Computing Essentials Esaimen
Computing Essentials Esaimen
Computing Essentials Esaimen
Page 1
Content
Page Number Content
Page 3-4
Page 5-7
Page 8-9
Reference
Page 2
APPLICATION OF FILE TRANSFER PROTOCOL (FTP) AND TELNET IN REAL LIFE o Both of these applications allow two different computers to communicate with each other. o Allows the user to log on to an account on a remote computer and work as if you were there. o This is useful if you are traveling or are going to be away from your own computer and your local account but need to have access to the latter. o You might be at a conference in another state and suddenly remember that you need some information that is stored on a file in your account back at your home institution. You can log on remotely, telnet to your account, get into your files that are on that server, and retrieve the information. Example: Lets say you are at International Islamic University Malaysia (IIUM) and you are supposed to meet some people but you forgot the time and place. They sent you this information in an email message, and you have that message in your account on the server at your institution. If you can use a computer with Internet access where you are, you can telnet to your account, and call up the message, and read the information off the screen.
o FTP is used when you need to move files from one computer to another, whether it is between the computer at the office or school and home or even from computer in another city. o FTP client and server are required in order to do this. o To move your files, you need to have accounts on both computers.
Page 3
o FTP can help you out in circumstances when you are away from your computer and account but need to move files back and forth between the two. Example: you are still at IIUM and are preparing for your presentation tomorrow. You discover that you left several handouts at home, but you know you also have them in a file in your account there. You gain access to a local computer, telnet to your account and find the files. Telneting to your account will let you see the files, but it will not let you get them. You need to FTP the files to the computer where you are.
o You can print out your handouts for your presentation the next day. If your handouts include graphics or something other than text, you can still FTP them. Just pay attention to the transfer mode settings : Ascii Binary
Page 4
FILE TRANSFER PROTOCOL (FTP) o No Software Installation FTP requires both parties to install, configure and operate special client software to transfer files. On the other hand, users can access JustAttach simply by using any Java-enabled web browser. o Ease of Use Because FTP sites are difficult for business users to use, they need training and technical support to use this tool effectively. JustAttach comes with a simple, intuitive web browser interface that makes it easy for even first-time users to transfer files.
o No Firewall Configuration For FTP to work, corporate firewalls need to be configured to allow certain ports and protocols. JustAttach uses standard HTTPS over port 443, which works just fine with your existing firewall policy.
o Out-of-Box Security Standard FTP is insecure because it transfers data in plain text. Securing FTP involves significant effort in configuring the FTP server, adjusting firewall policies, deploying connection profiles to internal and external users, and handling support issues.
Page 5
TELNET o Accessing Remote Computers Allows remote access to someone else's computer. It provides you with the ability to access the computer's data through a text-based interface. Instead of traveling to another location to look at a remote machine, you can view it from the comfort of your home or office. This is helpful when walking someone through a complex process.
o Saves Time Save you a substantial amount of time. Instead of physically traveling to another person's home, you can perform any task on his or her computer almost immediately. If you are trying to explain a computer process over the phone, it may prove much easier and faster to take care of it yourself. By using Telnet, you don't need to spend time explaining detailed steps to someone else.
o Easy to Use Offers advantage of simple operation. You just need to download a basic computer program to your hard drive. You also need to know the Internet protocol (IP) address of the computer you want to access and have a reliable Internet connection. Open the Telnet application and establish a connection between your computer and the computer you want to access. When opened, Telnet looks like a simple text box and cannot be used with a mouse.
NURUL ALIAH SYAHIDAH (05DIP13F2018) Page 6
You simply type in commands you want to run on the other computer. Although the mouse is not available, you should be able to accomplish everything with the proper commands.
o Universal Can be use on any computer. You do not need special software for a Mac as opposed to a PC. This makes it easy to implement regardless of the operating system you're running, and means anyone can utilize Telnet to access other computers. Even older systems can connect to newer machines with different operating system versions.
Page 7
Telnet
Its only concern is to facilitate the transfer of files from one point to another, along with a few management capabilities like making and deleting directories.
Telnet is a bit more like a jack of all trades, as it is simply a connection protocol that allows a user to connect to a remote server that is listening for Telnet commands. Once the connection is established, the user can then issue commands to the server computer, and examine the responses that are sent back.
It keeps all the commands invisible to the user, thereby lessening the learning curve.
A wide range of commands and parameters that can be issued to the server.
People can now use secure versions of FTP, called FTPS and SFTP.
Telnet has been largely replaced by SSH, due to the addition of security measures. As Telnet has been superseded by SSH, making it secure seems redundant.
FTP is still in wide use, as it is an easy way to upload files to web servers. Theres a wide array of applications that use FTP to achieve their purpose. The use of Telnet has been dwindling since the creation of SSH, but there are still people who use it mainly as a diagnostic tool.
Telnet provides a good view of how certain network services work, by sending commands and examining the response to determine if it is proper or not.
Page 8
Telnet
FTP can be used with a command line, a dedicated application, and even with most web browsers.
FTP is a well-known and reliable method of Telnet is now commonly used in uploading files to web servers. diagnosing network services.
Page 9
Requirements for using FTP o An FTP client like Auto FTP Manager installed on your computer o Certain information about the FTP server you want to connect to: The FTP server address. This looks a lot like the addresses you type to browse web sites. Example : Server address is "ftp.videodesk.net". Sometimes the server address will be given as a numeric address, like "64.185.225.87". A user name and password. Some FTP servers let you connect to them anonymously. For anonymous connections, you do not need a user name and password. o To transfer files, provide your client software (Auto FTP Manager) with the server address, user name, and password. o After connecting to the FTP server, you can use Auto FTP Manager's File Manager to upload, download and delete files. o Using the File Manager is a lot like working with Windows Explorer.
Page 10
Requirements for using Telnet o In telnet terminology, your computer is called the LOCAL computer. The other computer, the one to which your telnet client connects, is called the REMOTE computer. o In general, there are two ways to use telnet. First, you can connect to any computer on the Internet for which you have a shell account. When you do, you will see the standard login: and password: prompts. You can now log in and use the computer in the usual manner. Second, there are many public resources which you can access via telnet. Some of these do not require a password. As soon as your telnet client makes the connection, you can start working with the remote computer. Many public library catalogs are set up in this manner.
o Other public services do require passwords. o The first time you connect to one of these systems, you will be asked to choose a user name and password. o From then on, you would log in using whatever name and password you have chosen.
o Using a telnet client program is relatively simple. All you do is start the program, tell it the name of the remote host to which you want to connect. o Once the connection with the host is established, you will see whatever message that computer displays as part of the starting procedure. o If you connect to a UNIX computer which expects you to log in, it will start by displaying the line: o login: Type in the appropriate user name and press ENTER. You will then see the line: password: Type in the password and press ENTER. You will now be logged in. Once your telnet client starts, there is nothing special to remember or do. Just log in to the remote computer and start work. o Within the Internet, many of the hosts offering telnet access to public services require you to specify a specific PORT NUMBER when you make the connection. o The port number identifies the type of service that you are requesting. The term PORT refers to a connection between two devices or systems.
Page 11
REFERENCES
Page 12