StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Issues on the File Transfer Protocols - Annotated Bibliography Example

Cite this document
Summary
The bibliography "Issues on the File Transfer Protocols" focuses on the critical analysis of the major issues on the file transfer protocols. The first author gives the requirements that are needed for the file transfer to take place. The requirements are clearly stated…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.1% of users find it useful

Extract of sample "Issues on the File Transfer Protocols"

Running head: FILE TRANSFER: ANNOTATED BIBLIOGRAPHY Student name: Student number: Course title: Lecturer: Date: Table of Contents Table of Contents 2 File transfer 3 eDonkey and eMule 4 Peer-to-peer networks 6 Bittorrent 8 File transfer Negus, C. (2009). MAC OS X UNIX toolbox: 1000+ commands for the Mac OS X. NY: John Wiley and Sons. The author gives the requirements that are needed for the file transfer to take place. The requirements that are stated include making sure that the machine that is being used is running FTP and is attached to an Internet connection. Another thing is to ensure that the machine that is being transferred to has FTP program also running. It should also be attached to Internet. The user should also be aware of their domain name (that is the domain name of the machine that is being connected). There should also be active accounts that will be used to transfer the files. The account should be active in both the local and the host machine. Comer, D. (2006). Internetworking with TCP/IP: Principles, protocols, and architecture. CA: Prentice Hall. The author talks about he commands that are used in file transfer between the host and the local machines. Most machines, according to the author, takes FTP commands in lower case as UNIX is case sensitive. The only exceptions are the names of the files that are being transferred in the process. The author then goes ahead and gives the procedure of sending the files. The first step is logging to the machine. The second step is to enter the ftp command which is followed by the machine name. After this, you are supposed to enter the login details to the host machine. The user will then enter the password of the host machine and then enter the put command which will be used to transfer the files. Stahnke, M. (2005). Pro OpenSSH. CA: Apress The author gives the warnings of what the user should keep in mind while using this system. One of the things is to make sure that duplicate files are avoided as much as possible. The author then goes ahead and gives the success factors that are required when using FTP which are the fact that the file name formats should be known. The user should know which file names re accepted in the system and also which file name formats are allowed in the host machine. Barret, D. (2005). SSH, the secure shell: The definitive guide. NY: O’Reily Media, Inc. The author gives a synopsis of what constitutes the Scp command. This is a utility which allows files to be able to be transferred and/or copied between the host and the local machine. This command is an update o the older command which was used initially. This original command was Rcp. Both of these commands work the same except for the fact that the passwords and the login details in Scp are encrypted. The encryption is so that the systems are as secure as possible. He also notes the fact that the user is able to transfer files between two machines without having to enter any passwords. This, according to the author is possible when the user will set the .shosts so that it is able to ssh between two computers and so making it possible to transfer the files without any form of credentials being required. eDonkey and eMule Sachs, M. & Baskin, B. (2005). Securing IM and P2P applications for the enterprise. IL: Syngress. To connect to Gnutella network, the authors stress the use of “connect” and “disconnect” options which are available in most clients. This option is secure if the user wants to use their clients to download for their own use and it was designed so that the clients are able to connect to. The possibility of this was met when the developers released source code which was used to set up servers which were used for transferring and searching files. There are e-donkey servers which go well with the network. The authors go ahead and state that the introduction of this made the management of the network to be hard as their management was removed from the central server. The e-donkey networks are becoming popular in Europe and now in U.S more so when large sizes of files are being sent. The popularity added to the fact that it was decided that the adware and spyware be combined together has seen this technology get a wider coverage due to its compatibility with eDonkey networks. The popular of this spyware is e-Mule which compatible eDonkey and is also able to connect to its own Kademlia network. The Kademlia network is server-less. Sobh, T. (2010). Innovations and advances in computer sciences and engineering. NY: Springer. The author gives some basic configurations of the two technologies. eDonkey and eMule use the same type of protocol. The transmission of data in these two technologies is based on TCP technology. The signals of control are based on both TCP and UDP. The start of the control signals or the data transmissions have a fixed value when they are started. In eDonkey, the start value is “0xe3” while the eMule starts with “0xe5”. The one which will succeed start ups will have a packet which has a length of 4 bytes. The first five bytes can be used to identify the eMule and eDonkey. Weverka, P. (2005). The everyday Internet all-in-one desk reference for dummies. NY: For Dumies. The author gives the fact that as many people were not happy with integrating adware and spyware together, they started looking for options that did not integrate the two technologies together. They found the use of eMule to be not only free and reliable but also were coded well and did not lack any feature that come with such technologies. This made this program to be a likeable program that was used to make connections to the eDonkey network. The author also gives the origins of this technology which was from a guy who was not satisfied with the eDonkey2000 program. His name was Merkur. He got other programmers and came up with eMule. Their main objective was to come up with a client which was popular with many users and capitalize on the areas where eDonkey was popular before. Peer-to-peer networks Furht, B. (2010). Handbook of social network technologies and applications. NY: Springer. The author gives common uses of peer to peer networks like Bittorrent and Kazza. This, the author states, is used to exchange content on the Internet. They make use of great number of servers which are available and also make it possible to download content. One of the problems that come with these systems is the fact that ill-motive users may introduce content which are of no value to the network. There has been the use of reputation management which has made it possible to control malicious users. Although this is the case, the rate of bogus content still remains high. Dong, J., Paul, R., & Zhang, L. (2009). High assurance services computing. NY: Springer. The authors give an analysis of the use of the file transfer technologies like Kazza and Bittorrent. The two technologies provide poor quality of video that users strive to watch over the Internet. One factor contributing to this is the fact that the user is required to download the whole clip of video before they are able to use the file. The second factor that contributes to the poor service is the fact that the content is most of the time in poor quality, may be corrupted or even malicious. The current video streaming technologies like VoD cannot be applied to the current technologies that are used in peer to peer networks. The authors go ahead on the suggestions to use service oriented architectures in the peer to peer networks. Montanari, U. (2006). Trustworthy global computing: Second symposium: Revised selected papers. NY: Springer. The author’s main objective is to describe and give an analysis of what the Mobius technology is all about. The main aim of developing the Mobius project was to come up with a model that would promote trust and security in networks that were used globally. MOBIUS (Mobility, Ubiquity, Security), has an essential features of the security of MOBIUS architecture consists of an innovative trust management enables individual entities to get trust by giving certificates which can be verified. They also have a static enforcement mechanism which allows for a wide security coverage which is a major concern with the rise in global computing. It also has a support for system component downloading. This is developed because it is believed that the global network is on the rise and also that there will be need for autonomous systems with this rise. Wehrle, K., & Steinmetz, R. (2005). Peer-to-peer systems and applications. NY: Springer. The authors talk much about prominent systems which make use of centralized networks which are peer-to-peer technology. The network which they give pre-eminence is Napster. Napster is used for free and is used for sharing files between the users of the Internet. This technology is considered to be the starting point of most networks which use peer-to-peer technology. Given the complications that come with file sharing services, especially the legal issues, the basic concept of the architectures still used by many applications for example WinMX and Audiogalaxy. Another similar file sharing technology that is explained is BitTorrent which is the same as Napster safe for the use of which is sharing single files which are large between many clients. Bittorrent Cohen, B. (2003). Incentives build robustness in Bittorrent. Web. Retrieved on 13th April 2011 from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.14.1911&rep=rep1&type=pdf The author says that the decision to use bittorrent will rest on the publisher. It has been found out that researchers make use of Bittorrent because it is the only method available to download a file. When many people are downloading the same file they want. They will be downloading some bits of the same file to each other. This has been found to reduce the upload cost to the downloaders. Researchers have tried for a long time to achieve this technique but to no avail. This system has been found to be very economical. In order to keep the information and keep track of which peers have which file, the technology, Bittorrent, cuts files into smaller pieces. It then uses the SHA1 to verify the information that there is in the file. Avin, A. (2007). Bittorrent goes to Hollywood. Infoworld. 29(1), 11. Web. Retrieved on 13th April 2011 from http://books.google.co.ke/books?id=vDcEAAAAMBAJ&pg=PA11&dq=Bittorrent+goes+to+Hollywood&hl=en&ei=dPCnTb3rMY3n4wbHxcmjCg&sa=X&oi=book_result&ct=result&resnum=1&ved=0CCgQ6AEwAA#v=onepage&q=Bittorrent%20goes%20to%20Hollywood&f=false From the year 1990, the term peer-to-peer has been associated with the illegal copying of music from the Internet. The people behind Bittorrent technology are ready to change this concept and make the software use back to its senses. The company behind Bittorrent has taken very courageous steps towards realizing this goal. They have stroked deals with medial companies to realize their goal. The main aim of Bittorrent is to ask its users to upload while at the same time they are consuming. This demand will yield to supply. This concept is interesting and is raising some concern especially on online retailers. Tomar, G. (2010). Ubiquitous computing and multimedia applications. NY: Springer. The author gives a technical description of this technology where the author says that for the file sharing system to be optimal, the Bittorrent file sharing system should set the size of the data to be 256 KB and the video is also subdivided to 800 pieces. The simulation environment has 7 peers which are seen to be participating in the environment. The author then goes ahead and shows how the Bittorrent protocol operates. In this case, the Bittorrent technology is set to have a very fast selection algorithm. In the algorithm, the x-axis represents the time of simulation while the y-axis represents the frame id. Castro, M., Renesse, R. (2005). Peer-to-peer systems 4. NY: Springer Science & Business. The authors, in the abstract, stress the fact that there are many peer-to-peer file-sharing prototypes which are in existence. Of all the systems, Bittorrent has managed to attract many users. The technology relies on other global systems in its computing power. It also has a system where the moderation of the files is done so that the system is secure and safe. The technology focuses on four issues which are availability, integrity, flashcrowd handling, and the performance of he download. The technology also employs the bartering technology so that it limits users from freeriding when they are downloading. The book strives to come up with a model of designing Bittorrent networks. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(File Transfer Protocols Annotated Bibliography Example | Topics and Well Written Essays - 2000 words, n.d.)
File Transfer Protocols Annotated Bibliography Example | Topics and Well Written Essays - 2000 words. https://studentshare.org/information-technology/2058598-file-transfer-protocols-annotated-bibliography-of-15-articles
(File Transfer Protocols Annotated Bibliography Example | Topics and Well Written Essays - 2000 Words)
File Transfer Protocols Annotated Bibliography Example | Topics and Well Written Essays - 2000 Words. https://studentshare.org/information-technology/2058598-file-transfer-protocols-annotated-bibliography-of-15-articles.
“File Transfer Protocols Annotated Bibliography Example | Topics and Well Written Essays - 2000 Words”. https://studentshare.org/information-technology/2058598-file-transfer-protocols-annotated-bibliography-of-15-articles.
  • Cited: 0 times

CHECK THESE SAMPLES OF Issues on the File Transfer Protocols

Internet protocol and VoIP security

There are a lots of other protocols which are used in VoIP technology such as UDP etc.... SIP calls can be either established over UDP or TCP protocols.... These new techniques will lay the foundation for solving the mentioned issues from a different angle, which is expected to improve the security and QoS of the existing approach.... Even with this popularity VoIP has serious issues that need to be looked into....
15 Pages (3750 words) Essay

Fundamental Concepts of Advanced Networking

Basic knowledge of protocols, models, and devices is necessary for handling the issues in a network.... riefly describe each of the following TCP/ IP application layer protocols: SMTP, FTP, HTTP.... Virtual Private Network is a private data network that connects with security and tunneling protocols over public networks.... set of protocols that is responsible for securing the packet processing at the network layer in network communication is known as an Internet security protocol....
3 Pages (750 words) Case Study

Network and Communication Security Protocols

This research paper "Network and Communication Security protocols" focuses on potential and advanced persistent threats along with their impact on different governmental sectors of the country.... It incorporates surveys, statistics and quantitative data pertaining to the main thesis....
31 Pages (7750 words) Research Paper

BitTorrent Communication

In fact, BitTorrent protocol has been given a number of different descriptions such as a "crowded, throw, and collect" file transfer protocol (Rouse, 2009; Love, 2012).... he working of this protocol is simple, in fact, it does not transfer a target file to each client asking for it, in its place the file owner or distributor transfers it to one client who, sequentially, transfers it to other clients.... In this scenario, all the clients taking part in this communication process have parts of the desired file from side to side until all the clients get the entire file....
8 Pages (2000 words) Essay

How Packet Data Travels through the Networks

The paper 'How Packet Data Travels through the Networks' presents the computer system that relies on a set of protocols namely the TCP/IP protocol suite for information exchange, storage, and communication.... This report is intended to provide an insight into how packet data travels through the networks, the role of various protocols, and about various processes that occur within the network.... o organize the networking architecture, the network protocols, and the software and hardware that implement these protocols are organized into several layers called protocol stack (Oracle System Administration Guide: IP Services, 2011....
8 Pages (2000 words) Case Study

Advantages and Disadvantages of Using UDP, TCP Protocol

ne of these is that its connection speeds are relatively lower compared to other protocols.... That is why the broadcasting and multicasting facilities provided for in UDP protocols is such a huge advantage.... There is a need for a connection protocol that can overcome the barriers that come with such differences to guarantee the fast and effective transfer of large files.... The protocol is capable of supporting the transfer of any number of large files across the network at breakneck speeds....
5 Pages (1250 words) Assignment

Transmission Control Protocol in Wireless Networks

The Application layer protocols contain the following protocols: file transfer Protocol (FTP), Domain Name System (DNS), Simple Mail Transfer Protocol (SMTP), and Hypertext Transfer Protocol (HTTP).... The following figure is an example of TCP offering reliable data transfer over IP network to file transfer protocol using Ethernet.... In other words, HTTP is a set of rules for file transfer (multimedia, sound, text, video, and graphic images) on the World Wide Web....
9 Pages (2250 words) Coursework

Evolution of Information Transfer Protocols

The trust of business partners, the loyalty of your customers, and the efficiency of the operations of the business will all depend on the strategic implementation of the file transfer process (Simon, 1996).... "Evolution of Information transfer protocols" paper states that information transfer has been seen to change and evolve with time.... There is a need to have a reliable, and efficient data transfer so that the organization attains a strategic and tactical implementation of the data and file transfer process....
11 Pages (2750 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us