System: Basic Functionality

Size: px
Start display at page:

Download "System: Basic Functionality"

Transcription

1 System: Basic Functionality systems support five basic functions: Composition: Creating messages Transfer: Moving messages from the originator to the recipient transfer is a connection-oriented process Reporting: Providing information to the sender e.g. Delivery notification Displaying: Displaying messages to the user This often requires the assistance of other programs Disposition: Managing messages e.g. deleting/saving messages etc. 1

2 System: Key Protocol Concepts Two key protocol concepts within systems: The contruction of the i.e. this is akin to the PDU The interaction between the client and server components i.e. the client and server MTA s. The itself comprises two components: The envelope: Used by message transport agents for routing and delivery It encapsulates the message It contains addressing, priority and security information etc. The message also comprises two components: The header: Contains control information used exclusively by the user agent in the preformance of its functionality The body: Destined entirely for the end-user. It is, in general, ignored by the UA and MTA (except where MIME is used) 2

3 Message Envelope and Contents 3

4 System: Message Formats The particular format of s are specified in the ARPANET RFC 822 standard This standard deals with basic ASCII s However, there are extensions to the standard RFC822 messages consist of: An envelope A number of header fields A blank line The message body 4

5 Standard UA Header Fields These header fields are used for Message Transport 5

6 Additional User Agent Header Fields These are typically used for display purposes. 6

7 Electronic Mail Architecture systems comprise two subsystems: The User Agent: This provides an interface to the system allowing users to read and send e- mail. The UA uses the UA header fields to construct the message. The Message Transfer Agent: This moves messages through the internet from the source station to the destination station. The MTA builds the envelope from some of the UA header fields 7

8 System: Architectural Components First scenario End users attach to the same mail server machine There is no client-server interaction here. 8

9 System: Architectural Components Second scenario End-users attach to separate mail server machines There is a client-server interaction here. 9

10 System: The User Agent A program that provides a user interface for managing messages and mailboxes User agent functionality: Sending s Allows the user to create a message and to enter addressing and some additional parameters Address are of specific format, typically: user@dns-address Allows the user to send copies of a message to a mailing list The user agent expands the message either locally or remotely Reading s Interrogates and displays contents of the user's mailbox Allows the user to display a message, delete a message etc. 10

11 System: The Message Transfer Agent The message transfer system is concerned with relaying messages from the sender to the recipient Within the Internet, this is achieved by having the source machine establish a TCP connection to port 25 of the destination machine On the server-side an daemon is continuously running The protocol used between the client and server is SMTP (Simple Mail Transfer Protocol) Like HTTP, SMTP is a simple ASCII protocol 11

12 System: MTA interaction using SMTP The sequence of events between an SMTP client and server is as follows: The sending machine (the client) establishes a TCP connection to port 25 of the destination machine The client waits for the the server to talk The server sends a line of text with its identity and indicating whether it is prepared to receive mail The client announces the originator and recipient of the The server verifies if the recipient exists and gives permission to the client to send the message The client sends the message and the server acknowledges it When all the has been exchanged in both directions, the connection is released 12

13 Example SMTP Interaction 13

14 System: Architectural Components Third scenario One end-user is remotely attached to their mail server machine and the other attaches directly to a separate mail server machine 14

15 System: The need for a PULL protocol Early systems assumed that the mailbox was on the end-user machine: However, the end-users machine is not always on-line s cannot be delivered when off-line This problem is solved by having the mailbox located on a separate machine e.g. an ISP machine An SMTP MTA accepts on behalf of the end-user and stores it in a local mailbox Question: If SMTP is a PUSH protocol how do end-users retrieve from their mailboxes? Answer: A seprate PULL protocol is required the Post Office Protocol (currently POP3) uses separate message transfer agents 15

16 System: Architectural Components Fourth scenario Both end-users are remotely attached to separate mail server machines 16

17 System: Architectural Components Mail User Machine Two-way mail exchange UA MTA Client MAA Client SMTP POP3/IMAP Mail Server Machine MTA Server MAA Server MSG. Queue MTA Client Local Mailboxes SMTP to remote Mail Server

18 Always On-line V Dial-up Access systems 18

19 System: MTA interaction using POP3 The sequence of events between a POP3 client and server is as follows: User runs a local mail reader (the user agent) The mail reader dials-up the ISP and establishes a TCP connection with the MTA on port 110 If successful the POP3 protocol involves three sequential steps: 1. Authorization - user logs in 2. Transactions - user collects s and marks them for deletion from the mailbox 3. Update - s are deleted from the mailbox 19

20 Example POP3 Interaction 20

21 System POP3 Shortfalls POP3 is widely used by users to access their account from a single PC However, many users want to access their e- mail account from a variety of places including: work, home, from their laptop whilst out and about etc. Whilst POP3 can be used here; it results in the user's being spread over multiple machines To address this problem an alternative final delivery protocol was developed: the Internet 21 Message Access Protocol (IMAP)

Computer Network 1 1

Computer Network 1 1 Computer Network 1 1 Chapter 10: Application Layer Advanced Principal Concepts Samples and Techniques Foundation Summary Question and Answer 2 Outline Application Layer There is a need for support protocols,

More information

Electronic Mail

Electronic Mail Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing

More information

Internet Technology. 03r. Application layer protocols: . Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 03r. Application layer protocols:  . Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 03r. Application layer protocols: email Paul Krzyzanowski Rutgers University Spring 2016 1 Email: SMTP (Simple Mail Transfer Protocol) 2 Simple Mail Transfer Protocol (SMTP) Protocol

More information

Electronic Mail Paradigm

Electronic Mail Paradigm Electronic Mail Paradigm E-mail uses the client-server model. E-mail was designed as an electronic extension of the old paper office memo. - A quick and easy means of low-overhead written communication.

More information

INTERNET & WORLD WIDE WEB (UNIT-1) MECHANISM OF INTERNET

INTERNET & WORLD WIDE WEB (UNIT-1) MECHANISM OF INTERNET INTERNET & WORLD WIDE WEB (UNIT-1) MECHANISM OF INTERNET 1. INTRODUCTION Hello friends are topic is Internet and World Wide Web the most popular services of our topic is social networking and online shopping

More information

Electronic Mail (SMTP)

Electronic Mail (SMTP) Electronic Mail (SMTP) Nowadays email is more popular than the paper letters called snail-mails. It is a form of network communication. Some of the other forms of network communication being voice-over-internet,

More information

Chapter 7 (Week 13) The Application Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

Chapter 7 (Week 13) The Application Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr. Chapter 7 (Week 13) The Application Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 579-611 1 PREVIOUS LAYERS THE PURPOSE OF THE PHYSICAL LAYER IS TO TRANSPORT A RAW BIT STREAM FROM ONE

More information

CS321: Computer Networks ELECTRONIC MAIL

CS321: Computer Networks ELECTRONIC MAIL CS321: Computer Networks ELECTRONIC MAIL Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Electronic mail (E-mail) It allows users to exchange messages. In HTTP

More information

Electronic Mail. Electronic Mailboxes

Electronic Mail. Electronic Mailboxes Electronic Mail E-mail belongs to the Application Layer Has been around since the early 80 s Enables new forms of interaction Fast Automatic processing (sorting, reply) Can carry other content Electronic

More information

The Application Layer: & SMTP

The Application Layer:  & SMTP The Application Layer: email & SMTP Smith College, CSC 249 Feb 1, 2018 4-1 Chapter 2: Application layer q 2.1 Principles of network applications q 2.2 Web and HTTP q 2.3 FTP q 2.4 Electronic Mail v SMTP,

More information

Simple Network Management Protocol (SNMP)

Simple Network Management Protocol (SNMP) Announcements Project #5 extended until Dec. 10 Reading: 7.3, start 7.4 Midterm #2 last day to request re-grades Th in class HW#2 (due Tuesday Dec. 7) 1 Simple Network Management Protocol (SNMP) Managed

More information

The Application Layer

The Application Layer The Application Layer Subject Name: Fundamentals of Networking (FON) Subject Code: 640001 Domain Name System, Electronic Mail 21-Apr-12 Having finished all the preliminaries, we now come to the layer where

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

Chapter 26 Remote Logging, Electronic Mail, and File Transfer 26.1

Chapter 26 Remote Logging, Electronic Mail, and File Transfer 26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer 26.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 26-1 REMOTE LOGGING It would be impossible

More information

Applications & Application-Layer Protocols: FTP and (SMTP & POP)

Applications & Application-Layer Protocols: FTP and  (SMTP & POP) COMP 431 Internet Services & Protocols Applications & Application-Layer Protocols: FTP and E ( & POP) Jasleen Kaur February 7, 2019 Application-Layer Protocols Outline Example client/ systems and their

More information

Simple Network Management Protocol (SNMP)

Simple Network Management Protocol (SNMP) Announcements Project #5 extended until Dec. 10 Reading: 7.3, start 7.4 Midterm #2 last day to request re-grades Th in class HW#2 (due Tuesday Dec. 7) 1 Simple Network Management Protocol (SNMP) Managed

More information

Outline. EEC-484/584 Computer Networks. Slow Start Algorithm. Internet Congestion Control Algorithm

Outline. EEC-484/584 Computer Networks. Slow Start Algorithm. Internet Congestion Control Algorithm EEC-484/584 Computer Networks Lecture 19 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline TCP slow start and congestion avoidance The

More information

The Application Layer: SMTP, FTP

The Application Layer: SMTP, FTP The Application Layer: SMTP, FTP CS 352, Lecture 5 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana 1 Recap: Application-layer protocols DNS: lookup a (machine-readable) address using a (humanreadable)

More information

Objectives CINS/F1-01

Objectives CINS/F1-01 Email Security (1) Objectives Understand how e-mail systems operate over networks. Classify the threats to the security of e-mail. Study how S/MIME and PGP can be used to add security to e-mail systems.

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Application Layer: Cookies, Web Caching, SMTP Sec 2.2.4-2.4 Prof. Lina Battestilli Fall 2017 Outline Application Layer (ch 2) 2.1 principles of network

More information

Chapter 20 SMTP. Slides from TCP/IP - Forouzan. User Agent (UA) Addressing Delayed Delivery Aliases Mail Transfer Agent (MTA) MIME POP.

Chapter 20 SMTP. Slides from TCP/IP - Forouzan. User Agent (UA) Addressing Delayed Delivery Aliases Mail Transfer Agent (MTA) MIME POP. Chapter 20 SMTP User Agent () Addressing Delayed Delivery Aliases Mail Transfer Agent () MIME POP 20-1 Figure 20-1 SMTP concept User User SMTP client TCP ephemeral port SMTP server TCP well-known port

More information

FTP. FTP offers many facilities :

FTP. FTP offers many facilities : FTP Given a reliable end-to-end trasport protocol like TCP, File Transfer might seem trivial. But, the details authorization, representation among heterogeneous machines make the protocol complex. FTP

More information

CSC 4900 Computer Networks:

CSC 4900 Computer Networks: CSC 4900 Computer Networks: Email Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review Last week we talked about design principles, and the application protocols

More information

CS 43: Computer Networks. 12: and SMTP September 28, 2018

CS 43: Computer Networks. 12:  and SMTP September 28, 2018 CS 43: Computer Networks 12: Email and SMTP September 28, 2018 A. HTTP Mail s communicate using B. IMAP C. POP D. SMTP Lecture 12 - Slide 2 Mail s typically A. send messages directly from the sending s

More information

Electronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur

Electronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur Electronic Mail Prof. Indranil Sen Gupta Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur 1 Introduction Most heavily used application on the Internet. Simple

More information

is still the most used Internet app. According to some studies around 85% of Internet users still use for communication.

is still the most used Internet app. According to some studies around 85% of Internet users still use  for communication. 1 E-mail is still the most used Internet app. According to some studies around 85% of Internet users still use e-mail for communication. Electronic mail is a method to exchange digital messages from a

More information

Applications FTP. FTP offers many facilities :

Applications FTP. FTP offers many facilities : Applications FTP Given a reliable end-to-end trasport protocol like TCP, File Transfer might seem trivial. But, the details authorization, representation among heterogeneous machines make the protocol

More information

SMTP. George Porter CSE 124 February 12, 2015

SMTP. George Porter CSE 124 February 12, 2015 SMTP George Porter CSE 124 February 12, 2015 Homework 2 out Announcements Project 2 checkpoint due Tuesday Traditional Applications Two of the most popular The World Wide Web and Email. Broadly speaking,

More information

Lecture 6: Application Layer Web proxies, , and SMTP

Lecture 6: Application Layer Web proxies,  , and SMTP Lecture 6: Application Layer Web proxies, Email, and SMTP COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,

More information

[Prof. Rupesh G Vaishnav] Page 1

[Prof. Rupesh G Vaishnav] Page 1 Q-1 Explain DNS (Domain Name System) in detail with example. OR Explain : DNS and its advantages DNS is an internet service that translates domain names into IP addresses. Because domain names are alphabetic,

More information

CS 3516: Computer Networks

CS 3516: Computer Networks Welcome to CS 3516: Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: AK219 Fall 2018 A-term 1 Some slides are originally from the course materials of the textbook Computer

More information

EEC-682/782 Computer Networks I

EEC-682/782 Computer Networks I EEC-682/782 Computer Networks I Lecture 20 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Application Layer II Dmitri Loguinov Texas A&M University February 6, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

Internet Architecture

Internet Architecture Internet Architecture Lecture 10: How Email Work Assistant Teacher Samraa Adnan Al-Asadi 1 How Email Works Electronic mail, or email, might be the most heavily used feature of the Internet. You can use

More information

FTP,HTTP. By Nidhi Jindal

FTP,HTTP. By Nidhi Jindal APPLICATION LAYER: SMTP, POP, IMAP, FTP,HTTP By Nidhi Jindal. MESSAGE TRANSFER AGENT: SMTP The actual mail transfer requires message transfer agents (MTAs). The protocol that defines the MTA client and

More information

Lecture 25. Tuesday, November 21 CS 475 Networks - Lecture 25 1

Lecture 25. Tuesday, November 21 CS 475 Networks - Lecture 25 1 Lecture 25 Reminders: Homework 7 due today. Homework 8 posted. Due at the beginning of the last day of class for final exam review. Programming Project 6 posted. Final project worth double. Due by 4:30pm,

More information

CS348: Computer Networks (SMTP, POP3, IMAP4); FTP

CS348: Computer Networks  (SMTP, POP3, IMAP4); FTP CS348: Computer Networks E-MAIL (SMTP, POP3, IMAP4); FTP Dr. Manas Khatua Assistant Professor Dept. of CSE, IIT Guwahati E-mail: manaskhatua@iitg.ac.in Electronic mail (E-mail) Allows users to exchange

More information

WWW: the http protocol

WWW: the http protocol Internet apps: their protocols and transport protocols Application e-mail remote terminal access Web file transfer streaming multimedia remote file Internet telephony Application layer protocol smtp [RFC

More information

CSCE 813 Internet Security Secure Services I

CSCE 813 Internet Security Secure  Services I CSCE 813 Internet Security Secure E-Mail Services I Professor Lisa Luo Fall 2017 Previous Class Why do we need cloud computing? Three models of cloud service Software as a service (SaaS) Platform as a

More information

ing With PHP History of Applications or Use

ing With PHP History of  Applications or Use Emailing With PHP What is Email? E mail, short for electronic mail and often abbreviated to e mail, email or simply mail, is a store and forward method of composing, sending, receiving and storing messages

More information

Chapter 10: Application Layer

Chapter 10: Application Layer Chapter 10: Application Layer Application, Session and Presentation Presentation and Session Layers Session layer Functions, creates, and maintains dialogs between source and destination applications Handles

More information

Electronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol

Electronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol SMTP Electronic Mail Three Components: 1. User Agents a.k.a. mail reader e.g., gmail, Outlook, yahoo 2. Mail Servers mailbox contains incoming messages for user message queue of outgoing (to be sent) mail

More information

Agenda. What is ? Brief Introduction To . History Of . Components Of System. Basics

Agenda. What is  ? Brief Introduction To  . History Of  . Components Of  System.  Basics Agenda Email Basics BUPT/QMUL 2012-04-09 Brief introduction to email Components of email system Email Standards Summary Refer to Chapter 27, textbook 2 Brief Introduction To Email 3 What is Email? Electronic

More information

Internet Technology 2/10/2016

Internet Technology 2/10/2016 Internet Technology 03r. Application layer protocols: email Email: (Simple Mail Transfer Protocol) Paul Krzyzanowski Rutgers University Spring 2016 1 2 Simple Mail Transfer Protocol () Protocol defined

More information

DOWNLOAD PDF API TO ELECTRONIC MAIL (X,400, ISSUE 2)

DOWNLOAD PDF API TO ELECTRONIC MAIL (X,400, ISSUE 2) Chapter 1 : Fixing Magento USPS API issue with First-Class Mail Parcel Plumrocket Inc Blog Grandparents and looters mothballed than sped opposite the late hsien stillness, quantized over glib doorkeepers

More information

. SMTP, POP, and IMAP

. SMTP, POP, and IMAP E-Mail SMTP, POP, and IMAP Scope How Email Appears to Work How Email Really Works Mail User Agent (MUA) Message Format Mail Delivery Agent (MDA)/ Mail Transfer Agent (MTA) Firewalls, Spam and Virus Filters

More information

Application: Electronic Mail

Application: Electronic Mail Content Application: Electronic Mail Linda Wu Email system model protocol MIME extensions Mail access protocols (CMPT 471 2003-3) Reference: chapter 27 Notes-19 CMPT 471 2003-3 2 Email System Model Client-

More information

MailEnable System Overview

MailEnable System Overview MailEnable System Overview MailEnable Messaging Services for Microsoft Windows NT/2000/2003 MailEnable Pty. Ltd. 59 Murrumbeena Road Murrumbeena VIC 3163 Australia t: +61 3 9569 0772 f: +61 3 9530 4066

More information

CompSci 356: Computer Network Architectures. Lecture 23: Application Layer Protocols Chapter 9.1. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 23: Application Layer Protocols Chapter 9.1. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 23: Application Layer Protocols Chapter 9.1 Xiaowei Yang xwy@cs.duke.edu The Internet Architecture Application layer Transport layer / Layer 4 Network

More information

3GPP2 MMS STANDARDS AND FEATURES

3GPP2 MMS STANDARDS AND FEATURES 3GPP2 MMS STANDARDS AND FEATURES Edwin Sandberg Ericsson Multimedia Messaging and VAS 3GPP2 MMS STANDARDS AND FEATURES APRIL 2003 1 Presentation Outline Use cases for MMS MMS reference architecture MMS

More information

CS 356 Internet Security Protocols. Fall 2013

CS 356 Internet Security Protocols. Fall 2013 CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5

More information

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP,  , SMTP, Telnet, FTP, Security-PGP-SSH. APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.

More information

Chapter 7. The Application Layer. DNS The Domain Name System. DNS Resource Records. The DNS Name Space Resource Records Name Servers

Chapter 7. The Application Layer. DNS The Domain Name System. DNS Resource Records. The DNS Name Space Resource Records Name Servers DNS The Domain Name System Chapter 7 The Application Layer The DNS Name Space Resource Records Name Servers The DNS Name Space DNS Resource Records A portion of the Internet domain name space. (1) MX:

More information

Basics BUPT/QMUL

Basics BUPT/QMUL Email Basics BUPT/QMUL 2014-04-28 Agenda Brief introduction to email Components of email system Email Standards Summary 2 Brief Introduction To Email 3 What is Email? Electronic Mail (email, e-mail) Provides

More information

Basics BUPT/QMUL

Basics BUPT/QMUL Email Basics BUPT/QMUL 2017-05-08 Agenda Brief introduction to email Components of email system Email Standards Summary 2 Brief Introduction To Email 3 What is Email? Electronic Mail (email, e-mail) Provides

More information

CIT 470: Advanced Network and System Administration. Topics. Mail Policies.

CIT 470: Advanced Network and System Administration. Topics. Mail Policies. CIT 470: Advanced Network and System Administration E-mail CIT 470: Advanced Network and System Administration Slide #1 Topics 1. Mail Policies 2. Anatomy of a Mail Message 3. Components of an E-mail System

More information

Chapter 3 Protocols and the TCP/IP Suite

Chapter 3 Protocols and the TCP/IP Suite Chapter 3 Protocols and the TCP/IP Suite 3.1 The Need for a Protocol Architecture need for a standard communication tasks by layers architecture peer protocol: a set of rules or conventions to exchange

More information

The Undo Sent (USE) Protocol

The Undo Sent  (USE) Protocol International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 593-602 International Research Publications House http://www. irphouse.com /ijict.htm The

More information

Protocols. Networking CS 3470, Section 1 Sarah Diesburg

Protocols. Networking CS 3470, Section 1 Sarah Diesburg Protocols Networking CS 3470, Section 1 Sarah Diesburg Applications Applications need their own protocols Just like we are writing our network programs with a certain specification so that any two randomly-chosen

More information

Application Layer Services Omer F. Rana. Networks and Data Communications 1

Application Layer Services Omer F. Rana. Networks and Data Communications 1 Application Layer Services Omer F. Rana Networks and Data Communications 1 Application Layer Protocols Distinction between Network Application and an Application-Layer Protocol an Application-layer Protocol

More information

Internet and Intranet Protocols and Applications

Internet and Intranet Protocols and Applications Internet and Intranet Protocols and Applications Lecture 4: General Characteristics of Internet Protocols; the Email Protocol February 10, 2004 Arthur Goldberg Computer Science Department New York University

More information

Network Encryption Methods

Network Encryption Methods Network Encryption Network Encryption Methods CSC362, Information Security Objectives understanding the impact of employing encryption at different protocol layers application layer encryption transport

More information

Distributed Systems. 02. Networking. Paul Krzyzanowski. Rutgers University. Fall 2017

Distributed Systems. 02. Networking. Paul Krzyzanowski. Rutgers University. Fall 2017 Distributed Systems 02. Networking Paul Krzyzanowski Rutgers University Fall 2017 1 Inter-computer communication Without shared memory, computers need to communicate Direct link Direct links aren't practical

More information

Applications & Application-Layer Protocols: (SMTP) and DNS

Applications & Application-Layer Protocols:  (SMTP) and DNS CS 312 Internet Concepts Applications & Application-Layer Protocols: E (SMTP) and DNS Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs312-f11

More information

ECE 435 Network Engineering Lecture 6

ECE 435 Network Engineering Lecture 6 ECE 435 Network Engineering Lecture 6 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 20 September 2018 HW#2 was due. Announcements HW#3 will be posted a bit different. Encryption

More information

Special expressions, phrases, abbreviations and terms of Computer Networks

Special expressions, phrases, abbreviations and terms of Computer Networks access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous

More information

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. Managing a HTTP request. transport session. Step 1 - opening transport

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. Managing a HTTP request. transport session. Step 1 - opening transport Lecture 2-ter. 2 A communication example Managing a HTTP v1.0 connection Managing a HTTP request User digits URL and press return (or clicks ). What happens (HTTP 1.0): 1. opens a TCP transport session

More information

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 10 Chapter 10 - Sections & Objectives 10.1 Application Layer Protocols Explain the operation of the application

More information

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services

More information

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules

More information

ECE697AA Lecture 2. Today s lecture

ECE697AA Lecture 2. Today s lecture ECE697AA Lecture 2 Application Layer: HTTP Tilman Wolf Department of Electrical and Computer Engineering 09/04/08 Protocol stack Application layer Client-server architecture Example protocol: HTTP Demo

More information

Internet Applications. Dr Steve Gordon ICT, SIIT

Internet Applications. Dr Steve Gordon ICT, SIIT Internet Applications Dr Steve Gordon ICT, SIIT Contents Network Application Models Transport Layer Interface Selected Applications and Services Naming Resources Web Access Email Network Management Other

More information

Application Layer: OSI and TCP/IP Models

Application Layer: OSI and TCP/IP Models Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service

More information

Fig (1) sending and receiving s

Fig (1) sending and receiving  s Electronic Mail Protocols (SMTP, POP, IMAP) It is important to (1) distinguish the user interface (i.e., your mail reader) from the underlying message transfer protocols (such as SMTP, POP or IMAP), and

More information

Chapter 2: Application layer

Chapter 2: Application layer Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming with TCP 2.8 Socket

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 TRANSMISSION CONTROL PROTOCOL ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 ETI 2506 - TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember 1.

More information

*:96 Overheads. More about this course about Internet application protocols can be found at URL:

*:96 Overheads. More about this course about Internet application protocols can be found at URL: 3-1 *:96 Overheads Part 3a: E-mail introduction More about this course about Internet application protocols can be found at URL: http://www.dsv.su.se/~jpalme/internet-course/int-app-prot-kurs.html Last

More information

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing Motivation For Networking Information access Interaction among cooperative application programs Resource sharing CS422 -- PART 1 13 2003 Practical Results E-mail File transfer/access Web browsing Remote

More information

Chapter 9: Internet

Chapter 9: Internet Chapter 9: Internet Email Internet email has become one of the most popular applications on the Internet. An Internet experience is not complete without the usage of email. In this chapter we shall be

More information

熊本大学学術リポジトリ. Kumamoto University Repositor

熊本大学学術リポジトリ. Kumamoto University Repositor 熊本大学学術リポジトリ Kumamoto University Repositor Title E-mail Based Updates Delivery in Un Content Synchronization among Learn Sy Author(s) Ijtihadie, Royyana M.; Chisaki, Yos Tsuyoshi; Hidayantoy, Bekti Cahyo;

More information

Different Layers Lecture 21

Different Layers Lecture 21 Different Layers Lecture 21 10/17/2003 Jian Ren 1 The Transport Layer 10/17/2003 Jian Ren 2 Transport Services and Protocols Provide logical communication between app processes running on different hosts

More information

4. The transport layer

4. The transport layer 4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application

More information

CCNA 1 Chapter 10 v5.0 Exam Answers 2013

CCNA 1 Chapter 10 v5.0 Exam Answers 2013 CCNA 1 Chapter 10 v5.0 Exam Answers 2013 1 Which three layers of the OSI model provide similar network services to those provided by the application layer of the TCP/IP model? (Choose three.) physical

More information

FTP. Mail. File Transfer Protocol (FTP) FTP commands, responses. Electronic Mail. TDTS06: Computer Networks

FTP. Mail. File Transfer Protocol (FTP) FTP commands, responses. Electronic Mail. TDTS06: Computer Networks TDTS0: Computer Networks Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se FTP Notes derived from Computer Networking: A Top Down Approach, by Jim Kurose and Keith Ross, Addison-Wesley. The slides

More information

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP Chapter 2: outline 2.1 principles of network applications app architectures app requirements 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming

More information

Socket Programming. Dr. -Ing. Abdalkarim Awad. Informatik 7 Rechnernetze und Kommunikationssysteme

Socket Programming. Dr. -Ing. Abdalkarim Awad. Informatik 7 Rechnernetze und Kommunikationssysteme Socket Programming Dr. -Ing. Abdalkarim Awad Informatik 7 Rechnernetze und Kommunikationssysteme Before we start Can you find the ip address of an interface? Can you find the mac address of an interface?

More information

Product Overview. Revision 5

Product Overview. Revision 5 Product Overview Revision 5 Copyright 2010-2011 Autek Ingeniería. All rights reserved. No part of this document may be reproduced, even for personal use, by any means and in any form, whether permanent

More information

Integration Guide Xura Messaging SMTP- Interface

Integration Guide Xura Messaging SMTP- Interface Integration Guide Xura Messaging SMTP- Interface Version 1.3.0 Content is subject to change Xura Secure Communications GmbH Tel.: +49 89 201 727 0 e-mail.: asc-support@xura.com All rights reserved. This

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

Experience in implementing an /web gateway

Experience in implementing an  /web gateway Experience in implementing an e-mail/web gateway Francesco Gennai, Marina Buzzi, Laura Abba Istituto per le Applicazioni Telematiche, National Research Council (CNR) - Pisa, Italy E-mail: {F.Gennai, M.Buzzi,

More information

Chapter 2 Communicating Over the Network

Chapter 2 Communicating Over the Network Chapter 2 Communicating Over the Network Elements of Communication Communicating the Messages Continuous stream of bits 00101010100101010101010101010101010 I have to wait Single communications (e.g. video,

More information

Network Applications Principles of Network Applications

Network Applications Principles of Network Applications Network Applications Principles of Network Applications A Network application is an application running on one host and provides communication to another application running on a different host. At the

More information

COSC 301 Network Management. Lecture 14: Electronic Mail

COSC 301 Network Management. Lecture 14: Electronic Mail COSC 301 Network Management Lecture 14: Electronic Mail Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 14: Electronic Mail 1 Today s Focus Electronic Mail -- How does it work? -- How

More information

Network Fundamentals Chapter 2 Modified by Tony Chen 05/20/2008

Network Fundamentals Chapter 2 Modified by Tony Chen 05/20/2008 Communicating Over the Network Network Fundamentals Chapter 2 Modified by Tony Chen 05/20/2008 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Drippy Sweet Pancakes

More information

Configuring an SMTP Journal Account for Microsoft Exchange 2003

Configuring an SMTP Journal Account for Microsoft Exchange 2003 Configuring an SMTP Journal Account for Microsoft Exchange 2003 This article refers to Microsoft Exchange Server 2003. As of April 8, 2014, Microsoft no longer issues security updates for Exchange Server

More information

How Internet Works

How Internet  Works How Internet Email Works Everything you never wanted to know about email but were afraid to ask... Dave O'Neill So, you use email...... but do you know how it works? If

More information

CCNA R&S: Introduction to Networks. Chapter 10: The Application Layer

CCNA R&S: Introduction to Networks. Chapter 10: The Application Layer CCNA R&S: Introduction to Networks Chapter 10: The Application Layer Frank Schneemann 10.0.1.1 Introduction 10.0.1.2 Activity - Application Investigation 10.1.1.1 OSI and TCP/IP Models Revisited The application

More information

SIP Session Initiation Protocol

SIP Session Initiation Protocol Session Initiation Protocol ITS 441 - VoIP; 2009 P. Campbell, H.Kruse HTTP Hypertext Transfer Protocol For transfer of web pages encoded in html: Hypertext Markup Language Our interest: primarily as model

More information

Troubleshooting Networking

Troubleshooting Networking , page 1 Troubleshooting Intersite Networking Setup Use the troubleshooting information in this section if you have difficulty creating an intersite link between two site gateways (regardless of whether

More information