Communications and Networks Lecture 5 Instructor: Rina Zviel-Girshin.

Slides:



Advertisements
Similar presentations
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Advertisements

1 Electronic Mail u Three major components: u user agents u mail servers u simple mail transfer protocol: SMTP u User Agent u a.k.a. “mail reader” u composing,
Application Layer  We will learn about protocols by examining popular application-level protocols  HTTP  FTP  SMTP / POP3 / IMAP  Focus on client-server.
2: Application Layer1 ECE5650 FTP, , DNS, and P2P.
Layer Aplikasi Risanuri Hidayat. Applications and application-layer protocols Application: communicating, distributed processes –e.g., , Web, P2P.
2: Application Layer1 FTP, SMTP and DNS. 2: Application Layer2 FTP: separate control, data connections r FTP client contacts FTP server at port 21, specifying.
CPSC 441: FTP & SMTP1 Application Layer: FTP & Instructor: Carey Williamson Office: ICT Class.
Chapter 2: Application layer  2.1 Web and HTTP  2.2 FTP 2-1 Lecture 5 Application Layer.
2: Application Layer1 Traceroute – roundtrip times from source to the given hop traceroute to ( ), 30 hops max, 38 byte packets.
Electronic Mail and SMTP
Ftp: File Transfer Protocol  ftp specification: RFC 959 ( file transfer FTP server FTP user interface FTP client local.
Application Layer  We will learn about protocols by examining popular application-level protocols  HTTP  FTP  SMTP / POP3 / IMAP  Focus on client-server.
Chapter 2: Application layer  2.1 Web, HTTP and HTML (We will continue…)  2.2 FTP  2.3 SMTP 9/22/2009 Lecture 7, MAT 279, Fall
Esimerkki: Sähköposti. Lappeenranta University of Technology / JP, PH, AH Electronic Mail Three major components: user agents mail servers simple mail.
Simple Mail Transfer Protocol
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Mail Server Fitri Setyorini. Content SMTP POP3 How mail server works IMAP.
-I CS-3505 Wb_ -I.ppt. 4 The most useful feature of the internet 4 Lots of different programs, but most of them can talk to each.
1 Lecture #3 Electronic Mail Protocols HAIT Summer 2005 Shimrit Tzur-David.
Electronic Mail Three major components: SMTP user agents mail servers
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
SMTP, POP3, IMAP.
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
Trying out HTTP (client side) for yourself
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Lecture51 Administrative Things r Grader: Yona Raekow Office hours: Wed. 1pm-3pm or Th. 11am-1pm r Homeworks.
CSE401N: Computer Networks Lecture-5 Electronic Mail S. M. Hasibul Haque Lecturer Dept. of CSE, BUET.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
Intro to Computer Networks Bob Bradley The University of Tennessee at Martin.
Review: –How do we address “a network end-point”? –What services are provided by the Internet? –What is the network logical topology observed by a network.
Application Layer Protocols Simple Mail Transfer Protocol.
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
Lecturer: Maxim Podlesny Sep CSE 473 File Transfer and Electronic in Internet.
DNS,SMTP,MIME.
Fall 2005 By: H. Veisi Computer networks course Olum-fonoon Babol Chapter 7 The Application Layer.
2: Application Layer1 Reminder r Homework 1 for Wednesday: m Problems #3-5,11,16,18-20 m Half of the problems will be graded r Feel free to send me .
Computer Networks26-1 Chapter 26. Remote Logging, Electronic Mail and File Transfer.
FTP (File Transfer Protocol) & Telnet
Simple Mail Transfer Protocol (SMTP)
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_c Application Protocols: HTTP, FTP, SMTP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part.
File Transfer Protocol (FTP)
Application Layer1 Electronic Mail. Application Layer2 Electronic Mail Three major components: r user agents r mail servers r simple mail transfer protocol:
1 SMTP - Simple Mail Transfer Protocol –RFC 821 POP - Post Office Protocol –RFC 1939 Also: –RFC 822 Standard for the Format of ARPA Internet Text.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 8 Omar Meqdadi Department of Computer Science and Software Engineering University of.
CIS679: Lecture 13 r Review of Last Lecture r More on HTTP.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
Slides based on Carey Williamson’s: FTP & SMTP1 File Transfer Protocol (FTP) r FTP client contacts FTP server at port 21, specifying TCP as transport protocol.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
World Wide Web r Most Web pages consist of: m base HTML page, and m several referenced objects addressed by a URL r URL has two components: host name and.
COMP 431 Internet Services & Protocols
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
Dr. Adil Yousif University of Alneelian – Master of CS - IT Electronic Mail.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
Dibyajit Computer Security Hacking dibyajit
SMTP - Simple Mail Transfer Protocol POP - Post Office Protocol
Networking Applications
Remote Logging, Electronic Mail, and File Transfer
Application layer 1 Principles of network applications 2 Web and HTTP
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Session 4 INST 346 Technologies, Infrastructure and Architecture
CS4470 Computer Networking Protocols
SMTP, POP3, IMAP.
Chapter 2: Application layer
Internet and Intranet Protocols and Applications
The Application Layer: SMTP, FTP
Chapter 2 Application Layer
Part II Application Layer.
Presentation transcript:

Communications and Networks Lecture 5 Instructor: Rina Zviel-Girshin

2 Lecture overview  Proxy  Mail  Web-mail

3 Proxy  One of the definitions: The person who is authorized to act or vote for another  Why not to use in CS? Proxy - or Proxy Server – is a technique used to cache information on a Web server. Proxy acts as an intermediary between a Web client and that Web server.

4 Proxy server  Caching responses  Anonymizing clients  Transforming requests and responses  Gateway to non-HTTP systems  Filtering requests and responses  Firewall Proxy: A program in the path between the user agent (web- browser) and an origin server that functions as server to the user agent and as client to the origin server client Proxy server client http request http response http request http response http request http response origin server origin server

5 Steps in a browser process with proxy in the path URL 1 query 2 TCP Connection 3 HTTP Request 8 HTTP Response 9 Optional parallel connections Browser Proxy DNS server Origin server 5 TCP Connection 6 HTTP Request 7 HTTP Response 10 Optional parallel connections 4

6 Proxy chain on the web clientproxy-1proxy-norigin server …

7 Web Caches (proxy server)  User sets browser: web accesses via web cache  Client sends all http requests to web cache if object at web cache, web cache immediately returns object in http response else requests object from origin server, then returns http response to client Goal: satisfy client request without involving origin server client Proxy server client http request http response http request http response http request http response origin server origin server Cache: Store of messages used to reduce user-perceived latency and load on the network and server

8 Why Web Caching? Assume: cache is “close” to client (e.g., in same network)  smaller response time: cache “closer” to client  decrease traffic to distant servers link out of institutional/local ISP network often bottleneck origin servers public Internet institutional network 10 Mbps LAN 1.5 Mbps access link institutional cache

9 Example

10 Improve Performance  Proxy servers can dramatically improve performance for groups of users Application level proxy saves the results of all requests for a certain amount of time in order to provide quicker access and to increase server security (since usually one proxy server is used by all clients connected to a subnet).  Since the proxy server is often on the same network as the user, this is a much faster operation. This is common for an ISP especially if they have a slow link to the Internet.  Proxy servers also allow direct Internet access from behind a firewall. An application-level proxy makes a firewall safely permeable for users in an organization, without creating a potential security hole through which one might get into the subnet.

11 Filter Requests  Proxy servers can also be used to filter requests.  For example a company might use a proxy server to prevent its employees from accessing a specific set of web sites.  A good proxy system gives suitable tools for managing and controlling the data flow: user authorization for accessing sites, blocking "strangers" trying to get into the local net, tracing users operations storing some common information for the benefit of all the net users without the need to bring it again from outside.

12 Filtering  URL based filtering: prevent visiting a set of sites considered to be unsuitable  Filtering requests to search engines when certain keywords appear in the search string  Remove certain headers (such as user’s )  May removes certain request/responses in certain media formats  Check responses for security risks (viruses, java applets,..)

13 Proxy gateway  Applications do not have to provide native support for all protocols.  They can rely on the support of proxies and gateways to help doing the job.  Transactions of a client with the proxy server done using HTTP only, even when accessing a resource served by a remote server using another protocol: HTTP, Gopher, FTP. Gateway - hardware or software set-up that translates between two dissimilar protocols, or any mechanism for providing access to another system.

14 Gateway to non-HTTP systems Client 1 Client 2 proxy A A F Mail server M Proxy servers can serve as "protocol translators" which can convert a request in the HTTP protocol to an equivalent request in another protocol, for example FTP or Gopher. HTTP server

15 Gateway  A gateway is a network point that acts as an entrance to another network.  On the Internet, a node or stopping point can be either a gateway node or a host node.  The computers that control traffic within your company's network or at your local ISP are gateway nodes.

16 Electronic Mail Three major components:  user agents  mail servers  simple mail transfer protocol: smtp User Agent  Also known as - “mail reader”  composing, editing, reading mail messages  e.g., Eudora, Outlook, elm, Netscape Messenger  outgoing, incoming messages stored on server user mailbox outgoing message queue mail server SMTP mail server mail server user agent user agent user agent user agent user agent

17 Electronic Mail: mail servers Mail Servers  mailbox contains incoming messages (yet to be read) for user  message queue of outgoing (to be sent) mail messages  smtp protocol between mail servers to send messages client: sending mail server “server”: receiving mail server mail server SMTP mail server mail server user agent user agent user agent user agent SMTP user agent

18 Direct transfer from sending server to receiving server

19 Scenario: Alice sends message to Bob 1) Alice uses UA to compose message and “to” 2) Alice’s UA sends message to her mail server; message placed in message queue 3) Client side of SMTP opens TCP connection with Bob’s mail server 4) SMTP client sends Alice’s message over the TCP connection 5) Bob’s mail server places the message in Bob’s mailbox 6) Bob invokes his user agent to read message user agent mail server mail server user agent

20 Simple Mail Transfer Protocol [RFC 821]  Uses TCP to transfer msg on port 25 (uses persistent connections)  Three phases of transfer handshaking (greeting) transfer of messages closure  Command/response interaction commands: ASCII text response: status code and phrase  smtp server uses CRLF.CRLF to determine end of message  Messages must be in 7-bit ASCII (header & body)  Thus, message has to be encoded (base-64 or quoted printable)

21 Sample SMTP interaction S: 220 hamburger.edu C: HELO crepes.fr S: 250 Hello crepes.fr, pleased to meet you C: MAIL FROM: S: 250 Sender ok C: RCPT TO: S: 250 Recipient ok C: DATA S: 354 Enter mail, end with "." on a line by itself C: Do you like ketchup? C: How about pickles? C:. S: 250 Message accepted for delivery C: QUIT S: 221 hamburger.edu closing connection

22 Comparison with HTTP  http: pull  smtp: push  http: have ASCII command/response interaction, status codes  smtp: same as above  http: response includes a Content-length: header  smtp: the body ends with “ CRLF.CRLF ’’  http: each object is encapsulated in its own response message  smtp: multiple objects message sent in a multipart message

23 Mail access protocols  SMTP: delivery/storage to receiver’s server  Mail access protocol: retrieval from server POP: Post Office Protocol [RFC 1939] (used to retrieve from a mail server) authorization (agent server) and download IMAP: Internet Mail Access Protocol [RFC 1730] more features (more complex) manipulation of stored msgs on server HTTP: Hotmail, Yahoo! Mail, etc. sender’s mail server SMTP POP3 or IMAP receiver’s mail server user agent user agent

24 POP3 protocol [RFC 1939] authorization phase  client commands: user: declare username pass: password  server responses +OK -ERR transaction phase, client:  list: list message numbers  retr: retrieve message by number  dele: delete  quit C: list S: S: S:. C: retr 1 S: S:. C: dele 1 C: retr 2 S: S:. C: dele 2 C: quit S: +OK POP3 server signing off S: +OK POP3 server ready C: user alice S: +OK C: pass hungry S: +OK user successfully logged on port 110

25 IMAP protocol [RFC 1999]  Many more features than POP3, but complex  Allow users to manipulate remote mailboxes (search)  Maintain a folder hierarchy for each user  Allow to obtain components of messages

26 Web-based sender’s mail server HTTPSMTPHTTP receiver’s mail server Web Mail is a server-based system that allows you to access your account from the World Wide Web. You can send and receive messages from almost any computer that is connected to the Internet. Web Mail uses the HTTP protocol user agent user agent

27 Web-mail features  Sending messages to multiple recipients.  Sending up to five file attachments per message.  Automatically adding personal signatures to outgoing messages.  Creating personal folders to archive or categorize your messages.  An online address book.

28 Mail message format smtp: protocol for exchanging msgs RFC 822: standard for text message format:  header lines, e.g., To: From: Subject: different from smtp commands!  body the “message”, ASCII characters only!!! header body blank line

29 HTML and  In browser environment you can invoke client mail service by using:  Simple mailto:  Mail to multiple recipients  Mail with subject

30 Any questions?