File Transfer And Access Chapter 26 Chapter 26 Group 3 Presentation Deepak Mittal Nishit Ranjan Venugopal Janapati Amit Palshikar Ref: Internetworking.

Slides:



Advertisements
Similar presentations
TCP/IP MODEL Maninder Kaur
Advertisements

CCNA – Network Fundamentals
Intermediate TCP/IP TCP Operation.
Chapter 7: Transport Layer
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking Assist. Prof.
Lecture 7 Transport Layer
Slide 1 Client / Server Paradigm. Slide 2 Outline: Client / Server Paradigm Client / Server Model of Interaction Server Design Issues C/ S Points of Interaction.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
COS 420 DAY 25. Agenda Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due May 10 Latest version of Protocol.
Networking Theory (part 2). Internet Architecture The Internet is a worldwide collection of smaller networks that share a common suite of communication.
Protocols and the TCP/IP Suite
File Transfer: FTP and TFTP
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
NFS. The Sun Network File System (NFS) An implementation and a specification of a software system for accessing remote files across LANs. The implementation.
File Transfer Protocol (FTP)
File Systems (2). Readings r Silbershatz et al: 11.8.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Chapter 26 Client Server Interaction Communication across a computer network requires a pair of application programs to cooperate. One application on one.
Chapter 31 File Transfer & Remote File Access (NFS)
What Can IP Do? Deliver datagrams to hosts – The IP address in a datagram header identify a host IP treats a computer as an endpoint of communication Best.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Process-to-Process Delivery:
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
INTRODUCTION TO WEB DATABASE PROGRAMMING
1 Chapter Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
File Transfer & Access (FTP, TFTP, NFS)
1 Chapter Client-Server Interaction. 2 Functionality  Transport layer and layers below  Basic communication  Reliability  Application layer.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
1 Version 3.0 Module 11 TCP Application and Transport.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
University of the Western Cape Chapter 12: The Transport Layer.
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)
TCP/IP Transport and Application (Topic 6)
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.5 Internetworking Chapter 25 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
Lesson 25 - (1 of 37) FTP, TFTP, and NFS LESSON 25 (December 1, 1995) Daniel Z. Tabor Jr. New Jersey Institute of Technology.
The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, , WWW) Reliable Stream Transport (TCP) Connectionless Packet Delivery.
User Datagram Protocol (UDP) Chapter 11. Know TCP/IP transfers datagrams around Forwarded based on destination’s IP address Forwarded based on destination’s.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
TFTP: Trivial file transfer protocol
1 Chapter 34 Internet Applications (Telnet, FTP).
Client-Server Model of Interaction Chapter 20. We have looked at the details of TCP/IP Protocols Protocols Router architecture Router architecture Now.
TCP/IP Protocol Suite 1 Chapter 19 Upon completion you will be able to: File Transfer: FTP and TFTP Understand the connections needed for FTP file transfer.
1 Client-Server Interaction. 2 Functionality Transport layer and layers below –Basic communication –Reliability Application layer –Abstractions Files.
Chapter 27 - Faxes & File Transfer (FTP) Introduction Sending a Fax –The Internet can be used to send a fax. Two fax machines can be modified to communicate.
Chapter 16 Protocols and Layering. Network Communication Protocol an agreement that specifies the format and meaning of messages computers exchange Network.
Lecture 4 Mechanisms & Kernel for NOSs. Mechanisms for Network Operating Systems  Network operating systems provide three basic mechanisms that support.
Reading TCP/IP Protocol. Training target: Read the following reading materials and use the reading skills mentioned in the passages above. You may also.
Protocol Layering Chapter 11.
File Transfer And Access (FTP, TFTP, NFS). Remote File Access, Transfer and Storage Networks For different goals variety of approaches to remote file.
Internet and Intranet Protocols and Applications Lecture 6 Application Protocols: Telnet, FTP February 27, 2002 Joseph Conron Computer Science Department.
UDP: User Datagram Protocol Chapter 12. Introduction Multiple application programs can execute simultaneously on a given computer and can send and receive.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Distributed Computing & Embedded Systems Chapter 4: Remote Method Invocation Dr. Umair Ali Khan.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
1 Chapter 24 Internetworking Part 4 (Transport Protocols, UDP and TCP, Protocol Port Numbers)
Chapter 7: Transport Layer
Module 4 Remote Login.
Layered Architectures
FTP & TFTP Server Ferry Astika Saputra.
File Transfer and access
CCNA 2 v3.1 Module 10 Intermediate TCP/IP
Process-to-Process Delivery:
Process-to-Process Delivery: UDP, TCP
Internet Applications (Telnet, FTP)
Presentation transcript:

File Transfer And Access Chapter 26 Chapter 26 Group 3 Presentation Deepak Mittal Nishit Ranjan Venugopal Janapati Amit Palshikar Ref: Internetworking with TCP/IP by D.E.Comer by D.E.Comer

Introduction FILE TRANSFER & FILE ACCESS are parts of TCP/IP suite. In this chapter -- Design and User Interface for these application protocols.

Designs for File Access and Transfer To lower overall cost - use - 'centralized file server' -- Users have inexpensive computers with no disk space, e.g.. hand-held devices, diskless computers.  To lower overall cost - use - 'centralized file server' -- Users have inexpensive computers with no disk space, e.g.. hand-held devices, diskless computers.  To archive data (backup facility) -- use -- 'centralized computer' - users have computers with disk storage. Users send periodically, copies of files to the backup computer. -- to recover files in case of loss at local computer.  Ability to share data across different programs, users, sites -- to share data of a single on-line database across organization.

On-line Shared Access file sharing : 2 types - 1. on-line access -- allowing multiple programs to access a single file concurrently. Changes to the file take immediate effect and available to all programs that access the file. 2. whole-file copying -- a program gets only a local copy of the file, when accessed. If the program wants to modify, it makes changes and transfers the copy of the file to the original site.

Online File Access & problems -- on-line file sharing does not require a client program as a database system does. a database system does. The operating system takes care of the remote file access The operating system takes care of the remote file access as for local files. Which means the remote file system is as for local files. Which means the remote file system is 'integrated' with local files and the file system provides 'integrated' with local files and the file system provides 'transparent access' to the remote files. 'transparent access' to the remote files.Problems: 1. If the remote machine is not working or the network is down or during network congestion the program on down or during network congestion the program on the local machine does not work even though the the local machine does not work even though the machine is working. The application becomes unreliable. machine is working. The application becomes unreliable.

Online File Access & problems Implementing transparent file access is difficult. -- This is because of heterogeneous environment file names available on one computer may not map into names available on one computer may not map into file namespace of another. file namespace of another. -- ownership, authorization, protection will be difficult to handle. handle. -- file operations and file representations vary from machine to machine and so difficult to implement all machine to machine and so difficult to implement all operations on all files operations on all files

Whole-file Sharing by file transfer Whole-file Sharing by file transfer -- user uses a client program to obtain a copy of the file and operate on it. and operate on it. -- operation outside the file system. -- user provides location of the file and authentication to the client program which contacts the remote machine the client program which contacts the remote machine to request a copy of the file. to request a copy of the file. -- the remote sends the copy of the file -- user terminates the client program -- an application program is used to open the file. -- many computations run faster with whole-file on the local machine than remote file access. local machine than remote file access.

Whole-file sharing by file transfer and problems Whole-file transfer between heterogeneous machines can be difficult. -- Client and server have to agree on authorizations/ permissions and data formats. permissions and data formats. -- Different data formats make inverse translations impossible. impossible. e.g.: A and B machines use different presentations for floating point numbers, text files. floating point numbers, text files. floating point numbers -- it is impossible to convert floating point numbers -- it is impossible to convert format without losing some precision. format without losing some precision. text-- Variable-length lines in one system and fixed line lengths in another system - when file is copied to lengths in another system - when file is copied to and from cause padding and lose the originality. and from cause padding and lose the originality. -- Problems like the above can be handled by FTP.

FTP - The major TCP/IP file transfer protocol FTP is the most frequently used of TCP/IP applications. Earlier forms of FTP existed for ARPANET before TCP/IP. Features:  Handles authorization, naming, representation among among heterogeneous machines. heterogeneous machines.  Interactive access: provides user-friendly interface with 'help'. with 'help'.  Format representation/specification: user can  specify format of the data in the remote file -- text or binary etc. -- text or binary etc. -- whether text files use ASCII character set etc. -- whether text files use ASCII character set etc.  Authentication control: user has to supply name/password to the server to request a file. name/password to the server to request a file.

FTP - Process Model Most FTP servers allow concurrent access by several clients. Clients use TCP to connect to server. - master process awaits connections - master process awaits connections - creates a slave process to handle each connection - creates a slave process to handle each connection - slave process accepts requests through this - slave process accepts requests through this "control connection". "control connection". - client’s control process and server's(slave) control - client’s control process and server's(slave) control process communicate using this connection. process communicate using this connection. - slave then creates another connection to transfer - slave then creates another connection to transfer data - This is "data transfer connection". data - This is "data transfer connection". - The data transfer process on server (slave) and - The data transfer process on server (slave) and client communicate through this connection. client communicate through this connection. Refer: Fig 26.1 shows FTP connection between client and server using TCP. using TCP.

FTP - Process Model… On client side Control process uses control connection to request the data file. The data transfer process uses data transfer connection to receive the data. -- TCP is used in both connections on client and server side. Control connection is alive as long as user keeps side. Control connection is alive as long as user keeps FTP session open. FTP session open. -- FTP starts a new data transfer connection for each file transfer. transfer. -- In most cases, data transfer connection and data transfer process are created whenever server needs transfer process are created whenever server needs to send information to client. to send information to client. -- When session is ended by client control connection, data transfer connection and the corresponding data transfer connection and the corresponding processes terminate. processes terminate.

TCP port number assignment When does the control process create new TCP connection for data transfer and what port is used ??? -- Client obtains an unused port on its machine to make connection with data transfer process on the server. connection with data transfer process on the server. -- It creates transfer process on the client machine to listen at that port listen at that port -- Communicates the port number to the server over the control connection and then waits for the server to control connection and then waits for the server to establish a TCP connection to the port. establish a TCP connection to the port. -- The data transfer process on the server uses well- known port reserved for FTP data transfer --port 20. known port reserved for FTP data transfer --port When the server issues TCP ‘active open’ request it specifies the port that will be used on the client as specifies the port that will be used on the client as well as the local port well as the local port

FTP connection - properties Format of data on control connection TELNET network virtual terminal protocol. Why FTP connection is simpler to manage than TELNET connection :  FTP does not allow option negotiation  FTP uses only basic NVT definition.

Using FTP - Commands invoking FTP % ftp % ftpcommands ftp> ‘command' ftp> ‘command' help command -- description and usage of the command. -- description and usage of the command. ls -- lists the contents of remote directory cdup -- change remote working directory to parent directory parent directory bell -- beep when command completed Refer page 503 for more commands.

Trivial File Transfer Protocol (TFTP) n FTP, though most general file transfer protocol, is complex and difficult to program. n Many applications do not need the full functionality that FTP offers, neither can they afford complexity. n TFTP is the second file transfer protocol that offers inexpensive and unsophisticated service. n TFTP is intended for applications that do not need complex interaction between client and server.

Trivial File Transfer Protocol (TFTP) n TFTP restricts operations to simple file transfers and does not provide authentication. Consequently the TFTP software is much smaller than FTP. n TFTP does not need a reliable stream transport service. It uses UDP or other unreliable packet delivery system and uses timeout and retransmission to ensure that data arrives. n The sender transmits a file in fixed size blocks and awaits an acknowledgment for each block before sending the next one. The receiver acknowledges each block upon receipt.

TFTP - Process Model n The first packet being sent requests a file transfer and establishes interaction between client and server. n The first packet specifies a file name and whether the file will be read or written. Blocks of file are numbered consecutively starting from 1. n The header of each data packet specifies the number of block the packet carries and each acknowledgment specifies the number of blocks being acknowledged.

TFTP – Process Model n TFTP retransmission requires both sides to implement timeout and retransmission. n If the side sending data times out, it retransmits the last data block. If the receiver side times out, it retransmits the last acknowledgment. n Though this scheme guarantees robustness, it can lead to a problem known as Sorcerer’s Apprentice Bug. n When an acknowledgment is delayed, the sender retransmits the data packet. The receiver again

sends acknowledgment for the retransmitted packet. Eventually both acknowledgments reach the sender and for each acknowledgment, the sender transmits the next packet. sends acknowledgment for the retransmitted packet. Eventually both acknowledgments reach the sender and for each acknowledgment, the sender transmits the next packet. n Thus all the subsequent packets are transmitted twice and acknowledged twice. n n This cycle continues indefinitely with each packet being transmitted exactly twice. TFTP – Process Model

Network File System (NFS) n n NFS provides on-line shared file access that is transparent and integrated. n n When an application program executes, it calls the operating system to open a file, or to store and retrieve data in files. n n The operating system accepts the request and passes it to either the local file system software or to the NFS client. The client software uses NFS protocol to contact appropriate server on a remote machine and performs requested operation.

RPC and XDR n n NFS protocol consists three independent pieces. - the NFS protocol itself - RPC mechanism - eXternal Data Representation (XDR) n n RPC and XDR provide mechanisms that can be used to build distributed programs. n n XDR provides a way to pass data among heterogeneous machines without need for conversion among the hardware data representation.

Summary n Data on remote files can be accessed by - Whole-file copying. - Shared online access. n FTP uses whole file copying. n TFTP provides a small, simple alternative to FTP and so it can be used for bootstrapping diskless machines. n NFS provides online shared file access. It uses UDP for transport and RPC & XDR mechanisms. n As RPC and XDR are defined separately from NFS, they can be used to build distributed applications.