COS 420 DAY 25. Agenda Group Project Discussion Final Paper Due April 29 User Manual Protocol Definition Program requirements Technical Specifications.

Slides:



Advertisements
Similar presentations
FILE TRANSFER PROTOCOL Short for File Transfer Protocol, the protocol for exchanging files over the Internet. FTP works in the same way as HTTP for transferring.
Advertisements

Chapter 26 FTP.
COS 420 DAY 23. Agenda Student evaluations Group Project Discussion Assignment 4 is posted Due April 29 Today we will discuss BOOTP, DHCP & Domain Name.
COS 420 DAY 23. Agenda Assignment 4 Corrected 2 B’s Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due.
COS 420 DAY 25. Agenda Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due May 10 Latest version of Protocol.
Chapter 29 Structure of Computer Names Domain Names Within an Organization The DNS Client-Server Model The DNS Server Hierarchy Resolving a Name Optimization.
TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture.
CPSC 441: FTP & SMTP1 Application Layer: FTP & Instructor: Carey Williamson Office: ICT Class.
Electronic Mail and SMTP
COS 420 DAY 25. Agenda Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due May 10 Today we will discuss.
Chapter 30 Electronic Mail Representation & Transfer
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Applications:Electronic Mail (SMTP,POP,IMAP,MIME) Presented by-Tarun Lall Badrinath Sai Kumar Praveen.
Architecture of SMTP, POP, IMAP, MIME.
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
File Transfer Protocol (FTP)
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
Chapter 31 File Transfer & Remote File Access (NFS)
Electronic Mail (SMTP, POP, IMAP, MIME)
SMTP, POP3, IMAP.
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
1 Chapter Internet Applications (DNS, )
1 Chapter Internet Applications (DNS, )
Human-Computer Interface Course 5. ISPs and Internet connection.
File Transfer & Access (FTP, TFTP, NFS)
Ferry Astika Saputra FTP & TFTP Server. Overview File Transfer Protocol (RFC 959) Why FTP? FTP’s connections FTP in action FTP commands/responses Trivial.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
Application Layer Protocols Simple Mail Transfer Protocol.
Lecturer: Maxim Podlesny Sep CSE 473 File Transfer and Electronic in Internet.
Fall 2005 By: H. Veisi Computer networks course Olum-fonoon Babol Chapter 7 The Application Layer.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Application Protocols: ELECTRONIC MAIL (SMTP, POP) CSNB534 Semester 2, 2007/2008 Asma Shakil.
Internet Applications  DNS   TELNET  FTP  Web browsing.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
1 Applications Electronic Mail. 2 Electronic Mail Many user applications use client-server architecture. Electronic mail client accepts mail.
9/15/2015© 2008 Raymond P. Jefferis IIILect Application Layer.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 3.1 Internet Applications Ch. 31,32,34 (DNS, , TELNET, FTP)
Simple Mail Transfer Protocol (SMTP)
1 Applications Computer Networks. 2 Where are we?
File Transfer Protocol (FTP)
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
File Transfer And Access Chapter 26 Chapter 26 Group 3 Presentation Deepak Mittal Nishit Ranjan Venugopal Janapati Amit Palshikar Ref: Internetworking.
TFTP: Trivial file transfer protocol
1 Chapter 34 Internet Applications (Telnet, FTP).
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 26 SMTP and FTP.
File Transfer Protocol (FTP)
CS440 Computer Networks 1 Neil Tang 12/01/2008.
Slides based on Carey Williamson’s: FTP & SMTP1 File Transfer Protocol (FTP) r FTP client contacts FTP server at port 21, specifying TCP as transport protocol.
File Transfer And Access (FTP, TFTP, NFS). Remote File Access, Transfer and Storage Networks For different goals variety of approaches to remote file.
COMP 431 Internet Services & Protocols
1 Kyung Hee University Chapter 22 Simple Mail Transfer Protocol (SMTP)
Chapter 26 SMTP and FTP 26.1 Electronic Mail Sending/Receiving Mail Addresses User Agent MIME Mail Transfer Agent Mail Access Protocols.
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
© MMII JW RyderCS 428 Computer Networks1 Electronic Mail  822, SMTP, MIME, POP  Most widely used application service  Sometimes only way a person ever.
Applications:Electronic Mail (SMTP,POP,IMAP,MIME)
Networking Applications
Instructor Materials Chapter 5 Providing Network Services
Domain Name System (DNS)
FTP Lecture supp.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Working at a Small-to-Medium Business or ISP – Chapter 7
FTP & TFTP Server Ferry Astika Saputra.
File Transfer and access
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
Chapter 2: Application layer
Internet Applications (Telnet, FTP)
Presentation transcript:

COS 420 DAY 25

Agenda Group Project Discussion Final Paper Due April 29 User Manual Protocol Definition Program requirements Technical Specifications Applications and Presentation Due May 4 10AM Final Exam available Thursday April 29 Due Tuesday May 4 10AM Assignment 4 is posted Due April 29 2PM Today we will discuss Domain Name Systems, File Transfer Applications and Applications.

Domain Name Resolution Conceptually, must search from root of tree downward In practice Every name server knows location of a root server Only contacts root if no subdomain known Lookup always starts with local server first (host can learn address of DNS server from DHCP)

Efficient Translation Facts Most lookups refer to local names Name-to-address bindings change infrequently User is likely to repeat same lookup To increase efficiency Initial contact begins with local name server Every server caches answers (owner specifies cache timeout)

Domain Server Message Format

Parameter Bits

Format Of Question Section

Format Of Resource Records

Abbreviation Of Domain Names DNS only recognizes full domain names Client software allows abbreviation

Example Of Domain Name Abbreviation Client configured with suffix list. cs. purdue. edu. cc. purdue. edu. purdue. edu null User enters abbreviation xinu Client tries the following in order xinu. cs. purdue. edu xinu. cc. purdue. edu xinu. purdue. edu xinu

The Point About Abbreviation The Domain Name System only maps full domain names into addresses; abbreviations are not part of the domain name system itself, but are introduced by client software to make local names convenient for users.

Inverse Query Map in reverse direction Excessive overhead May not have unique answer Not used in practice

Pointer Query Special case of inverse mapping Convert IP address to domain name Trick: write IP address as a string and look up as a name

Example Of Pointer Query Start with dotted decimal address such as aaa.bbb.ccc.ddd Rearrange dotted decimal representation as a string: ddd.ccc.bbb.aaa.in-addr.arpa Look up as a pointer query

Object Types That DNS Supports

Summary Domain name system provides mapping from pronounceable names to IP addresses Domain names are hierarchical; top-level domains are dictated by a central authority Organizations can choose how to structure their domain names DNS uses on-line servers to answer queries Lookup begins with local server, which caches entries

PART XXVI APPLICATIONS: FILE TRANSFER AND ACCESS (FTP, TFTP, NFS)

On-Line File Sharing Always a popular application Two basic paradigms Whole-file copying Piecewise file access Piecewise access mechanism Opaque: application uses special facilities to access remote file Transparent: application uses same facilities to access local and remote files

File Transfer Whole file copying Client Contacts server Specifies file Specifies transfer direction Server Maintains set of files on local disk Waits for contact Honors request from client

File Transfer Protocol (FTP) Major TCP/IP protocol for whole-file copying Uses TCP for transport Features Interactive access Format specification (ASCII or EBCDIC) Authentication control (login and password)

FTP Process Model Separate processes handle Interaction with user Individual transfer requests

FTP’s Use of TCP Connections Data transfer connections and the data transfer processes that use them can be created dynamically when needed, but the control connection persists throughout a session. Once the control connection disappears, the session is terminated and the software at both ends terminates all data transfer processes.

Control Connection Vs. Data Connection For data transfer, client side becomes server and server side becomes client Client Creates process to handle data transfer Allocates port and sends number to server over control connection Process waits for contact Server Receives request Creates process to handle data transfer Process contacts client-side

Question For Discussion What special relationship is required between FTP and NAT? Firewalls?

Interactive Use Of FTP Initially a command-line interface User invokes client and specifies remote server User logs in and enters password User issues series of requests User closes connection Currently Most FTP initiated through browser User enters URL or clicks on link Browser uses FTP to contact remote server and obtain list of files User selects file for download

Interactive FTP Commands ! cr macdef proxy send $ delete mdelete sendport status account debug mdir put struct append dir mget pwd sunique ascii disconnect mkdir quit tenex bell form mls quote trace binary get mode recvtype bye glob mput remotehelp user Casehash nmap rename verbose cd help ntrans reset ? cdup lcd open rmdir close ls prompt runique

Anonymous FTP Login anonymous Password guest or address Used for ‘‘open’’ FTP site (where all files are publicly available)

Trivial File Transfer Protocol (TFTP) Alternative to FTP Whole-file copying Not as much functionality as FTP Code is much smaller Intended for use on Local Area Network Runs over UDP Diskless machine can use to obtain image at bootstrap

TFTP Packet Types

TFTP Retransmission Symmetric (both sides implement timeout and retransmission) Data block is request for ACK ACK is request for next data block

Sorcerer’s Apprentice Bug Consequence of symmetric retransmission Duplicate packet is perceived as second request, which generates another transmission Duplicate response triggers duplicate packets from the other end Cycle continues

Network File System (NFS) Protocol for file access, not copying Developed by Sun Microsystems, now part of TCP/IP standards Transparent (application cannot tell that file is remote)

NFS Implementation

Remote Procedure Call (RPC) Also developed by Sun Microsystems, now part of TCP/IP standards Used in implementation of NFS Relies on eXternal Data Representation (XDR) standard for conversion of data items between heterogeneous computers

Summary Two paradigms for remote file sharing Whole file copying Piecewise file access File Transfer Protocol (FTP) Standard protocol for file copying Uses TCP Separate TCP connections for control and each data transfer Client-server roles reversed during formation of data connection

Summary (continued) Trivial File Transfer Protocol (TFTP) Alternative to FTP for file copying Uses UDP Intended for Local Area Network Symmetric retransmission Packet duplication results in Sorcerer’s Apprentice problem Network File System (NFS) Standard protocol for piecewise file access Uses RPC and XDR

PART XXVII APPLICATIONS: ELECTRONIC MAIL (SMTP, POP, IMAP, MIME)

Electronic Mail Among most widely used Internet services Two major components User interface Mail transfer software Paradigm: transfer is separate background activity

Illustration Of System Components

Mailbox Names And Aliases destination identified by pair ( mailbox, computer ) Aliases permitted (user enters alias that is expanded)

Forwarding Powerful idea arriving on a computer can be forwarded to an ultimate destination

Illustration Of Aliases And Forwarding

TCP/IP Standards For Syntax for addresses Format of message Protocols for transfer and mailbox access

Address Syntax Mailbox identified by string String computer is domain name of computer on which a mailbox resides String mailbox is unique mailbox name on the destination computer

Format Of Message Message consists of Header Blank line Body of message Headers have form keyword : information Standard given in RFC 2822

Protocol For Transfer Specifies interaction between transfer components Transfer client Transfer server Standard protocol is Simple Mail Transfer Protocol (SMTP)

SMTP Application-level protocol Uses TCP Commands and responses encoded in ASCII

Example Of SMTP S: 220 Beta.GOV Simple Mail Transfer Service Ready C: HELO Alpha.EDU S: 250 Beta.GOV C: MAIL FROM: S: 250 OK C: RCPT TO: S: 250 OK C: RCPT TO: S: 550 No such user here C: RCPT TO: S: 250 OK C: DATA S: 354 Start mail input; end with. C:...sends body of mail message... C:...continues for as many lines as message contains C:. S: 250 OK C: QUIT S: 221 Beta.GOV Service closing transmission channel

Protocol For Mailbox Access Used when user’s mailbox resides on remote computer Especially helpful when user’s local computer is not always on-line Two protocols exist Post Office Protocol version 3 (POP3) Internet Message Access Protocol (IMAP) Each provides same basic functionality User authentication Mailbox access commands

Multipurpose Internet Mail Extensions (MIME) Permits nontextual data to be sent in Graphics image Voice or video clip Sender Encodes binary item into printable characters Places in message for transfer Receiver Receives message containing encoded item Decodes message to extract original binary value

MIME Header Header in message describes encoding used Example From: To: MIME-Version: 1.0 Content-Type: image/gif Content-Transfer-Encoding: base64...data for the image...

Seven Basic MIME Types

Example Of Mixed / Multipart Message From: To: MIME-Version: 1.0 Content-Type: Multipart/Mixed; Boundary=StartOfNextPart --StartOfNextPart John, Here is the photo of our research lab I promised to send you. You can see the equipment you donated. Thanks again, Bill --StartOfNextPart Content-Type: image/gif Content-Transfer-Encoding: base64...data for the image...

Summary is implemented at application layer Conceptual separation between User interface Mail transfer components Simple Mail Transfer Service (SMTP) Standard for transfer Uses ASCII encoding Post Office Protocol (POP) And Internet Mail Access Protocol (IMAP) allow access of remote mailbox. Multipurpose Internet Mail Extensions (MIME) permits transfer of nontextual information (e.g., images)