26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.

Slides:



Advertisements
Similar presentations
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Advertisements

TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 22 World Wide Web and HTTP.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Ferry Astika Saputra Workshop Administrasi Jaringan TELNET & SSH.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 23 Electronic Mail: SMTP,
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture.
Remote Login: TELNET and
CPSC 441: FTP & SMTP1 Application Layer: FTP & Instructor: Carey Williamson Office: ICT Class.
File Transfer: FTP and TFTP
Chapter 2: Application layer  2.1 Web and HTTP  2.2 FTP 2-1 Lecture 5 Application Layer.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 23 Electronic Mail: SMTP,
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 21 File Transfer: FTP and.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 20 File Transfer Protocol (FTP)
Esimerkki: Sähköposti. Lappeenranta University of Technology / JP, PH, AH Electronic Mail Three major components: user agents mail servers simple mail.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 20 File Transfer Protocol (FTP)
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
File Transfer Protocol (FTP)
Electronic Mail: SMTP, POP, and IMAP
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
Process-to-Process Delivery:
SMTP, POP3, IMAP.
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
4-Traditional Internet Applications Dr. John P. Abraham Professor UTPA.
CSE401N: Computer Networks Lecture-5 Electronic Mail S. M. Hasibul Haque Lecturer Dept. of CSE, BUET.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
Review: –How do we address “a network end-point”? –What services are provided by the Internet? –What is the network logical topology observed by a network.
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
4-Traditional Internet Applications Dr. John P. Abraham Professor UTPA.
School of Electronics and Telecommunications 1/25 Presented by: Pham Van Chi Bui Thi The Ha Electronic Mail: SMTP.
TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Computer Networks26-1 Chapter 26. Remote Logging, Electronic Mail and File Transfer.
Simple Mail Transfer Protocol (SMTP)
File Transfer Protocol (FTP)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 19 TELNET and Rlogin.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Network Protocols Chapter 26 (Data Communication and Networking): Remote Logging, Electronic Mail, and.
1 SMTP - Simple Mail Transfer Protocol –RFC 821 POP - Post Office Protocol –RFC 1939 Also: –RFC 822 Standard for the Format of ARPA Internet Text.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
TCP/IP Protocol Suite 1 Chapter 19 Upon completion you will be able to: File Transfer: FTP and TFTP Understand the connections needed for FTP file transfer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 26 SMTP and FTP.
TELNET 1.TELNET 2.SSH. TELNET  TELNET is an abbreviation for TErminaL NETwork.  It is the standard TCP/IP protocol for virtual terminal service as proposed.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
27.1 Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
27.1 Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Slides based on Carey Williamson’s: FTP & SMTP1 File Transfer Protocol (FTP) r FTP client contacts FTP server at port 21, specifying TCP as transport protocol.
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Electronic Mail: SMTP, POP IMAP, and MIME.
Ch26 Ameera Almasoud 1 Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007.
1 Kyung Hee University Chapter 22 Simple Mail Transfer Protocol (SMTP)
1 Architecture 2 User Agent 3 Message Transfer Agent 4 Message Access Agent 5 MIME 6 Web-Based Mail 7 Electronic Mail Security.
Chapter 26 SMTP and FTP 26.1 Electronic Mail Sending/Receiving Mail Addresses User Agent MIME Mail Transfer Agent Mail Access Protocols.
27.1 Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
Chapter 26 Standard Client-Server Protocols Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 21 File Transfer: FTP and.
Chapter 26 Standard Client-Server Protocols
Remote Logging, Electronic Mail, and File Transfer
Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
File Transfer: FTP Objectives Chapter 19
UNIT V APPLICATION LAYER.
Remote Login: Telnet Objectives Chapter 18
Chapter 2: Application layer
Remote Logging, Electronic Mail,
Chapter 27 WWW and HTTP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 7 Network Applications
Chapter 2 Application Layer
Presentation transcript:

26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

REMOTE LOGGING It would be impossible to write a specific client/server program for each demand. The better solution is a general-purpose client/server program that lets a user access any application program on a remote computer. TELNET Topics discussed in this section:

26.3 TELNET is a general-purpose client/server application program. Note

26.4 Figure 26.1 Local and remote log-in

26.5 Figure 26.2 Concept of NVT

26.6 Table 26.1 Some NVT control characters

26.7 Figure 26.3 An example of embedding

26.8 Table 26.2 Options

26.9 Table 26.3 NVT character set for option negotiation

26.10 Figure 26.4 shows an example of option negotiation. In this example, the client wants the server to echo each character sent to the server. The echo option is enabled by the server because it is the server that sends the characters back to the user terminal. Therefore, the client should request from the server the enabling of the option using DO. The request consists of three characters: IAC, DO, and ECHO. The server accepts the request and enables the option. It informs the client by sending the three-character approval: IAC, WILL, and ECHO. Example 26.1

26.11 Figure 26.4 Example 26.1: Echo option

26.12 Table 26.4 Character set for suboptions

26.13 Figure 26.5 shows an example of suboption negotiation. In this example, the client wants to negotiate the type of the terminal. Example 26.2

26.14 Figure 26.5 Example of suboption negotiation

ELECTRONIC MAIL One of the most popular Internet services is electronic mail ( ). The designers of the Internet probably never imagined the popularity of this application program. Its architecture consists of several components that we discuss in this chapter. Architecture User Agent Message Transfer Agent: SMTP Message Access Agent: POP and IMAP Web-Based Mail Topics discussed in this section:

26.16 Figure 26.6 First scenario in electronic mail

26.17 When the sender and the receiver of an are on the same system, we need only two user agents. Note

26.18 Figure 26.7 Second scenario in electronic mail

26.19 When the sender and the receiver of an are on different systems, we need two UAs and a pair of MTAs (client and server). Note

26.20 Figure 26.8 Third scenario in electronic mail

26.21 When the sender is connected to the mail server via a LAN or a WAN, we need two UAs and two pairs of MTAs (client and server). Note

26.22 Figure 26.9 Fourth scenario in electronic mail

26.23 Figure Push versus pull in electronic

26.24 When both sender and receiver are connected to the mail server via a LAN or a WAN, we need two UAs, two pairs of MTAs and a pair of MAAs. This is the most common situation today. Note

26.25 Figure Services of user agent

26.26 Some examples of command-driven user agents are mail, pine, and elm. Note

26.27 Some examples of GUI-based user agents are Eudora, Outlook, and Netscape. Note

26.28 Figure Format of an

26.29 Figure address

26.30 Figure MIME

26.31 Figure MIME header

26.32 Table 26.5 Data types and subtypes in MIME

26.33 Table 26.6 Content-transfer-encoding

26.34 Figure SMTP range

26.35 Figure Commands and responses

26.36 Figure Command format

26.37 Table 26.7 Commands

26.38 Table 26.8 Responses

26.39 Table 26.8 Responses (continued)

26.40 Let us see how we can directly use SMTP to send an and simulate the commands and responses we described in this section. We use TELNET to log into port 25 (the well-known port for SMTP). We then use the commands directly to send an . In this example, is sending an to himself. The first few lines show TELNET trying to connect to the Adelphia mail server. After connection, we can type the SMTP commands and then receive the responses, as shown on the next slide. Note that we have added, for clarification, some comment lines, designated by the “=” signs. These lines are not part of the procedure. Example 26.3

26.41 Example 26.3 (continued) $ telnet mail.adelphia.net 25 Trying Connected to mail.adelphia.net ( ).

26.42 Example 26.3 (continued)

26.43 Example 26.3 (continued)

26.44 Figure POP3 and IMAP4

26.45 Figure The exchange of commands and responses in POP3

FILE TRANSFER Transferring files from one computer to another is one of the most common tasks expected from a networking or internetworking environment. As a matter of fact, the greatest volume of data exchange in the Internet today is due to file transfer. File Transfer Protocol (FTP) Anonymous FTP Topics discussed in this section:

26.47 FTP uses the services of TCP. It needs two TCP connections. The well-known port 21 is used for the control connection and the well-known port 20 for the data connection. Note

26.48 Figure FTP

26.49 Figure Using the control connection

26.50 Figure Using the data connection

26.51 The following shows an actual FTP session for retrieving a list of items in a directory. The colored lines show the responses from the server control connection; the black lines show the commands sent by the client. The lines in white with a black background show data transfer. 1. After the control connection is created, the FTP server sends the 220 response. 2. The client sends its name. 3. The server responds with 331. Example 26.4

The client sends the password (not shown). 5. The server responds with 230 (user log-in is OK). 6. The client sends the list command (ls reports) to find the list of files on the directory named report. 7. Now the server responds with 150 and opens the data connection. 8. The server then sends the list of the files or directories on the data connection. Example 26.4 (continued) 9. The client sends a QUIT command. 10. The server responds with 221.

26.53 Example 26.4 (continued)

26.54 We show an example of anonymous FTP. We assume that some public data are available at internic.net. Example 26.5 We show an example of anonymous FTP. We assume that some public data are available at internic.net. continued on next slide

26.55 Example 26.5 (continued)