Please Whitelist This Site?
I know everyone hates ads. But please understand that I am providing premium content for free that takes hundreds of hours of time to research and write. I don't want to go to a pay-only model like some sites, but when more and more people block ads, I end up working for free. And I have a family to support, just like you. :)
If you like The TCP/IP Guide, please consider the download version. It's priced very economically and you can read all of it in a convenient format without ads.
If you want to use this site for free, I'd be grateful if you could add the site to the whitelist for Adblock. To do so, just open the Adblock menu and select "Disable on tcpipguide.com". Or go to the Tools menu and select "Adblock Plus Preferences...". Then click "Add Filter..." at the bottom, and add this string: "@@||tcpipguide.com^$document". Then just click OK.
Thanks for your understanding!
Sincerely, Charles Kozierok
Author and Publisher, The TCP/IP Guide
|
NOTE: Using software to mass-download the site degrades the server and is prohibited. If you want to read The TCP/IP Guide offline, please consider licensing it. Thank you.
|
|
|
|
FTP Control Connection Establishment, User Authentication and Anonymous FTP Access
(Page 1 of 3)
The FTP
operational model describes the distinct
logical data and control channels that are established between an FTP
client (user) and an FTP server. Before the data connection can be used
to send actual files, the control connection must be established. A
specific process is followed to set up this connection and thereby create
the permanent FTP session between devices that can be used for transferring
files.
As with other client/server protocols,
the FTP server assumes a passive role in the control connection process.
The server protocol interpreter (Server-PI) listens on the
special well-known
TCP port reserved for FTP control connections:
port 21. The User-PI initiates the connection by opening a TCP connection
from the user device to the server on this port. It uses an ephemeral
port number as its source port in the
TCP connection.
Once TCP has been set up, the control
connection between the devices is established, allowing commands to
be sent from the User-PI to the Server-PI, and reply codes to be sent
back in response. The first order of business after the channel is operating
is user authentication, which the FTP standard calls the login
sequence. There are two purposes for this process:
- Access Control: The authentication process
allows access to the server to be restricted to only authorized users.
It also lets the server control what types of access each user has.
- Resource Selection: By identifying the
user making the connection, the FTP server can make decisions about
what resources to make available to the user.
If you find The TCP/IP Guide useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider purchasing a download license of The TCP/IP Guide. Thanks for your support! |
|
|
Home -
Table Of Contents - Contact Us
The TCP/IP Guide (http://www.TCPIPGuide.com)
Version 3.0 - Version Date: September 20, 2005
© Copyright 2001-2005 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.
|