Internet Protocol (FTP)
Author’s Name
Institutional Affiliation
Date of Submission

Internet Protocol (FTP)
Abstract
The Internet protocol can be considered as a set of rules that help to govern and control data formats that are sent from one place to another through the internet or any other network. The internet is made of different components. Some of these components are common and widely known, while others are not very familiar to the people involved.
Introduction
Internet protocol is an essential set of message arrangements that have been computerized in a way that ensures effectiveness when it comes to exchanging data between computers and particularly over a single system. Typically, internet protocols are made of different addresses which help in the transmission of data packets between networks. As a result, different devices will be able to communicate in a way that is easy and effective. Most systems have their unique addresses for internet protocol. Internet protocol is the essential conventions into the internet layer in consideration of the internet protocol suite. This paper focuses on internet protocol (particularly file transmission protocol (FTP)) as a first communication protocol when it comes to the internet protocol suite.
File transmission protocol (FTP) is a standard internet protocol used in transferring files over the internet and particularly over a TCP/IP connection. TCP/IP, in this case, can be considered as a suite of communication protocols used in the interconnection of different computer devices. Typically, FTP is a client-server protocol. This case means that clients will ask for the files they need. A local or remote server, on the other hand, will provide the requested data (Cutler, 2018, May).
The host is the end-user machine. This machine will be connected to a specific local-host through the internet. The remote, in most cases, is always the second machine that depends and runs on the FTP software. Through the anonymous FTP, users can easily access different files and other data types without the need for a password or identification. Other websites allow people to use these passwords and IDs when it comes to accessing specific files and data.
There three main data structures involved in FTP. These data structures include files, records, and, most importantly, page structure. The file structure has no internal structure (Circiumarescu, Predusca, Angelescu & Puchianu, 2015, May). This case means that the file involved is considered to be a continuous sequence that is related to data bytes. Page structure, on the other hand, resulted in data that have been made up of independent indexed pages. Record structure allows a file to be made off different sequential records.
One of the most common uses when it comes to the use of the internet is mainly to download files. Downloading, in this case, entails transferring these files from one play to another. There is a lot of data being downloaded each day form the internet. As a result, file transmission protocol has become one of the most critical and significant contracts when it comes to sharing of these files. Although there have been increases in the use of HTTP when it comes to filing transfer, FTP is still the most commonly used protocol for these exchanges.
When data is transferred over a specific network, several data representations can be used. On the other hand, particular FTP return codes help in the indications of status in consideration to the digits within them and in one way or another (Udayakumar, Khera, Suri, Gupta & Subbulakshmi, 2018, April). Typically, an FTP server can be considered as a dedicated computer. The main reason, in this case, is because it focuses mainly on the provision of FTP-related services. Therefore, there is a great need to consider security measures and hardware.
How FTP works
Typically, FTP is a client-server protocol. It depends mainly on two communication channels between the server and its client. It can be considered as a command channel that is used when it comes to controlling communications and, most important, channels for data control, which is used in transmitting file content. The role of clients will be to initiate conversations with these servers. This objective will be achieved through their ability to request a chance or time to download particular files. FTP allows people to engage in different activities that are related to file communication and transfer (Villamora, Lim & Sebial, 2019, February). These activities include uploading, deleting, downloading, moving, copying, moving, and are remaining these files in general. Typically users will be required to login to specific servers that are related to FTP. Some of these servers are available without any security considerations (anonymous FTP)
Two main modes are related to FTP sessions. These modes include passive and active methods. Inactive ways, a client will initiate a course through a command channel request. The server, on the other hand, will focus on starting a data connection back to the user. As a result, there will be a transfer of targeted data types. In passive modes, the service depends mainly on the use of command channels to send the required information to the client. This information is essential in opening the chain of data needed. The passive mode allows the client to initiate all the connections (Rahim, Aryza, Wibowo, Harahap, Suleman, Sihombing & Riswanto, 2018). This case means that it will work best and effective when it comes to data communication across address translations and, most importantly, firewalls gateways. Therefore, it is easy for users to work with FTP through command-line interfaces that are simples. Other than that, they can also use them with other graphical user interfaces that are complicated in one way or another. Web browsers, in some cases, are used for FTP clients.
Security
Initially, FTP was mainly defined in 1971 and has been redefined several times. Typically, it was determined without a lot of concern in consideration of security matters. Therefore, there has been a lot of extension to FTP intending to improve security considerations. An example, in this case, is a version that encrypts through the FTPS or others that focuses on working with secure file transfer protocol (SFTP).
In most cases, FTP cannot encrypt traffic. As a result, it is easy for people to easily capture different packets to read passwords, IDs, or any other essential data. In cases where there are brute force attacks, FTP may become vulnerable. Spoofing and packet capture are also significant threats.
FTP Clients
First is used when it comes to uploading, downloading, and, most importantly, the management of files on the server being used. FTC clients may include the following;
WS FTP that offers support to SSH
Transmit which supports FTP, FTP, and SSH
WinSCP which supports FTP, SFTP, and SSH
FTP has and is still one of the most crucial internet protocol used in transferring of files and data. Therefore, there is a need for people, organizations, and particularly users to consider the use of security measures in a way that would be effective, productive, and, most importantly, a way that will help to improve general security considerations. Improving FTP on matters of security will help to ensure effectiveness and contribute to positive improvements in security concerns. Security becomes a significant concern in the review of the development and improvements of information and technology.
Advantages
There are several advantages and impacts when it comes to the role of FTP in information sharing. One of these advantages is mainly the promotion of ways in while files can be shared from one place to another. These files may include computer data and other programs. Another role is to encourage implicit and, most importantly, indirect use of remote computers. This case has helped in ensuring data reliability and, most importantly, efficiency. Another significant advantage is to ensure that users have been protected from variation in consideration of filing storage systems among hosts that are different. The last benefit is to ensure that users of this protocol are granted readability to the end-user.
Conclusion
File transfers become an essential element for most people and organizations. Therefore, there is a need to consider first, reliable, and easily controlled methods that would help in sharing these files and from one place to another. Therefore, FTP has become a necessary protocol that most organizations and people use to ensure that they access and share different files from one place to another. It is become common and can be used in almost all areas that required for file transfer.

Reference
Circiumarescu, L. D., Predusca, G., Angelescu, N., & Puchianu, D. (2015, May). Comparative analysis of protocol RIP, OSPF, RIGRP and IGRP for service video conferencing, E-mail, FTP, HTTP. In 2015 20th International Conference on Control Systems and Computer Science (pp. 584-589). IEEE.
Cutler, S. (2018, May). A search for the optimal file transfer protocol from surfaced UUVs to UAV relays and beyond. In Ground/Air Multisensor Interoperability, Integration, and Networking for Persistent ISR IX (Vol. 10635, p. 1063515). International Society for Optics and Photonics.
Rahim, R., Aryza, S., Wibowo, P., Harahap, A. K. Z., Suleman, A. R., Sihombing, E. E., … & Riswanto, A. (2018). Prototype File Transfer Protocol Application for LAN and Wi-Fi Communication. Int. J. Eng. Technol, 7(2.13), 345-347.
Udayakumar, N., Khera, A., Suri, L., Gupta, C., & Subbulakshmi, T. (2018, April). Bandwidth Analysis of File Transfer Protocol. In 2018 International Conference on Communication and Signal Processing (ICCSP) (pp. 0791-0795). IEEE.
Villamora, V. J. A., Lim, M. S., & Sebial, A. J. (2019, February). Modern file transfer protocol using lossless compression, lattice-based encryption, and a data integrity hashing function. In IOP Conference Series: Materials Science and Engineering (Vol. 482, No. 1, p. 012050). IOP Publishing.

Subscribe For Latest Updates
Let us notify you each time there is a new assignment, book recommendation, assignment resource, or free essay and updates