You are on page 1of 3
Remote Legin Protocol : Remote login protocols ave the protocols that was desfaned to access emote Computers Over the network. Se = Mevarinal Bietioorlt tocal Computer Remote Computer > 2k 15> trblemented using Telnet Mamet 3 Terminal Network > Jalmet ts Q ‘remote Login protocol to access emote Computers Over metwork: > fhe dato tyansmitted ts mot encrypted, Sf data leaked it 1S mot 4ape- + Me works an abpticatfon layer of 0S model - 65H :- Secure Shell > 45H 1s Q emote login protocol to ee Cornbuters Over a network by using public 7 fhe data transmitted is encrybled. St data leaked it Yemadins 4afe. + Mt works on application layer of O82 model: (uses of, SSH Protocol) . + Ghe 45H proloco) 1s a method for Secure ‘remote login from one Computer to anothey- 5 ft provides Secure access For users: 4 Gb helps Fesuing rrermote Commands: access. ‘remole ey eng ion 3 Mt manages network fnfrastruclure, @ , PN- Oe k FILE TRANSFER, PROTOCOLS) Ne tvansper protocols are the protocol used For the tyansper OF Computer files between cifent and Server on A Combuter network FTP:- File Fvansfer Pratoco} > the File transfer protocol ts a Standard protocol used foy transferying fries from am computer to another ol from Clrent to Server + FTP works on application layer of OSI model > MH allow user to 4ee and modify all files on the Server Objectives Of FTP FTP Commands, FIP Rebties + M promote sharing of Ps A data connection files, Clfent Bre 4evver > Mo transfer data ‘ebably and efficiently. + Fo encourge indirect oY fanplicit Uses Of rewnote Compufes AFTP: Secure File Transper Protocol > SFTP 13 Q Secure Version of File Transfer Protocol, which allows file transfer over a Secure shell (SSH) data 4tream: 3 SFTP Works on Abblicatron layer Of O51 model. 3 SFTP allows businesses to Securely Lransfer Biiifng data, funds and vecgvery files. + 4ETP 15 Q part of 45H protocol: 3 TH allow user to 4ee and modify Files on the Server. cer Secure Coby} Tne SeP Command Can be used to Send a file to a Server Because Tt uses the 55H protocol Por authenticaton cP fs move Secure than PIP which transmits password tn plain text: > Wy dyvantages felnek e Accessing Remote Computers :~ Tt allows vemote access to Someone else Computer: ® Easy to USe:- You also meed to know the Internet protocol (IP) address Of the Combutey you want to access: and have a velfable fnternet comection: © Zave Wme :- Pnstead of physically travelling to another person's home, you can bevform any task on his/her Computer vemotely. e Universal ‘- Arnong falmet, you can use ft on PF Combutey PN-10

You might also like