SlideShare a Scribd company logo
1 of 55
Chapter 26 Remote Logging,  Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
26-1  REMOTE LOGGING It would be impossible to write a specific client/server program for each demand. The better solution is a general-purpose client/server program that lets a user access any application program on a remote computer. TELNET Topics discussed in this section:
TELNET is a general-purpose client/server application program. Note
Figure 26.1  Local and remote log-in
Figure 26.2  Concept of NVT
Table 26.1  Some NVT control characters
Figure 26.3  An example of embedding
Table 26.2  Options
Table 26.3  NVT character set for option negotiation
Figure 26.4 shows an example of option negotiation. In this example, the client wants the server to echo each character sent to the server. The echo option is enabled by the server because it is the server that sends the characters back to the user terminal. Therefore, the client should request from the server the enabling of the option using DO. The request consists of three characters: IAC, DO, and ECHO. The server accepts the request and enables the option. It informs the client by sending the three-character approval: IAC, WILL, and ECHO. Example 26.1
Figure 26.4  Example 26.1: Echo option
Table 26.4  Character set for suboptions
Figure 26.5 shows an example of suboption negotiation. In this example, the client wants to negotiate the type  of the terminal. Example 26.2
Figure 26.5  Example of suboption negotiation
26-2  ELECTRONIC MAIL One of the most popular Internet services is electronic mail (e-mail). The designers of the Internet probably never imagined the popularity of this application program. Its architecture consists of several components that we discuss in this chapter. Architecture User Agent Message Transfer Agent: SMTP Message Access Agent: POP and IMAP Web-Based Mail Topics discussed in this section:
Figure 26.6  First scenario in electronic mail
When the sender and the receiver of an e-mail are on the same system, we need only two user agents. Note
Figure 26.7  Second scenario in electronic mail
When the sender and the receiver of an e-mail are on different systems, we need two UAs and a pair of  MTAs (client and server). Note
Figure 26.8  Third scenario in electronic mail
When the sender is connected to the mail server via a LAN or a WAN, we need two UAs and two pairs of MTAs (client and server). Note
Figure 26.9  Fourth scenario in electronic mail
Figure 26.10  Push versus pull in electronic email
When both sender and receiver are connected to the mail server via  a LAN or a WAN, we need two  UAs, two pairs of MTAs  and a pair of MAAs. This is the most common situation today. Note
Figure 26.11  Services of user agent
Some examples of command-driven user agents are  mail ,  pine ,  and  elm . Note
Some examples of GUI-based user agents are  Eudora ,  Outlook , and  Netscape . Note
Figure 26.12  Format of an e-mail
Figure 26.13  E-mail address
Figure 26.14  MIME
Figure 26.15  MIME header
Table 26.5  Data types and subtypes in MIME
Table 26.6  Content-transfer-encoding
Figure 26.16  SMTP range
Figure 26.17  Commands and responses
Figure 26.18  Command format
Table 26.7  Commands
Table 26.8  Responses
Table 26.8  Responses  (continued)
Let us see how we can directly use SMTP to send an  e-mail and simulate the commands and responses we described in this section. We use TELNET to log into port 25 (the well-known port for SMTP). We then use the commands directly to send an e-mail. In this example, forouzanb@adelphia.net is sending an e-mail to himself. The first few lines show TELNET trying to connect to the Adelphia mail server. After connection, we can type the SMTP commands and then receive the responses, as shown on the next slide. Note that we have added, for clarification, some comment lines, designated by the “=” signs. These lines are not part of the e-mail procedure. Example 26.3
Example 26.3 (continued) $ telnet mail.adelphia.net 25 Trying 68.168.78.100 . . . Connected to mail.adelphia.net (68.168.78.100).
Example 26.3 (continued)
Example 26.3 (continued)
Figure 26.19  POP3 and IMAP4
Figure 26.20  The exchange of commands and responses in POP3
26-3  FILE TRANSFER Transferring files from one computer to another is one of the most common tasks expected from a networking or internetworking environment. As a matter of fact, the greatest volume of data exchange in the Internet today is due to file transfer.  File Transfer Protocol (FTP) Anonymous FTP Topics discussed in this section:
FTP uses the services of TCP. It needs two TCP connections. The well-known port 21 is used for the control connection and the well-known port 20 for the data connection. Note
Figure 26.21  FTP
Figure 26.22  Using the control connection
Figure 26.23  Using the data connection
The following shows an actual FTP session for retrieving a list of items in a directory. The colored lines show the responses from the server control connection; the black lines show the commands sent by the client. The lines in white with a black background show data transfer. 1.  After the control connection is created, the FTP server   sends the 220 response. 2.  The client sends its name. 3.  The server responds with 331. Example 26.4
4.  The client sends the password (not shown). 5 . The server responds with 230 (user log-in is OK). 6.  The client sends the list command (ls reports) to find   the list of files on the directory named report. 7.  Now the server responds with 150 and opens the data   connection. 8.  The server then sends the list of the files or directories   on the data connection. Example 26.4 (continued) 9.  The client sends a QUIT command. 10.  The  server responds with 221.
Example 26.4 (continued)
We show an example of anonymous FTP. We assume that some public data are available at internic.net. Example 26.5 We show an example of anonymous FTP. We assume that some public data are available at internic.net. continued on next slide
Example 26.5 (continued)

More Related Content

What's hot (20)

Chapter 23
Chapter 23Chapter 23
Chapter 23
 
Chapter 19
Chapter 19Chapter 19
Chapter 19
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Chapter 19: Logical Addressing
Chapter 19: Logical AddressingChapter 19: Logical Addressing
Chapter 19: Logical Addressing
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTPTRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
 
IP Routing
IP RoutingIP Routing
IP Routing
 
Multicastingand multicast routing protocols
Multicastingand multicast routing protocolsMulticastingand multicast routing protocols
Multicastingand multicast routing protocols
 
Chapter 26
Chapter 26Chapter 26
Chapter 26
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
QOS (Quality of Services) - Computer Networks
 QOS (Quality of Services) - Computer Networks QOS (Quality of Services) - Computer Networks
QOS (Quality of Services) - Computer Networks
 
Osi model explained with wireshark
Osi model explained with wiresharkOsi model explained with wireshark
Osi model explained with wireshark
 
Ch22
Ch22Ch22
Ch22
 
Addressing
AddressingAddressing
Addressing
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Ip Addressing
Ip AddressingIp Addressing
Ip Addressing
 
Unit 4 UDP
Unit 4 UDPUnit 4 UDP
Unit 4 UDP
 

Viewers also liked (20)

Ch21
Ch21Ch21
Ch21
 
Data transmission
Data transmissionData transmission
Data transmission
 
Serial transmission
Serial transmissionSerial transmission
Serial transmission
 
Ch10
Ch10Ch10
Ch10
 
Ch25
Ch25Ch25
Ch25
 
Data communications
Data communicationsData communications
Data communications
 
Chap5 analog transmission
Chap5 analog transmissionChap5 analog transmission
Chap5 analog transmission
 
Analog Transmission
Analog TransmissionAnalog Transmission
Analog Transmission
 
Digital & analog transmission
Digital & analog transmissionDigital & analog transmission
Digital & analog transmission
 
Analog Transmission
Analog TransmissionAnalog Transmission
Analog Transmission
 
Data communication and network Chapter - 2
Data communication and network Chapter - 2Data communication and network Chapter - 2
Data communication and network Chapter - 2
 
Ch08
Ch08Ch08
Ch08
 
Ch09
Ch09Ch09
Ch09
 
Ch18
Ch18Ch18
Ch18
 
Ch15
Ch15Ch15
Ch15
 
Digital data transmission,line coding and pulse shaping
Digital data transmission,line coding and pulse shapingDigital data transmission,line coding and pulse shaping
Digital data transmission,line coding and pulse shaping
 
Ch06
Ch06Ch06
Ch06
 
Ch31
Ch31Ch31
Ch31
 
Chap 5 analog transmission
Chap 5 analog transmissionChap 5 analog transmission
Chap 5 analog transmission
 
2[1].1 data transmission
2[1].1 data transmission2[1].1 data transmission
2[1].1 data transmission
 

Similar to Chapter 26 - Remote Logging, Electronic Mail & File Transfer

26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_TransferAhmar Hashmi
 
Meeting 11. electronic mail: smtp
Meeting 11. electronic mail: smtpMeeting 11. electronic mail: smtp
Meeting 11. electronic mail: smtpSyaiful Ahdan
 
transfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imaptransfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imapAKSHIT KOHLI
 
Electronic mail chap-20
Electronic mail chap-20Electronic mail chap-20
Electronic mail chap-20Vaidik Trivedi
 
Unit 5 Email FTP Rks.pps.ppt_20240425_112130_0000.pptx
Unit 5 Email FTP Rks.pps.ppt_20240425_112130_0000.pptxUnit 5 Email FTP Rks.pps.ppt_20240425_112130_0000.pptx
Unit 5 Email FTP Rks.pps.ppt_20240425_112130_0000.pptxAdityaEM08
 
Design an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing SoftwareDesign an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing Softwarenilabarai
 
Chap 03
Chap 03Chap 03
Chap 03IGNOU
 
Electronic mail and Domain Name System
Electronic mail and Domain Name SystemElectronic mail and Domain Name System
Electronic mail and Domain Name Systemrajjo224
 
Network_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.pptNetwork_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.pptBlackHat41
 

Similar to Chapter 26 - Remote Logging, Electronic Mail & File Transfer (20)

26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer
 
Meeting 11. electronic mail: smtp
Meeting 11. electronic mail: smtpMeeting 11. electronic mail: smtp
Meeting 11. electronic mail: smtp
 
transfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imaptransfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imap
 
Ch 26
Ch 26Ch 26
Ch 26
 
Electronic mail chap-20
Electronic mail chap-20Electronic mail chap-20
Electronic mail chap-20
 
Ftp
FtpFtp
Ftp
 
Unit 5 Email FTP Rks.pps.ppt_20240425_112130_0000.pptx
Unit 5 Email FTP Rks.pps.ppt_20240425_112130_0000.pptxUnit 5 Email FTP Rks.pps.ppt_20240425_112130_0000.pptx
Unit 5 Email FTP Rks.pps.ppt_20240425_112130_0000.pptx
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
unit 3 ns.ppt
unit 3 ns.pptunit 3 ns.ppt
unit 3 ns.ppt
 
Chap 20 smtp, pop, imap
Chap 20 smtp, pop, imapChap 20 smtp, pop, imap
Chap 20 smtp, pop, imap
 
Design an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing SoftwareDesign an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing Software
 
Chap 03
Chap 03Chap 03
Chap 03
 
Ch27
Ch27Ch27
Ch27
 
Chapter 27
Chapter 27Chapter 27
Chapter 27
 
Lec2_CH02.PPT
Lec2_CH02.PPTLec2_CH02.PPT
Lec2_CH02.PPT
 
Electronic Mail
Electronic MailElectronic Mail
Electronic Mail
 
Electronic mail and Domain Name System
Electronic mail and Domain Name SystemElectronic mail and Domain Name System
Electronic mail and Domain Name System
 
Transportlayer.ppt
Transportlayer.pptTransportlayer.ppt
Transportlayer.ppt
 
Chapeter 2
Chapeter 2Chapeter 2
Chapeter 2
 
Network_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.pptNetwork_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.ppt
 

More from Wayne Jones Jnr (18)

Ch23
Ch23Ch23
Ch23
 
Ch20
Ch20Ch20
Ch20
 
Ch19
Ch19Ch19
Ch19
 
Ch17
Ch17Ch17
Ch17
 
Ch16
Ch16Ch16
Ch16
 
Ch14
Ch14Ch14
Ch14
 
Ch13
Ch13Ch13
Ch13
 
Ch12
Ch12Ch12
Ch12
 
Ch07
Ch07Ch07
Ch07
 
Operating System Concepts - Ch05
Operating System Concepts - Ch05Operating System Concepts - Ch05
Operating System Concepts - Ch05
 
Ch32
Ch32Ch32
Ch32
 
Chapter 30 - Cry
Chapter 30 - CryChapter 30 - Cry
Chapter 30 - Cry
 
Chapter 29 - Mutimedia
Chapter 29 - MutimediaChapter 29 - Mutimedia
Chapter 29 - Mutimedia
 
Ch28
Ch28Ch28
Ch28
 
Chapter 4 - Digital Transmission
Chapter 4 - Digital TransmissionChapter 4 - Digital Transmission
Chapter 4 - Digital Transmission
 
Chapter 3 - Data and Signals
Chapter 3 - Data and SignalsChapter 3 - Data and Signals
Chapter 3 - Data and Signals
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
 
Chapter 1 - Introduction
Chapter 1 - IntroductionChapter 1 - Introduction
Chapter 1 - Introduction
 

Recently uploaded

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Recently uploaded (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Chapter 26 - Remote Logging, Electronic Mail & File Transfer

  • 1. Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 26-1 REMOTE LOGGING It would be impossible to write a specific client/server program for each demand. The better solution is a general-purpose client/server program that lets a user access any application program on a remote computer. TELNET Topics discussed in this section:
  • 3. TELNET is a general-purpose client/server application program. Note
  • 4. Figure 26.1 Local and remote log-in
  • 5. Figure 26.2 Concept of NVT
  • 6. Table 26.1 Some NVT control characters
  • 7. Figure 26.3 An example of embedding
  • 8. Table 26.2 Options
  • 9. Table 26.3 NVT character set for option negotiation
  • 10. Figure 26.4 shows an example of option negotiation. In this example, the client wants the server to echo each character sent to the server. The echo option is enabled by the server because it is the server that sends the characters back to the user terminal. Therefore, the client should request from the server the enabling of the option using DO. The request consists of three characters: IAC, DO, and ECHO. The server accepts the request and enables the option. It informs the client by sending the three-character approval: IAC, WILL, and ECHO. Example 26.1
  • 11. Figure 26.4 Example 26.1: Echo option
  • 12. Table 26.4 Character set for suboptions
  • 13. Figure 26.5 shows an example of suboption negotiation. In this example, the client wants to negotiate the type of the terminal. Example 26.2
  • 14. Figure 26.5 Example of suboption negotiation
  • 15. 26-2 ELECTRONIC MAIL One of the most popular Internet services is electronic mail (e-mail). The designers of the Internet probably never imagined the popularity of this application program. Its architecture consists of several components that we discuss in this chapter. Architecture User Agent Message Transfer Agent: SMTP Message Access Agent: POP and IMAP Web-Based Mail Topics discussed in this section:
  • 16. Figure 26.6 First scenario in electronic mail
  • 17. When the sender and the receiver of an e-mail are on the same system, we need only two user agents. Note
  • 18. Figure 26.7 Second scenario in electronic mail
  • 19. When the sender and the receiver of an e-mail are on different systems, we need two UAs and a pair of MTAs (client and server). Note
  • 20. Figure 26.8 Third scenario in electronic mail
  • 21. When the sender is connected to the mail server via a LAN or a WAN, we need two UAs and two pairs of MTAs (client and server). Note
  • 22. Figure 26.9 Fourth scenario in electronic mail
  • 23. Figure 26.10 Push versus pull in electronic email
  • 24. When both sender and receiver are connected to the mail server via a LAN or a WAN, we need two UAs, two pairs of MTAs and a pair of MAAs. This is the most common situation today. Note
  • 25. Figure 26.11 Services of user agent
  • 26. Some examples of command-driven user agents are mail , pine , and elm . Note
  • 27. Some examples of GUI-based user agents are Eudora , Outlook , and Netscape . Note
  • 28. Figure 26.12 Format of an e-mail
  • 29. Figure 26.13 E-mail address
  • 30. Figure 26.14 MIME
  • 31. Figure 26.15 MIME header
  • 32. Table 26.5 Data types and subtypes in MIME
  • 33. Table 26.6 Content-transfer-encoding
  • 34. Figure 26.16 SMTP range
  • 35. Figure 26.17 Commands and responses
  • 36. Figure 26.18 Command format
  • 37. Table 26.7 Commands
  • 38. Table 26.8 Responses
  • 39. Table 26.8 Responses (continued)
  • 40. Let us see how we can directly use SMTP to send an e-mail and simulate the commands and responses we described in this section. We use TELNET to log into port 25 (the well-known port for SMTP). We then use the commands directly to send an e-mail. In this example, forouzanb@adelphia.net is sending an e-mail to himself. The first few lines show TELNET trying to connect to the Adelphia mail server. After connection, we can type the SMTP commands and then receive the responses, as shown on the next slide. Note that we have added, for clarification, some comment lines, designated by the “=” signs. These lines are not part of the e-mail procedure. Example 26.3
  • 41. Example 26.3 (continued) $ telnet mail.adelphia.net 25 Trying 68.168.78.100 . . . Connected to mail.adelphia.net (68.168.78.100).
  • 44. Figure 26.19 POP3 and IMAP4
  • 45. Figure 26.20 The exchange of commands and responses in POP3
  • 46. 26-3 FILE TRANSFER Transferring files from one computer to another is one of the most common tasks expected from a networking or internetworking environment. As a matter of fact, the greatest volume of data exchange in the Internet today is due to file transfer. File Transfer Protocol (FTP) Anonymous FTP Topics discussed in this section:
  • 47. FTP uses the services of TCP. It needs two TCP connections. The well-known port 21 is used for the control connection and the well-known port 20 for the data connection. Note
  • 49. Figure 26.22 Using the control connection
  • 50. Figure 26.23 Using the data connection
  • 51. The following shows an actual FTP session for retrieving a list of items in a directory. The colored lines show the responses from the server control connection; the black lines show the commands sent by the client. The lines in white with a black background show data transfer. 1. After the control connection is created, the FTP server sends the 220 response. 2. The client sends its name. 3. The server responds with 331. Example 26.4
  • 52. 4. The client sends the password (not shown). 5 . The server responds with 230 (user log-in is OK). 6. The client sends the list command (ls reports) to find the list of files on the directory named report. 7. Now the server responds with 150 and opens the data connection. 8. The server then sends the list of the files or directories on the data connection. Example 26.4 (continued) 9. The client sends a QUIT command. 10. The server responds with 221.
  • 54. We show an example of anonymous FTP. We assume that some public data are available at internic.net. Example 26.5 We show an example of anonymous FTP. We assume that some public data are available at internic.net. continued on next slide