ACN Chapter 5- Part 2 Notes
ACN Chapter 5- Part 2 Notes
The "Advanced Computer Network" subject in a diploma or engineering program typically covers in-
depth topics related to computer networking. The curriculum aims to provide students with a
comprehensive understanding of advanced networking concepts, protocols, and technologies.
Chapters / Syllabus
2. Next Generation IP
( Part 2 )
FTP (File Transfer Protocol) is a standard network protocol used to transfer files between a
client and a server over a TCP/IP-based network like the internet. It is one of the oldest
protocols used to facilitate file sharing and has been in use since the early days of
networking.
1. Establishing Connection:
o The client connects to the server using its IP address and port 21.
o Authentication is performed using a username and password, or the server
may allow anonymous access.
2. Command and Data Channels:
o The control connection (on port 21) is used to send commands and receive
responses (e.g., login, directory navigation).
o A separate data connection (on port 20 or a dynamic port in passive mode) is
used for file transfers.
3. File Operations:
o The client sends specific commands to upload, download, rename, delete files,
or manage directories.
o The server processes the commands and performs the requested action.
FTP Architecture
The FTP Architecture follows a client-server model designed to transfer files over a
network. It defines how commands, responses, and data are exchanged between an FTP client
and an FTP server using two separate channels: a control connection and a data connection.
1. FTP Client:
o The client is a software application used to connect to the FTP server.
o It sends commands to the server to perform file-related operations (upload,
download, delete, etc.).
o Examples: FileZilla, WinSCP, or built-in FTP utilities in operating systems.
2. FTP Server:
o A server application that listens for incoming client requests on the network.
o It authenticates clients and processes their file-related commands.
o It maintains the files and directories shared over FTP.
TFTP
TFTP (Trivial File Transfer Protocol) is a simplified version of the File Transfer Protocol
(FTP) designed for transferring files in a minimal and straightforward way. It operates on the
UDP (User Datagram Protocol) instead of the more complex TCP, making it faster but less
reliable.
1. Simple Design:
o TFTP is lightweight and requires minimal resources.
o It is designed to transfer files between a client and server without advanced
features like authentication or directory listing.
2. Transport Protocol:
o TFTP uses UDP (port 69) for its operations, unlike FTP, which uses TCP.
o UDP is connectionless, so TFTP does not guarantee reliable delivery or error
recovery.
3. Stateless:
o TFTP does not maintain session states between the client and server.
o Each operation is handled as an independent transaction.
4. Limited Functionality:
o Supports basic file transfer operations like reading (downloading) and writing
(uploading).
o Does not include authentication, encryption, or directory management.
5. Small File Transfers:
o Often used for transferring small configuration files, firmware, or boot images
in network environments.
TFTP Workflow:
1. Client Request:
o The client sends an RRQ or WRQ packet to the server on port 69.
o The packet specifies the filename and transfer mode (usually "netascii" or
"octet").
2. Server Response:
o The server responds by starting the data transfer or acknowledging the write
request.
3. File Transfer:
Advantages of TFTP:
1. Lightweight:
o Minimal overhead, making it ideal for resource-constrained environments.
2. Fast:
o Uses UDP, which is faster than TCP due to the lack of connection
establishment.
3. Simple Implementation:
o Easy to configure and use.
Disadvantages of TFTP:
1. No Security:
o Lacks authentication, encryption, and access control.
o Files are transferred in plain text, making it unsuitable for sensitive data.
2. Reliability Issues:
o UDP does not guarantee packet delivery or order, leading to potential data loss
or corruption.
3. Limited Functionality:
o Cannot handle complex operations like directory browsing or large-scale
transfers efficiently.