Top Qs
Timeline
Chat
Perspective
Comparison of file transfer protocols
From Wikipedia, the free encyclopedia
Remove ads
This article lists communication protocols that are designed for file transfer over a telecommunications network.
Protocols for shared file systems—such as 9P and the Network File System—are beyond the scope of this article, as are file synchronization protocols.
Remove ads
Protocols for packet-switched networks
Summarize
Perspective
A packet-switched network transmits data that is divided into units called packets. A packet comprises a header (which describes the packet) and a payload (the data). The Internet is a packet-switched network, and most of the protocols in this list are designed for its protocol stack, the IP protocol suite.
They use one of two transport layer protocols: the Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP). In the tables below, the "Transport" column indicates which protocol(s) the transfer protocol uses at the transport layer. Some protocols designed to transmit data over UDP also use a TCP port for oversight.
The "Server port" column indicates the port from which the server transmits data. In the case of FTP, this port differs from the listening port. Some protocols—including FTP, FTP Secure, FASP, and Tsunami—listen on a "control port" or "command port", at which they receive commands from the client.
Similarly, the encryption scheme indicated in the "Encryption" column applies to transmitted data only, and not to the authentication system.
Overview
Features
The "Managed" column indicates whether the protocol is designed for managed file transfer (MFT). MFT protocols prioritise secure transmission in industrial applications that require such features as auditable transaction records, monitoring, and end-to-end data security. Such protocols may be preferred for electronic data interchange.[38]
- Some implementations can obfuscate traffic using RC4 et al. See BitTorrent protocol encryption.
- RFC 6726 suggests IPSec as one option.
- One implementation, Fujitsu openFT, applies AES.
- It's recommended to use HTTPS provided by a webserver, proxy, or SSL terminator.
- These are the options in the reference implementation, which uses OpenSSL.
- The BNU implementation of UUCP can resume an interrupted file transfer.
Ports
In the table below, the data port is the network port or range of ports through which the protocol transmits file data. The control port is the port used for the dialogue of commands and status updates between client and server.
The column "Assigned by IANA" indicates whether the port is listed in the Service Name and Transport Protocol Port Number Registry, which is curated by the Internet Assigned Numbers Authority (IANA). IANA devotes each port number in the registry to a specific service with a specific transport protocol. The table below lists the transport protocol in the "Transport" column.
- 1761 is the default port, but 1761–1768 are allocated by IANA.
- The server listens on TCP port 21 (the control port), and the client sends commands to this port from a random port above 1023. To transfer data in active mode, the server initiates a connection from port 20 to the client at the randomly selected port number.In passive mode, the client uses a random port above 1023 as a control port, and from this initiates file transfer. The server sends or receives data from a randomly selected port above 1023, and the client sends or receives data from one port number above its own randomly selected control port.
Remove ads
Serial protocols
Summarize
Perspective

The following protocols were designed for serial communication, mostly for the RS-232 standard. They are used for uploading and downloading computer files via modem or serial cable (e.g., by null modem or direct cable connection). UUCP is one protocol that can operate with either RS-232 or the Transmission Control Protocol as its transport. The Kermit protocol can operate over any computer-to-computer transport: direct serial, modem, or network (notably TCP/IP, including on connections secured by SSL, SSH, or Kerberos). OBject EXchange is a protocol for binary object wireless transfer via the Bluetooth standard. Bluetooth was conceived as a wireless replacement for RS-232.
Overview
Features
Remove ads
See also
- Comparison of file-sharing applications
- Comparison of file synchronization software
- Comparison of distributed file systems
- Lists of network protocols
- List of TCP and UDP port numbers
- List of backup software
- AS2
- Connect:Direct
- Files transferred over shell protocol (FISH)
- Pragmatic General Multicast
- Sendfile
- Waarp
Notes
References
Further reading
Wikiwand - on
Seamless Wikipedia browsing. On steroids.
Remove ads