Sunteți pe pagina 1din 24

File Transfer Protocol

File Transfer Protocol (FTP) – is a standard network


protocol used for transfer of computer files between a
client and server on a computer network.
FTP is built on a client-server model architecture
separate control and data connections between
the client and the server.
FTP users may authenticate themselves with a
clear-text sign-in protocol, normally in the form
of a username and password, but can connect
anonymously if the server is configured to allow
it.
For secure transmission that protects the
username and password, and encrypts the
content, FTP is often secured with SSL/TLS
(FTPS) or replaced with SSH File Transfer
Protocol (SFTP).
File Zilla
Parts of File Zilla
1) Toolbar
2) Quick connect bar
3) Message Log
4) Local Pane
5) Remote Pane
6) Transfer Queue
Hypertext Transfer Protocol
Hypertext Transfer Protocol(HTTP) - is an application
protocol for distributed, collaborative, and hypermedia
information systems. HTTP is the foundation of data
communication for the World Wide Web.

Hypertext is structured text that uses logical links


(hyperlinks) between nodes containing text. HTTP is the
protocol to exchange or transfer hypertext.
How HTTP works?
• HTTP is a request response protocol to communicate
asynchrnously between client and server. Mostly in
HTTP a browser acts as a client and a web-server like
Apache or IIS acts as server. The server which hosts
the files (like html , audio , video files etc) responses
to the client. Depending on the request a response
contains the status of the request.
HTTP means HyperText Transfer Protocol.

• HTTP is the underlying protocol used by the World Wide Web


and this protocol defines how messages are formatted and
transmitted, and what actions Web servers and browsers
should take in response to various commands.

• For example, when you enter a URL in your browser, this


actually sends an HTTP command to the Web server directing
it to fetch and transmit the requested Web page. The other
main standard that controls how the World Wide Web works
is HTML, which covers how Web pages are formatted and
displayed.
• Hypertext Transfer Protocol (HTTP) is an application-
layer protocol for transmitting hypermedia documents, such
as HTML. It was designed for communication between web
browsers and web servers, but it can also be used for other
purposes. HTTP follows a classical client-server model, with a
client opening a connection to make a request, then waiting
until it receives a response. HTTP is a stateless protocol,
meaning that the server does not keep any data (state)
between two requests. Though often based on a TCP/IP layer,
it can be used on any reliable transport layer; that is, a
protocol that doesn't lose messages silently, such as UDP.
HTTP VS HTTPS
• Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of
HTTP, the protocol over which data is sent between your browser
and the website that you are connected to. The 'S' at the end of
HTTPS stands for 'Secure'. It means all communications between
your browser and the website are encrypted.

• HTTPS is often used to protect highly confidential online


transactions like online banking and online shopping order forms.
• Web browsers such as Internet Explorer, Firefox and Chrome also
display a padlock icon in the address bar to visually indicate that a
HTTPS connection is in effect.
HTTP vs HTTPS
How Does HTTPS Work?
• HTTPS pages typically use one of two secure protocols to encrypt communications
- SSL (Secure Sockets Layer) or TLS (Transport Layer Security). Both the TLS and SSL
protocols use what is known as an 'asymmetric' Public Key Infrastructure (PKI)
system. An asymmetric system uses two 'keys' to encrypt communications, a
'public' key and a 'private' key. Anything encrypted with the public key can only be
decrypted by the private key and vice-versa.

• As the names suggest, the 'private' key should be kept strictly protected and
should only be accessible the owner of the private key. In the case of a website,
the private key remains securely ensconced on the web server. Conversely, the
public key is intended to be distributed to anybody and everybody that needs to be
able to decrypt information that was encrypted with the private key.
What is a HTTPS certificate?
• When you request a HTTPS connection to a webpage, the website
will initially send its SSL certificate to your browser. This certificate
contains the public key needed to begin the secure session. Based
on this initial exchange, your browser and the website then initiate
the 'SSL handshake'. The SSL handshake involves the generation of
shared secrets to establish a uniquely secure connection between
yourself and the website.
• When a trusted SSL Digital Certificate is used during a HTTPS
connection, users will see a padlock icon in the browser address bar.
When an Extended Validation Certificate is installed on a web site,
the address bar will turn green.
Why Is an SSL Certificate Required?

• All communications sent over regular HTTP connections are in


'plain text' and can be read by any hacker that manages to
break into the connection between your browser and the
website. This presents a clear danger if the 'communication' is
on an order form and includes your credit card details or
social security number. With a HTTPS connection, all
communications are securely encrypted. This means that even
if somebody managed to break into the connection, they
would not be able decrypt any of the data which passes
between you and the website.
Benefits of Hypertext Transfer Protocol Secure

• The major benefits of a HTTPS certificate are:


• Customer information, like credit card numbers, is
encrypted and cannot be intercepted

• Visitors can verify you are a registered business and


that you own the domain
• Customers are more likely to trust and complete
purchases from sites that use HTTPS
HTTP and HTTPS: What do they do,
and how are they different?

• You click to check out at an online merchant. Suddenly


your browser address bar says HTTPS instead of HTTP.
What's going on? Is your credit card information safe?
• Good news. Your information is safe. The website you are
working with has made sure that no one can steal your
information.
• Instead of HyperText Transfer Protocol (HTTP), this
website uses HyperText Transfer Protocol Secure
(HTTPS).
• Using HTTPS, the computers agree on a "code" between
them, and then they scramble the messages using that "code"
so that no one in between can read them. This keeps your
information safe from hackers.

• They use the "code" on a Secure Sockets Layer (SSL),


sometimes called Transport Layer Security (TLS) to send the
information back and forth.
• How does HTTP work? How is HTTPS different from HTTP?
This tutorial will teach you about SSL, HTTP and HTTPS.
• HTTP is a Stateless Protocol

• HTTP is called a stateless protocol because each


command is executed independently, without any
knowledge of the commands that came before it. This is
the main reason that it is difficult to implement Web sites
that react intelligently to user input. This shortcoming of
HTTP is being addressed in a number of new
technologies, including ActiveX, Java, JavaScript and
cookies.
Dynamic Host Control Protocol
Dynamic Host Configuration Protocol (DHCP)is a network
management protocol used on UDP/IP networks whereby a
DHCP server dynamically assigns an IP address and other
network configuration parameters to each device on a
network so they can communicate with other IP networks.
A DHCP server enables computers to request IP addresses
and networking parameters automatically from the Internet
service provider (ISP), reducing the need for a network
administrator or a user to manually assign IP addresses to
all network devices.[
Next
Dynamic Host Control Protocol
Dynamic Host Configuration Protocol (DHCP)is a network
management protocol used on UDP/IP networks whereby a
DHCP server dynamically assigns an IP address and other
network configuration parameters to each device on a
network so they can communicate with other IP networks.
A DHCP server enables computers to request IP addresses
and networking parameters automatically from the Internet
service provider (ISP), reducing the need for a network
administrator or a user to manually assign IP addresses to
all network devices.[
Next
Application Protocol

An application layer is an abstraction layer that


specifies the shared communications protocols and
interface methods used by hosts in a communications
network.

Go Back
World Wide Web (WWW)
The World Wide Web (WWW), also called the Web, is an information space where
documents and other web resources are identified by Uniform Resource Locators
(URLs), interlinked by hypertext links, and accessible via the Internet. English scientist
Tim Berners-Lee invented the World Wide Web in 1989. He wrote the first web
browser in 1990 while employed at CERN (European Organization for Nuclear
Research) in Switzerland. The browser was released outside CERN in 1991, first to
other research institutions starting in January 1991 and to the general public on the
Internet in August 1991.

The World Wide Web has been central to the development of the Information Age and
is the primary tool billions of people use to interact on the Internet. Web pages are
primarily text documents formatted and annotated with Hypertext Markup Language
(HTML). In addition to formatted text, web pages may contain images, video, audio,
and software components that are rendered in the user's web browser as coherent
pages of multimedia content.
Go Back
Network Management Protocol

In telecommunication, a communication protocol is a


system of rules that allow two or more entities of a
communications system to transmit information via any
kind of variation of a physical quantity.

Go Back
Go Back

S-ar putea să vă placă și