
• The amount of bandwidth available between the server and the client site. A
• The number of users logged on to the server and transferring files. The more users
logged on and accessing files, the less bandwidth available for transfer.
• The amount of traffic on the Internet at the time of transfer. Even if we the only
one accessing a site, if the Internet is busy or slow, the transfer will also be slowed
down. Means that we also depending on the internet. It doesn’t matter how fast
our connection speed is but again it depending on how fast is the internet for that
day.
• How the data is routed across the Internet. Since packets are routed individually,
they may not be sent across the same route. Remember, packets are routed
through the fastest way the router can find at the time it receives the packet. This
28
means that one packet could be routed to you in two hops while the next one may
the receiver has no way to know if the received file is complete or not. This mechanism
has no detection or alarm system that practically tells the sender or receiver that there is
error in transferring data. It is important to manage this problem externally for example
The other issues concerning FTP are it is hard to filter the active mode of FTP
traffic on the client side by using a firewall since client must first open an arbitrary port to
receive the connection. Furthermore, It is possible to abuse the protocol's built-in proxy
For those who are using old type of FTP the major concern will be the security of
the data. An FTP server doesn’t have any special handling mechanisms for encrypted
communication of any kind. When clients login to FTP servers, they are sending a clear
text usernames and passwords and anyone who has “packet sniffer”1 between the client
and server could surreptitiously steal passwords. Besides passwords, attackers not only
able to steal username and password and monitor the entire conversation over the FTP,
but they also could monitor the contents of the data transfer themselves. Numerous
proposals has been wrote to enhanced this FTP protocol to more secure but there
proposals have not seen widespread adoption. Therefore, unless the IP protocol layer
itself is secure, FTP should not be used if sensitive login information is to be exchanged
1
A program or software that can track packet in network.
29
over an insecure network, or if the files containing sensitive material are being transferred
FTP will be enhanced in next future whereas the SSH Communications Security Corp. a
security has announced for the future, FTP or Enhanced File Transfer will be more secure
authentication for both interactive and unattended file transfers in multi platform system.
Other than that, FTP also will be upgraded whereby some features will be added in it
such as:
eliminating the need to modify existing scripted file transfers. Meaning that in
upgrading the FTP to SFTP, there is no need for users to uninstall and reinstall
of critical file transfers. It is said that this enhanced FTP will guaranteed deliver
files to server or vice versa and if the files were not completed send, an alarm
will tell them that there are some files haven’t been sent.
2
FTP-SFTP is abbreviation of File Transfer Protocol-Secure File Transfer Protocol.
30
• Integration with Microsoft Active Directory for role-based file transfer access
management.
• Pre and post processing rules for improved file transfer automation.
integration.
• Enhanced IBM z/OS file transfer operations including GUI client access to
native mainframe data sets, direct streaming file transfers, and mainframe
checkpoint-restart functionality.
existing infrastructure.
• Standards-based. Based on the SFTP of the IETF standard Secure Shell, SSH
networks.
31
• Light-weight. SSH Tectia simplifies enterprise file transfers by avoiding any
11.0 CONCLUSION
The fast developments of information technology made any resources are spread all over
the world. Peoples can get any resources from any where as long as they have a computer
and internet connection. The internet technology made it is easy for us to download files
from one site to our computer and we also can upload files form our computer to the
other site.
As being discussed in this research paper, the things that made files transfer
become easy over the internet network is the implements of FTP (File Transfer Protocol).
In the early age of file transmitting over internet, we only use e-mail attachment to
transferring files. However e-mail attachment has some limitation such as limit the types
of files and sizes of files we can transfer. Thus, to overcome such issues we use FTP. FTP
enabled us to transfer files without any limits of file types and size, which can not be
However, there are also other things that we need to consider regarding FTP
technology such as security and privilege of accessing other site. Some FTP sites may
provide public access, which means anyone can connect to the FTP site. But, there is also
some FTP which restricts us to access to FTP sites and needs us to have an accounts with
Besides, in this research paper also we have discussed the prospect for the
future of FTP whereas there are some other technologies of FTP to be implements. It is
32
aims to upgrade the current services offer by FTP to make transferring files become more
secure. In example are Enhanced File Transfer (EFT) and SFTP (Secure File Transfer
Protocol) which will focus especially in confidentiality, integrity, and authentication for
At the end, we hope this research paper will give a good explanation on how
FTP works, how it was used, and how the future FTP may help us in transmitting files
33
12.0 BIBLIOGRAPHIES AND REFERENCES
Book:
Gary P. Schneider and Jessica Evans. The Internet 2005 Update: 5th Edition.
Thomson: USA. 2006
H.M. Deitel, P.J Deitel and A.B Goldberg. Internet and World Wide Web: Third
Edition. Pearson: New Jersey. 2004
Internet:
http://www.zyra.org.uk/ftp.htm
http://www.freesoft.org/CIE/Topics/69.htm
http://en.wikipedia.org/wiki/Simple_File_Transfer_Protocol
http://en.wikipedia.org/wiki/Comparison_of_FTP_clients
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212964,00.html
http://whatis.techtarget.com/definition/0,,sid9_gci213976,00.html
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212839,00.html
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212964,00.html
http://en.wikipedia.org/wiki/List_of_all_FTP_server_return_codes
http://en.wikipedia.org/wiki/Simple_File_Transfer_Protocol
http://www.dynamicwebs.com.au/tutorials/ftp.htm
http://www.ssh.com/company/newsroom/article/725/
http://lxer.com/module/newswire/view/56078/index.html
http://www.faqs.org/rfcs/rfc959.html
http://www.imagescape.com/helpweb/ftp/ftp.html
http://www.dynamicwebs.com.au/tutorials/ftp.htm
34
http://docs.mandragor.org/files/RFCs/11xx/1123
http://www.more.net/technical/netserv/servers/ftp.html
35