*To upload any file or folder on the FTP server, you can copy a file or a folder from your computer and paste it to folder in the FTP server

*To download a fie or a folder, copy it from the FTP server's folder and paste it into your computer's folder. O • completed, simply close the FTP server's window.

OTHER FILE TRANSFER PROTOCOLS

SSH (SECURE SOCKET SHELL) PROTOCOL

Data protection is an integral part of any networksystem. In a client server architecture, SSH protocol, also known as Secure Socket Shell Protocol, is predominantly used for securing data over an unsecured network. It establishes a secure connection between the client and the host computer through remote command execution for transferring data over a network. It transfers files over a network by using the services of other associated security protocols like SFTP and SCP. SSH was designed as a replacement for Telnet and remote shell protocols. These protocols did not use any cryptographic techniques for data transfer and hence were not secured.
The functionally of SSH is similar to sending packets through a rellable courier service which is good at logistics and ensures safe delivery of goods without any delay or damage.

Importance of SSH Protocal

The SSH protocal protects data in the following ways.

• Before transferring data between the client and the host computer, the SSH calls upon the SFTP (Secure File Transfer Protocol) to authenticate both the server and the client machine.

• Once the authentication process gets over the SFTP protocol works on to set a secure channel between the client and the host computer by establishing a secure connection and then only the data transmission is initiated.

• SETP protects the integrity of the data using encryption and cryptographic and cryptographic hash function techniques.

SCP(SECURE COPY PROTOCOL)

In a network protocols play a significant role in transferring data and in maintaining the confidentiality of data. S0 Secure Caprl is one such protocol that helps in moving files between two connected machines over a network in a encrypted form.

The SCP alang with SSt protocol ensures the authenticity and confidentiality of the data over an unsecured network. T SCP protocol uses services offered by Secure Shell (SSH) for data transfer and use the same mechanisms used by SSH authentication.

SFTP(SECURE FILE TRANSFER PROTOCOL)

Both FIP and SFTP allow files and data transfer over a secured network. In spite of this similarity, the SFTP stands and from the FP in terms of data security. The FTP sends data and commands over a network in text form, even impor credentials like utername and password are sent in text form, leaving data vulnerable and unsecured. The SFTP ench the data in a binary from, thereby making it secure and also prevents unauthorised access during operation. Since it data sent by SFTP in binary form and hence, as compared to FTP (test data), the data travels at a faster rate.



Learning Computers with Kips
42