File transfer: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (New page: {{subpages}} '''File transfer''' is a computer networking technique in which a file, composed of an ordered sequence of records, is transferred from one source computer to one or m...) |
mNo edit summary |
||
(One intermediate revision by one other user not shown) | |||
Line 1: | Line 1: | ||
{{subpages}} | {{subpages}} | ||
'''File transfer''' is a computer networking technique in which a [[file]], composed of an ordered sequence of [[ | {{TOC|right}} | ||
'''File transfer''' is a computer networking technique in which a [[file]], composed of an ordered sequence of [[record]]s, is transferred from one source computer to one or more destination computers. The [[Trivial File Transfer Protocol|simplest file transfer]] involves two computers, which can do no other communications during the transfer, copying the file from the source to the destination. If anything goes wrong with this transfer, it must be done over. Also, the simple case provides no security either for access to the computers or to the file information as it moves through the network. | |||
==Efficiency== | ==Efficiency== | ||
Line 14: | Line 15: | ||
===Multiple transfers between two computers=== | ===Multiple transfers between two computers=== | ||
===Transfer from a single source to many destinations=== | ===Transfer from a single source to many destinations=== | ||
===Multiple sources and destinations=== | ===Multiple sources and destinations===[[Category:Suggestion Bot Tag]] |
Latest revision as of 11:00, 16 August 2024
File transfer is a computer networking technique in which a file, composed of an ordered sequence of records, is transferred from one source computer to one or more destination computers. The simplest file transfer involves two computers, which can do no other communications during the transfer, copying the file from the source to the destination. If anything goes wrong with this transfer, it must be done over. Also, the simple case provides no security either for access to the computers or to the file information as it moves through the network.
Efficiency
Availability
- checkpointing
Security
Access security
Content security
Transfer topologies
Multiple transfers between two computers
Transfer from a single source to many destinations
===Multiple sources and destinations===