MESSAGE ACCESS AGENT: POP AND IMAP

Slides:



Advertisements
Similar presentations
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Advertisements

HTTP Cookies. CPSC Application Layer 2 User-server state: cookies Many major Web sites use cookies Four components: 1) cookie header line of HTTP.
Network Layer and Transport Layer.
Layer 7- Application Layer
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
FTP File Transfer Protocol. Introduction transfer file to/from remote host client/server model  client: side that initiates transfer (either to/from.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
OSI Model Routing Connection-oriented/Connectionless Network Services.
Computation for Physics 計算物理概論 Introduction to Linux.
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
CCNA Exploration Network Fundamentals
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
Computer Networks26-1 Chapter 26. Remote Logging, Electronic Mail and File Transfer.
BY SAGAR SINHA SAPTARSHI BAKSHI SARTHAK JAIN SHAILZA CHAUDHARY
FTP (File Transfer Protocol) & Telnet
Simple Mail Transfer Protocol (SMTP)
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols Network Fundamentals.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
1 Version 3.0 Module 11 TCP Application and Transport.
File Transfer Protocol (FTP)
TCP/IP Transport and Application (Topic 6)
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
Tunneling and Securing TCP Services Nathan Green.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols Network Fundamentals.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols.
Slides based on Carey Williamson’s: FTP & SMTP1 File Transfer Protocol (FTP) r FTP client contacts FTP server at port 21, specifying TCP as transport protocol.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Cisco I Introduction to Networks Semester 1 Chapter 10 JEOPADY.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Chapter 10: Application Layer
Application Layer Functionality and Protocols Abdul Hadi Alaidi
Application Layer Functionality and Protocols
The Transport Layer Implementation Services Functions Protocols
Remote Logging, Electronic Mail, and File Transfer
Instructor Materials Chapter 5 Providing Network Services
Instructor Materials Chapter 10: Application Layer
How data travels through a network The Internet
Lecture 6: TCP/IP Networking By: Adal Alashban
Chapter 10: Application Layer
Lec 5 Layers Computer Networks Al-Mustansiryah University
ECEN “Internet Protocols and Modeling”
Process-to-Process Delivery:
Application Layer Functionality and Protocols
Lecture 4 Communication Network Protocols
Networking Theory (part 2)
Protocols 2 Key Revision Points.
Applications Layer Functionality & Protocols
Protocol Application TCP/IP Layer Model
Chapter 7 Network Applications
Chapter 2 Application Layer
Computer Networks Protocols
Networking Theory (part 2)
Presentation transcript:

MESSAGE ACCESS AGENT: POP AND IMAP  SMTP uses commands and responses to transfer messages between an MTA client and an MTA server.  Commands are sent from the client to the server. 1- HELO. 2- MAIL FROM. 3- RCPT TO. 4- DATA. 5- QUIT.  Connection Termination MESSAGE ACCESS AGENT: POP AND IMAP The first and the second stages of mail delivery use SMTP. However, SMTP is not involved in the third stage because SMTP is a push protocol; it pushes the message from the client to the server.

E-mail Server Processes - MTA and MDA and the SMTP protocol  The e-mail server operates two separate processes: 1- Mail Transfer Agent (MTA) 2- Mail Delivery Agent (MDA)  The Mail Transfer Agent (MTA) process is used to forward e-mail.  The MTA receives messages from the MUA or from another MTA on another e-mail server.  Based on the message header, it determines how a message has to be forwarded to reach its destination.  If the mail is addressed to a user whose mailbox is on the local server, the mail is passed to the MDA. If the mail is for a user not on the local server, the MTA routes the e-mail to the MTA on the appropriate server.

FTP  Commonly used application layer protocol  Allows for the transfer of files between clients/servers.  Requires 2 connections to the server: Commands – uses TCP port 21 Actual data – uses TCP port 20

File Sharing Services and SMB(Server Message Block) protocol Telnet  Allows users to emulate text-based terminal devices over the network using software.  A connection is known as a ‘virtual terminal ’ session.  Can be run from the command prompt on a PC.  You can use the device as if you were sitting there with all the rights and priorities that you username will offer you.  Disadvantages: Doesn’t support encryption like SSH. All data is transferred as plain text. It can be easily intercepted and understood.  If security is a concern, you should use Secure Shell (SSH) protocol. Provides for remote logins with stronger authentication than telnet. File Sharing Services and SMB(Server Message Block) protocol  SMB has become a mainstay of Microsoft networking, even more so since the introduction of Windows 2000 software.  Allows servers to share their resources with clients  Linux and Unix also share with Microsoft networks using a version of SMB called SAMBA.  Apple also supports sharing resources using an SMB protocol  What can SMB do? –Start, authenticate, and terminate sessions –Control file and printer access –Allow applications to send/receive messages to/from another device

SECURE SHELL PROTOCOL (SSH)  popular remote login application program is Secure Shell (SSH).  SSH, like TELNET, uses TCP as the underlying transport protocol, but SSH is more secure and provides more services than TELNET.  Covers authentication, encryption.  Solve the security issues : at remote login of Telnet, during file transfer at FTP.  There are two versions of SSH: SSH-1 and SSH-2, which are totally incompatible.  The first version, SSH-1 is now deprecated because of security problems in it.  SSH is a proposed application-layer protocol with four components. Q/ Compare between SSL and SSH? SSL SSH is TCP-based and always used in WEB applications, with HTTP. is TCP-based and always used with Telnet and FTP SSH-2 components SSH Transport-Layer Protocol (SSH-TRANS)  Privacy or confidentiality of the message exchanged.  Data integrity.  Server authentication.

 Compression of the messages that improve the efficiency of the system and makes attack more difficult. SSH Authentication Protocol (SSH-AUTH) After a secure channel is established between the client and the server and the server is authenticated for the client, SSH can call another software that can authenticate the client for the server. SSH Applications  Remote login  file transfer Port Forwarding Format of the SSH Packets  Length: This 4-byte field defines the length of the packet including the type, the data, and the CRC field, but not the padding and the length field.  Padding: One to eight bytes of padding is added to the packet to make the attack on the security provision more difficult.  Type: This one-byte field defines the type of the packet used by SSH protocols.  CRC: The cyclic redundancy check filed is used for error detection.