1 / 22

File Transfer

File Transfer. BMW Team. Presents. FTP. SSH. WebDAV. How File Transfer over the Internet is managed.

davey
Download Presentation

File Transfer

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. FileTransfer BMW Team Presents FTP SSH WebDAV

  2. How File Transfer over the Internet is managed • Sometimes it is necessary to share large files with content from the Internet. Typically, in such cases, we have two options. One is to attach a file to an email and send it, but if it is too large, you can do it online for data storage and then.

  3. 1. Share bulky files by emailWith Gmail, you can not attach files to your emails that are larger than 25 MB. Hotmail is therefore a great alternative as it allows you to send emails up to 10 GB. The maximum size of a file you can attach to a Hotmail message is only 50MB, but you can use a service such as HJ-Split to split a large file into smaller chunks and then apply them all to a single message. Recipients can unify them and restore the original file without requiring external programs.

  4. 2.Share bulky files without emailThe drawback of an email with attachments is obvious - most Internet providers and web-based e-mail programs (including Gmail) will reject incoming messages with large attachments. Therefore, if you are sending bulky email files, recipients should also be Hotmail users to receive this file.A great opportunity to share large files without email is Dropbox. After installing the Dropbox utility on your computer (Windows, Mac or Linux), you can upload files of almost any size on the Internet. There is a limit on the Dropbox storage size limit, which is 2GB if you use the free service. Alternatively, if you do not want to install Dropbox, you can upload files directly to the Dropbox site from your browser, but the limit in this case is 300 MB per file. Another possibility to share large files over the Internet is Google Docs. Google Docs allows you to upload files up to 250 MB in size and no form restrictions. You have 1 GB of free disk space for storing all files, but you can buy more space for a reasonable price. Unlike FTP servers, services such as Google Docs and Dropbox do not support downloading if the connection collapses. And this can be quite annoying if the recipient is still trying to download "huge" files, he or she will have to resume the download from scratch.A third way to share large files over the Internet is Windows Live SkyDrive. The service offers 25 GB of free online storage, the limit for individual files is up to 50 MB. To upload a large file, it is divided into parts of 50 MB and then uploaded to a folder in SkyDrive. The recipient can download the entire folder as a ZIP file, or if the connection is not good, download the files one at a time and merge them from the end.

  5. File Transfer Protocol The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network. FTP is built on a client-server model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP). The first FTP client applications were command-line programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.

  6. Distribution evolved • A distributed file system (DFS) is a file system with data stored on a server. The data is accessed and processed as if it was stored on the local client machine. The DFS makes it convenient to share information and files among users on a network in a controlled and authorized way. The server allows the client users to share files and store data just like they are storing the information locally. However, the servers have full control over the data and give access control to the clients. There has been exceptional growth in network-based computing recently and client/server-based applications have brought revolutions in this area. Sharing storage resources and information on the network is one of the key elements in both local area networks (LANs) and wide area networks (WANs). Different technologies have been developed to bring convenience to sharing resources and files on a network; a distributed file system is one of the processes used regularly.

  7. One process involved in implementing the DFS is giving access control and storage management controls to the client system in a centralized way, managed by the servers. Transparency is one of the core processes in DFS, so files are accessed, stored, and managed on the local client machines while the process itself is actually held on the servers. This transparency brings convenience to the end user on a client machine because the network file system efficiently manages all the processes. Generally, a DFS is used in a LAN, but it can be used in a WAN or over the Internet.

  8. A DFS allows efficient and well-managed data and storage sharing options on a network compared to other options. Another option for users in network-based computing is a shared disk file system. A shared disk file system puts the access control on the client’s systems so the data is inaccessible when the client system goes offline. DFS is fault-tolerant and the data is accessible even if some of the network nodes are offline. • A DFS makes it possible to restrict access to the file system depending on access lists or capabilities on both the servers and the clients, depending on how the protocol is designed.

  9. FTP Programs on the server's side • The FTP service is TCP-based and adopts the server-client model. We have already examined the FTP programs that work on the client's side and offer us FTP access. Now we will take a look at the server's side, which actually provides the service to the clients. • The most important component on the server's side is the FTP server software. This is an FTP program which runs as a system service and allows connections to shared files and folders. Also, this FTP program allows the server administrator to set different FTP accounts, which have access to all or to only a part of the shared content.

  10. Another FTP program which runs on the server’s side is the FTP Proxy. Actually, the FTP Proxy is not a binding component of the FTP host server setup, but is a great secure improvement. It is nearly impossible to set up a really secure FTP server only by taking full advantage of all security features supported by your FTP server application. No matter whether you use a commercial product or free FTP software, there are vulnerabilities that may come to light and that can expose your FTP server to attack. In order to secure your FTP connection and to ensure your server, you can run an FTP proxy on your firewall. The FTP proxy will let your firewall act as an intermediary in all FTP transactions. This will increase your protection against buffer overflows and many other kinds of FTP attacks. It also allows you to restrict the FTP commands executed by the FTP clients.

  11. FTP Programs on the client's side • To take advantage of all the benefits provided by the FTP technology the users are recommended to use dedicated FTP programs, which are named 'FTP clients' in the language of the Internet. FTP services are also offered by some of the modern web browsers like Mozilla Firefox, Opera, Safari and Internet Explorer, which makes them FTP programs too. • With an FTP program at hand, users can publish their web pages online, or download various data from the Internet by opening secure FTP connections between their computers and the servers where the uploaded/downloaded information is located. The majority of FTP programs available online offer quick and secure FTP transfer of users' files and are much preferred over browsers like Internet Explorer, Netscape, etc., which lack their capacity, stability and rich set of additional features. On the other hand, the Opera and Firefox browsers provide very stable and powerful FTP tools. Some of them are embedded in the browsers and offer only the basic features, while others are available as third-party add-ons and integrate feature-rich FTP clients in the browsers.

  12. Ports are used to transfer files • SFTP (SSH File Transfer Protocol) is a network protocol that provides file transfer and manipulation functionality over any reliable data stream. It is typically used with the SSH-2 protocol (TCP port 22) to provide secure file transfer but is also intended to be usable with other protocols. • SFTP typically uses port 22 but can be configured to run on almost any port. • Port 22 is generally used for connection via SSH. SFTP is just one of the protocols that can be run over SSH (others include virtual terminal). In fact, SFTP is independent and can be run even without SSH. • SFTP is sometimes called "Secure FTP" which leads to a common confusion with FTPS (which is called "Secure FTP" too).

  13. Generally: • SFTP - SSH File Transfer Protocol - usually runs over TCP port 22 • FTP - plain, old file transfer protocol - usually runns over TCP port 21 (+ opens separate ports for data transfer) • FTP / SSL - FTP over TLS / SSL channel. • FTPS - same as FTP / SSL • Secure FTP - either SFTP or FTPS

  14. Secured file transfer • The term secured file transfer protocol or secured FTP may refer to: • Network protocols • SSH File Transfer Protocol — a file transfer protocol specifically developed by the IETF to run over secure shell connections • FTP over SSH, also known as "secure FTP" — the practice of using SSH to tunnel the older, well-known File Transfer Protocol (FTP) • Computer programs • Secure file transfer program, usually known as "sftp" — a well-known command-line program, common in Unix, for using SSH File Transfer Protocol • Secure FTP (software) — a software package, by Glub Tech, for using FTPS (traditional FTP over SSL/TLS)

  15. What is Cloud-Storage • Cloud storage is a model of computer data storage in which the digital data is stored in logical pools. The physical storage spans multiple servers (sometimes in multiple locations), and the physical environment is typically owned and managed by a hosting company. These cloud storage providers are responsible for keeping the data available and accessible, and the physical environment protected and running. People and organizations buy or lease storage capacity from the providers to store user, organization, or application data. • Cloud storage services may be accessed through a colocated cloud computing service, a web service application programming interface (API) or by applications that utilize the API, such as cloud desktop storage, a cloud storage gateway or Web-based content management systems.

  16. Who offers Cloud storage • Data storage (or cloud storage) is a data storage model that records logistics data as well as data storage for multiple servers (and often locations) of ownership and is managed by a hosting company. These storage vendors are responsible for data maintenance - they must be made available and accessible. . • You can access the service using interconnected cloud computing services, API, or API applications, such as data storage and services. content management systems. • All data, such as photos, files, music, documents, movies, and more, can be stored in the online repository. Also, cloud users have access to all files from different devices: a desktop computer, a laptop, a tablet, or a mobile phone. To reach value and enable sharing with others, you need to consult the internet. • Included are such Internet services as Dropbox, OneDrive, Google Drive, iCloud, Janex.Disk.

  17. Cloud storage prices • Google Drive • 15GB- Free • 100GB- $1.99 per month • 1TB- $9.99 per month • Dropbox • 2GB- Free • Up to 16GB- Free, if you refer a bunch of friends. With a basic free account, you get an extra 500MB per referral and you can earn up to 16GB total through this method. It works the same for paid users, but you get 1GB instead of 500MB per referral. • iCloud • 5GB- Free • 20GB- $0.99 per month • 200GB- $3.99 per month • OneDrive • 15GB- Free • 100GB- $1.99 per month • 200GB- $3.99 per month

  18. Cloud storage risks • Data is stored in many places that increase the risk of unauthorized physical access to them. For example, in a cloud-based architecture, data is copied and shifted frequently, taking advantage of the recovery of this information. (eg destruction of old equipment, processing of the hard drive) is performed by the selected inspection depending on the level of service that is selected by the service provider, which is required before it is uploaded to the cloud. If there is such access to data and which could be compromised by efficiency gains or other methods, it increases dramatically. A single copany with a small team of administrators, network engineers and technicians, but one company offers data storage for many customers and thousands of servers that have a very large team of technical professionals with physical and electronic access to almost all of the territory containing go to the relevant site or to the enterprise information. Encryption keywords stored at the request of the user of the provider. Given that there is plenty of information from multiple users in a given area, a large number of key limits for further user partitioning, full protection of personal data, it is also necessary to make sure that service devices are respected. You may also keep the hold of these keywords.

  19. To overcome this, a Key-Aggregate Cryptosystem can be used. • The ability to use the network is increased. Taking into account a local area network (LAN) or a storage network (SAN), using a WAN. • By sharing disk space and many other users / customers, it is possible to look for the same customers to gain access to information from other clients, errors, unknown techniques, software, and non-compliance. Risks are required for the release of all types of data storage, which are not limited to these values. It can be overcome by encryption. Encryption of information can also be protected as far as it is on the cloud.

  20. Files transferred “into the cloud” • The obvious solution for getting your data to the cloud is to upload your data from your internal network through the internet to the cloud storage vendor you’ve selected. Cloud storage vendors don’t charge you for uploading your data to their cloud, but you, of course, have to pay your network provider and that’s where things start to get interesting. Here are a few things to consider. The initial upload: Unless you are just starting out, you will have a large amount of data you want to upload to the cloud. This could be data you wish to archive or have had archived previously, for example data stored on LTO tapes or kept stored on external hard drives. Pipe size: This is the amount of upload bandwidth of your network connection. This is measured in Mbps (megabits per second). Remember, your data is stored in MB (megabytes), so an upload connection of 80 Mbps will transfer no more than 10 MB of data per second and most likely a lot less.

  21. Cost and caps: In some places, organizations pay a flat monthly rate for a specified level of service (speed) for internet access. In other locations, internet access is metered, or pay as you go. In either case, there can be internet service caps that limit or completely stop data transfer once you reach your contracted threshold. One or more of these challenges has the potential to make the initial upload of your data expensive and potentially impossible. You could wait until cloud storage companies start buying up internet providers and make data upload cheap (or free with Amazon Prime!), but there is another option.

  22. Thanks for watching • Prepared KameliaAsenova KrisLazarov Ivalin Ivanov Martin Cvetanov

More Related