What is ftam-file transfer access and management, Computer Network Security

Assignment Help:

Describe what the FTAM services are.

FTAM  stand for the File Transfer Access and Management:
FTAM is an ISO application protocol which performs the operations on files such as.
1. File transfer is performed by it
2. File access is performed by it
3. File modification is performed by it
4. File management is performed by it
Different systems have differential saving mechanisms/methods.
For instance 

In the Unix, a file is saved as a series of characters whereas in IBM VMS environment, a file is saved as a collection of records. Therefore, file organization is reliant on host operating system.
FTAM aids the users in accessing files on the diverse systems given that they have compatible implementations

FTAM can be understood as follows:
1. In FTAM system, the server regulates the user's connection oriented information, session information. The FTAM client requests the server for the session. Then the file transfer takes place after establishment of session.FTAM uses the concept of virtual file saving which provides a common view offiles.


Virtual Files and File stores can be understood as follows:

These are used to make interaction possible between different file systems. A virtual file store is  a  model  which  is the n-implementation-specific.   It is  used  as  the  intermediary  for accessing, transferring and managing files and databases.A virtual file is unevenly accessed in FTAM i.e., every transaction ispossb1e only in The presence of the initiator and a responder. Initiator is the one which requests for the services (such as file transfer, access and management) from the responder which permits the initiator to use the virtual file model it instead of actual file. This model is a software designed by responder irrespective of hardware and operating system made in use. This model is also very helpful in creating a separation between the file (stored in same saving system), which is accessed both by the initiator and other users.
Attribute and Content are described below:

Virtual file store is formed based on attributes and content. Attributes are nothing but the set of properties or security measures. They are used to manage the information as well as access to the information. The two types of attributes are per-content, related to contents of files and per- access, related to the security measure which control file access.
The following are the service classes that FTAM gives us.

1. Transfer Service Class is discussed below:
This service class includes the concept of file exchange. It supports exchange of whole files as well as parts of files. The file transfers are simple with single operations and a less number of interactions between different files.
2. Access Service Class is discussed below: 

This service class provides the initiator with rights to performs certain operations on either the whole file or the individual data units called FADUs that is File Access Data Units.

3. Management Service Class can be understood as follows:
This service class deals with the control mechanism over the virtual file store. Such mechanism permits the user toper form the various operations like rating or deleting files, modifying reading, attributes of a file.
4 The Transfer and Management Service Class cab be understood as follows:
This class gives us the combined functionalities of the transfer class and the management service class both, so that it can provide support for the navigation of directories and implement easy functions.


Related Discussions:- What is ftam-file transfer access and management

Wireless sensor networks, The project will be involving a design and a repo...

The project will be involving a design and a report of which explain the simulation and how it functions. The aim of the project is to help the administrators and staff at the war

Develop firewall rules based on a fictitious organisation, Question requir...

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption te

Design a network layout, QUESTION: (a) Below is a capture of an Ethern...

QUESTION: (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. Give the source MAC address for the frame in hexadecimal; the sourc

Compare and contrast between block and stream ciphers, Problem 1 Solve ...

Problem 1 Solve the following Caesar cipher by showing your working: EM KIUM EM AIE EM KWVYCMZML Problem 2 Compare and contrast between block and stream ciphers, listin

Explain the limitations of a firewall, Question: (a) Mention three lim...

Question: (a) Mention three limitations of a firewall. (b) Compare packet-filtering and proxy-base firewalls. Give advantages and drawbacks of both. (c) "Proxies eff

Differences between a hacker and a cracker, Question: (a) Which of the...

Question: (a) Which of the following is not a goal of security: i) detection ii) prevention iii) recovery iv) prosecution (b) You are an honest student. One day you

Calculate the minimum required signal strength, Question 1: (a) (i) Ra...

Question 1: (a) (i) Radio waves are subject to several propagation problems. Name any three of them. (ii) A Wi-Fi receiver requires a signal power of 50mW to operate correc

Kasonet pinging system, KASONet Pinging System: Project Title:       ...

KASONet Pinging System: Project Title:                                                           "KASONet Pinging System"   Brief Overview of Project: The o

Application-based ids, Application-Based IDS Application-based IDS (AppI...

Application-Based IDS Application-based IDS (AppIDS) is an advanced version of HIDS. It examines application for abnormal events. The ability to view encrypted data is the uniqu

Structure of a typical frame relay, Problem a) Consider a 1000 Mbps Eth...

Problem a) Consider a 1000 Mbps Ethernet with a single Store-N-Forward switch mid-way in the path between two nodes A and B. Assume that there are no other nodes on the network

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd