Application Layer Services Omer F. Rana. Networks and Data Communications 1

Size: px
Start display at page:

Download "Application Layer Services Omer F. Rana. Networks and Data Communications 1"

Transcription

1 Application Layer Services Omer F. Rana Networks and Data Communications 1

2 Application Layer Protocols Distinction between Network Application and an Application-Layer Protocol an Application-layer Protocol is only one piece of a network application. For instance: Web is a network application HTTP is an application-layer protocol. In this context, HTTP describes how messages are exchanged between the web server and the client program (Netscape, Internet Explorer etc) Also, electronic mail has many components, including mail servers that house user mailboxes, mail readers that allow users to read and create messages, a standard for defining the structure of a mail message, and application layer protocols that define how messages are exchanged between servers, servers and mail readers, and how contents of certain parts of the mail message (such as the header) are to be interpreted. Application-layer protocols in this context include the Simple Mail Transfer Protocol (SMTP), for instance (more later) Networks and Data Communications 2

3 Application-Layer Protocols... 2 Hence, an Application-layer protocol defines: The types of messages exchanged, for instance, request and response messages The syntax of various message types such as the fields in the message and how the fields are separated (delineated) The semantics of the fields, that is, the meaning of information contained in each field The rules for determining when and how a process sends messages and responds to these messages Such protocols can be specific to an application/vendor or may follow a standard defined in an RFC (such as HTTP) Networks and Data Communications 3

4 Clients and Servers An application-layer protocol generally has two parts a client side and a server side for example, a Web browser implements the client side of HTTP, and a Web server implements the server side of HTTP Clients can act as servers for other parties, and servers can act as clients for instance in a Telnet session between Hosts A and B, if Host A initiates the Telnet session (so that a user at Host A is logging onto Host B) then Host A runs the client side of the application, and Host B runs the server side On the other hand, if Host B initiates the Telnet session, then Host B runs the client side of the application In general, the initiating host is called the Client Hence, Client-Server involves the partitioning of software in an application into a set of services, which provide a set of operations to their users, and client programs which issue requests to perform a function Networks and Data Communications 4

5 CLIENT * MANAGES DISK STORAGE UNITS FILE SERVER * CLIENT O.S. INTERACTION APPLICATION PROGRAM OPERATING SYSTEM PROTOCOL APPLICATION PROGRAM DOES NOT TALK TO FILE SERVER DIRECTLY, BUT ONLY THROUGH O.S. CLIENT DATABASE SERVER APPLICATION PROGRAM DATABASE MANAGEMENT SYSTEM MAY DIRECTLY TALK TO DATABASE SERVER CLIENT IP Number and Port Number ( ) DOMAIN NAME SERVER (DNS) APPLICATION PROGRAM SYMBOLIC NAME ( Networks and Data Communications 5

6 Process Interaction An application involves two processes communicating with each other over the network refer to your operating systems notes from Year 1 The processes interact by sending and receiving messages through their sockets which can utilise the TCP or UDP protocols As discussed previously, a socket is the interface between the application layer, and the transport layer available on a host and is often referred to as the Application Layer Interface (API) between the application and the network since the socket is the programming interface with which networked applications are built Networks and Data Communications 6

7 Popular Applications Application: Electronic Mail Application-Layer Protocol: SMTP Underlying Transport Protocol: TCP Application: Remote Terminal Access Application-Layer Protocol: Telnet Underlying Transport Protocol: TCP Application: Web Application-Layer Protocol: HTTP Underlying Transport Protocol: TCP Application: File Transfer Application-Layer Protocol: FTP Underlying Transport Protocol: TCP Application: Remote File Transfer Application-Layer Protocol: NFS Underlying Transport Protocol: TCP or UDP Application: Streaming Multimedia Services Networks and Data Communications 7

8 Application-Layer Protocol: Proprietary (such as Real Networks) Underlying Transport Protocol: TCP or UDP Application: Internet Telephony Application-Layer Protocol: Proprietary (such as Vocaltec) Underlying Transport Protocol: TCP or UDP

9 Using has direct integration with DNS (the MX records) An Internet based mail system has three basic components: User agents responsible for helping a user construct and read s. These are also called mail readers Mail Servers which host mailboxes a typical message will start at the sender s user agent, travel to the sender s mail server and then to the recipient s mail server finally being deposited in the recipient s mailbox Simple Mail Transfer Protocol (SMTP) an application-layer protocol based on TCP for transferring mail from the sender s mail server to the recipient s mail server Networks and Data Communications 8

10 RUTH JAMAL NETWORK RUTH SENDS AN TO JAMAL RUTH JAMAL NETWORK NETWORK NETWORK NETWORK USER AGENT (UA) RELAY ONLY MESSAGE TRANSFER AGENT (MTA) LOCAL MESSAGE TRANSFER AGENT (MTA) Networks and Data Communications 9

11 CODES: 220: Message Transfer Agent (MTA) Available 250: Identity Accepted 251: Relaying to Recipient 354: Ready for contents Networks and Data Communications : Mailbox Busy 421: MTA Unavailable 500: Syntax Error 550: No such Recipient 552: Exceeded Storage

12 User User User Mail Server SMTP Mail Server User SMTP SMTP User Mail Server User Networks and Data Communications 11 User

13 Mail Standards SMTP used wit the TCP/IP protocol, and has been traditionally limited to the text-based electronic messages Multipurpose Internet Mail Extensions (MIME) allows various types of content (speech, images and motion video) S/MIME secure MIME RSA Data Security standard which support encrypted transfers and digitally signed electronic mail Networks and Data Communications 12

14 SMTP Alice invokes her user agent for , provides Jamal s address, composes a message and instructs her user agent to send it Alice s user agent sends the message to her mail server, where it is placed in a message queue The client side of SMTP, running on Alice s mail server, sees the message in the message queue, and opens a TCP connection to an SMTP server, running on Jamal s mail server After some initial SMTP handshaking, the SMTP client sends Alice s message into the TCP connection just established At Jamal s mail server host, the server side of SMTP receives the message. Jamal s mail server then places the message in Jamal s mailbox Networks and Data Communications 13

15 Jamal invokes his user agent to read the message at his convenience If Jamal s mail server cannot be reached, the message is queued at Alice s server

16 SMTP... 2 A direct TCP connection is established, and intermediate mail servers are not normally utilised The client SMTP tries multiple times if the server SMTP is down Each can have a list of destinations in which case the program (user agent) makes copies of the messages and passes them onto the mail server The user may maintain a mailing list, and the program must remove duplicates and replace mnemonic names with actual addresses (sometimes called alaises ) Hence, in general, an SMTP mail server processes messages from an outgoing mail queue, and then transmits them using one or more TCP connections with the destination On transmission, the SMTP sender deletes the destination from the message list Networks and Data Communications 14

17 Typical Error Messages Destination host is unreachable incorrect host address, DNS not configured properly Destination host is out of operation destination host shut down Mail recipient is not available on the host TCP connection failed on the transfer of the mail a time out error occurred on the connection (perhaps due to the receiver or sender being busy, or a fault with the connection) SMTP only responsible for a message up to the point where the SMTP receiver indicates that transfer is complete it does not cater for message delivery to the user mailbox Hence, SMTP does not guarantee recovery from lost messages, and gives no end-to-end acknowledgement on successful receipt Networks and Data Communications 15

18 SMTP Handshaking >mail -v Subject: Checking SMTP This is a message to see how SMTP works! Omer. EOT omer@parian >omer_f_rana@hotmail.com... Connecting to sentinel.cs.cf.ac.uk. via relay sentinel.cs.cf.ac.uk ESMTP Exim 3.21 #1 Mon, 05 Feb :06: Networks and Data Communications 16

19 >>> EHLO parian.cs.cf.ac.uk 250-sentinel.cs.cf.ac.uk Hello parian.cs.cf.ac.uk [ ] 250-SIZE 250-8BITMIME 250-PIPELINING 250 HELP >>> MAIL SIZE= is syntactically correct >>> RCPT 250 is syntactically correct >>> DATA 354 Enter message, ending with "." on a line by itself >>>. 250 OK id=14pgff-0004t0-00

20 Sent (OK id=14pgff-0004t0-00) Closing connection to sentinel.cs.cf.ac.uk. >>> QUIT 221 sentinel.cs.cf.ac.uk closing connection

21 SMTP Handshaking... 2 The format of the transmitted message is defined in RFC 822: A header typically addresses for sender and receiver, the time the was sent, and any hosts involved in the transmission process Traditional: Path based addresses Unix to Unix CoPy (UUCP) sievax!mucp!unido!mcsun!cardiff!comsc!rana Alternative is the use of Domain based address Contents primarily ASCII text Networks and Data Communications 17

22 Mail Routing DNS defines an MX record for Mail exchangers based on domain based addresses The MTA (Message Transfer Agent) tries to deliver directly to the destination host. If this fails, it looks for a mail exchanger record, and contacts the exchanger with the lowest preference value first This could occur, for instance, if the host is on the other side of a firewall in which case the mail exchanger record (MX) would forward the mail to the firewall itself, which would then forward it over the local network Can make use of wildcards, i.e. masks, to ensure that mail is sent through mail can be routed via a mail hub, a mail server on a different network, a host-alias MX record is structured as: destination IN MX preference forwarding Networks and Data Communications 18

23 domain value domain For example: qatraining.com IN MX 10 smtp.qatraining.com IN MX 20 relay1.pipex.com *.qatraining.com IN MX 10 qatraining.com Hence, mail destined for addresses on the left, should be forwarded to those on the right with the lowest preference value selected first Address re-writing via MTA: -> ->

24 >nslookup Default Server: sentinel.cs.cf.ac.uk Address: > set q=mx > cs.cf.ac.uk Server: sentinel.cs.cf.ac.uk Address: cs.cf.ac.uk preference = 10, mail exchanger = stork1.cf.ac.uk cs.cf.ac.uk Networks and Data Communications 19

25 preference = 10, mail exchanger = crane1.cf.ac.uk cs.cf.ac.uk preference = 1, mail exchanger = sentinel.cs.cf.ac.uk cs.cf.ac.uk nameserver = pp1x.athro.cf.ac.uk cs.cf.ac.uk nameserver = ranch1x.athro.cf.ac.uk stork1.cf.ac.uk internet address =

26 crane1.cf.ac.uk internet address = sentinel.cs.cf.ac.uk internet address = pp1x.athro.cf.ac.uk internet address = ranch1x.athro.cf.ac.uk internet address =

27 From Fri Nov 21 17:34: Return-Path: Delivery-Date: Fri, 21 Nov :34: Received: from postoffice.npac.syr.edu by sentinel.cs.cf.ac.uk with SMTPX (PP); Fri, 21 Nov :30: Received: (from by postoffice.npac.syr.edu (8.7.5/8.7.1) id IAA14029 for java-for-cse-outgoing; Fri, 21 Nov :59: (EST) X-Authentication-Warning: postoffice.npac.syr.edu: majordom set sender to owner-java-for-cse using -f Networks and Data Communications 20

28 Received: from milan.doe.ernet.in (milan.doe.ernet.in [ ]) by postoffice.npac.syr.edu (8.7.5/8.7.1) with SMTP id IAA14024 for Fri, 21 Nov :59: (EST) Received: from cdacb.ernet.in by milan.doe.ernet.in (4.1/SMI-4.1) id AA11191; Fri, 21 Nov 97 19:19: Received: by cdacb.ernet.in (5.x/SMI-SVR4) id AA23023; Fri, 21 Nov :22: Date: Fri, 21 Nov :22: From: (RajKumar)

29 Debugging Mail Servers >telnet sentinel 25 Trying Connected to sentinel.cs.cf.ac.uk. Escape character is ^]. 220 sentinel.cs.cf.ac.uk ESMTP Exim 3.21 #1 Mon, 05 Feb :12: Unrecognized command QUIT 221 sentinel.cs.cf.ac.uk closing connection Connection closed by foreign host. POP servers are on port 110, and IMAP servers on port 143 Use the ping command to see if host is still available Check system log files Check the Received: lines of messages and identify both the time of transmission of the last message, and any intermediate relay agents involved Networks and Data Communications 21

30 MIME SMTP is insufficient: Can only transmit text messages not executable files or other binary objects Does not allow attachment of files and can only use a 7-bit ASCII character set (no support for extended ASCII cannot use symbols!) Multipurpose Internet Mail Extensions (MIME) RFC 1521/1522 which adds: New message header fields such as Content-type, Content-transfer-encoding, Content-id, Content-Description, MIME-version Support for various multimedia content formats Transfer encodings for transforming attached files Networks and Data Communications 22

31 MIME Content Types Content types define the format of the attached files there are 16 different content types in seven different content groups A MIME message can contain multiple attachments, in which case, the content-type header field includes a boundary which acts as a delimiter between the multiple attachments MIME content types include: text/plain, text/richtext (such as HTML), multipart/mixed (independent attachments, order important), multipart/parallel (independent attachments, order not important), multipart/alternative (attachment is a different version of original data), multipart/digest (similar to multipart/mixed but uses rfc822 (SMTP) to define each message) Networks and Data Communications 23

32 message/rfc822, message/partial (to fragment a mail message), message/external-body (define a pointer to an external object) image/jpeg, image/gif video/mpeg, video/mov, audio/au, audio/wav, audio/basic application/postscript, application/octet-stream

33 Mail Access Protocols Assumed, so far, that mail reader is run on the mail server (standard until 1990) however, today, mail reader is on local host Aim to make the mail server (which receives and queues messages) independent of the mail reading program. The mail server is always connected to the Internet, whereas a mail reader can be invoked when required. Mail servers generally maintained by ISPs Protocol to communicate between mail reader and mail server necessary (as they are now on different hosts) This protocol is used to transfer messages from Jamal s mail server to his local PC POP3 (Post Office Protocol version 3) and IMAP (Internet Mail Access Protocol) SMTP is a push based protocol, whereas Mail Access Protocols are based on pull (like HTTP) Networks and Data Communications 24

34 User Agent SMTP SMTP POP3 or IMAP User Agent Alice Sender s mail server Recipient s mail server Networks and Data Communications 25 Jamal

35 Post Office Protocol Extremely simple and enables many different programs to make use of it Aim to create a standard method for users to access a mail server. Begins with a user agent opening a TCP connection to the mail server on port 110. Once the connection has been established, POP3 goes through three phases: 1. Authorisation: user name and password are sent to authenticate the user Networks and Data Communications 26

36 2. Transaction: the user agent retrieves the messages. The user agent can mark messages for deletion and obtain mail statistics. The mailbox is locked during this process 3. Update: occurs after the client has issued the quit command, ending the POP3 session at this time the mail server deletes the marked messages

37 Extended POP POP is a problem with nomadic users for instance, if Bob wants to access his mail from multiple machines, including the office PC, the home PC, and a portable computer, the download-and-delete operation in POP will scatter Bob s across all of his machines In particular, if Bob first reads a message from his home PC, he will not be able to read the message on his laptop, although he is being connected to the same mail server Alternately, in the download-and-keep mode, the user agent leaves the messages on the mail server after downloading them Although a POP3 server maintains some state information about a session between a mail server and a user agent (such as which messages have been deleted), it does not carry state information across POP3 sessions Networks and Data Communications 27

38 IMAP (Internet Mail Access Protocol) POP3 has limited functionality for instance, it is not possible to remotely manage mail archives on the mail server with POP this is a problem for nomadic users IMAP has more features that POP, but also significantly more complex see RFC 2060 Designed to enable users to manipulate remote mailboxes as if they were local such as archiving mail in folders, search remote folders for messages matching a criteria etc Enables a user agent to obtain components of a message such as the headers only, or just one part of a multipart MIME message (useful for low bandwidth, wireless connections) The transaction state of the POP3 server is replaced by a selected state on an IMAP server. In this state, a user can issue a host of commands to the mail server. The other states are more or less equivalent to POP3 Networks and Data Communications 28

39 IMAP is supported in Unix and WinNT/2000 servers also supported within third party applications such as Lotus Notes and Microsoft Exchange. Clients can include Netscape Communicator and Eudora Pro An Application Configuration Access Protocol is being defined to enable IMAP based servers to support additional services, such as an address book

40 Continuous-media that includes audio or video in particular resembles ordinary telephone voic messaging in some respects (but much more powerful) Differs from ordinary , in that messages can be much larger, there is a more stringent end-to-end delay requirement, and has greater sensitivity to recipients with highly heterogeneous Internet access rates and local storage capabilities Current mail access protocols (such as POP3, IMAP and HTTP) are not adequate for CM Very much the future enable based on streaming protocols Networks and Data Communications 29

41 Security Most is transmitted in plaintext over the network also SMTP conversations are unauthenticated, and POP communications are authenticated using only a password (also in plaintext) No official standard for encryption of data on the Internet primarily three levels of concern 1. Authentication ensure that both parties are who they claim to be 2. Confidentiality prevent unauthorised viewing of data 3. Integrity ensure that data is not altered Pretty Good Privacy (PGP) most widely used. Uses RSA public key algorithm to distributed encryption keys nd authenticate messages. A user encrypts a message and then mails the output. Some mail clients will automatically decrypt it if they have key for the user. Users must build up Networks and Data Communications 30

42 key rings, containing the public keys of the users they wish to communicate with Privacy Enhanced Mail (PEM) is a commercial secure mail system and supports authentication based on certificates. Secure/MIME (S/MIME) introduces extra headers to specify an encryption mechanism and authentication

43 Designing a Mail Network Choose the following components: Mail Host central point of mail routing individual machines that do not know where to send a mail message should, by default, send it here. Must know about all contactable machines and domains Mail Relay forwards mail intended for destinations outside the organisation. May also receive incoming . Relay talks to peers through the same mail language (such as SMTP) Mail Gateway forms a link between two differing mail systems, and also forwards mail outside the organisation Mail Server stores mailboxes for clients. Incoming messages are stored here until the client retrieves them (POP3) Mail Client These are functional components, and not individual machines. Networks and Data Communications 31

44 Organisation Boundary Internet External Mail domains Mail Relay AOL Mail Gateway Mail Host Mail Server Mail Server Mail Client Mail Client Mail Domain Mail Client Mail Client Networks and Data Communications 32

45 JavaMail JavaMail is an object-oriented API to messaging systems. JavaMail, the API, is strictly protocol-independent, and it is up to service providers to implement specific protocols (very much like JDBC for databases) Can be used directly (or with intermediate software) with SMTP, POP3 and IMAP Networks and Data Communications 33

46 First, obtain a reference to a Session object through Session.getDefaultSession(). Sessions manage configuration options and authentication. import java.io.*; import java.util.*; import javax.mail.*; import javax.mail.event.*; import javax.mail.internet.*; class FunnyMail { private Session session; private URLName urlname; Networks and Data Communications 34

47 public FunnyMail(String url) { session = Session.getDefaultInstance(System.getProperties(), null); urlname = new URLName(url); } A URL is of the form: protocol://username:password/hostname, pop3://fun:pwd@mail.psol.com imap://javamail:pwd@imap.psol.com

48 for a fun mailbox on mail.psol.com, or a javamail mailbox on an IMAP server Accessing the mailbox: private void readandreply() throws MessagingException, IOException { Store store = session.getstore(urlname); store.connect(); Folder inbox = store.getfolder("inbox"); inbox.open(folder.read_write); int count = inbox.getmessagecount(); for(int i = 1;i <= count;i++) {

49 Message m = inbox.getmessage(i); replyto(m); m.setflag(flags.flag.deleted,true); } inbox.expunge(); inbox.close(true); store.close(); } private void replyto(message m) throws MessagingException, IOException { System.out.print("replying to: "); System.out.println(m.getSubject()); Message r = new MimeMessage(session);

50 r.setfrom(internetaddress.getlocaladdress(session)); r.setrecipients(message.recipienttype.to,m.getfrom()); r.setsubject("fun: " + m.getsubject()); r.setsentdate(new Date()); r.setheader("x-mailer","funnymail 1.0"); Object o = m.getcontent(); if(m.ismimetype("text/plain") && o instanceof String) r.settext(reverse((string)o)); else r.settext("funnymail requires plain text mails!"); Transport.send(r); }

Simple Network Management Protocol (SNMP)

Simple Network Management Protocol (SNMP) Announcements Project #5 extended until Dec. 10 Reading: 7.3, start 7.4 Midterm #2 last day to request re-grades Th in class HW#2 (due Tuesday Dec. 7) 1 Simple Network Management Protocol (SNMP) Managed

More information

Simple Network Management Protocol (SNMP)

Simple Network Management Protocol (SNMP) Announcements Project #5 extended until Dec. 10 Reading: 7.3, start 7.4 Midterm #2 last day to request re-grades Th in class HW#2 (due Tuesday Dec. 7) 1 Simple Network Management Protocol (SNMP) Managed

More information

The Application Layer: & SMTP

The Application Layer:  & SMTP The Application Layer: email & SMTP Smith College, CSC 249 Feb 1, 2018 4-1 Chapter 2: Application layer q 2.1 Principles of network applications q 2.2 Web and HTTP q 2.3 FTP q 2.4 Electronic Mail v SMTP,

More information

Internet Technology. 03r. Application layer protocols: . Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 03r. Application layer protocols:  . Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 03r. Application layer protocols: email Paul Krzyzanowski Rutgers University Spring 2016 1 Email: SMTP (Simple Mail Transfer Protocol) 2 Simple Mail Transfer Protocol (SMTP) Protocol

More information

Network Working Group Request for Comments: 1844 Obsoletes: 1820 August 1995 Category: Informational

Network Working Group Request for Comments: 1844 Obsoletes: 1820 August 1995 Category: Informational Network Working Group E. Huizer Request for Comments: 1844 SURFnet bv Obsoletes: 1820 August 1995 Category: Informational Status of this Memo Multimedia E-mail (MIME) User Agent checklist This memo provides

More information

Internet and Intranet Protocols and Applications

Internet and Intranet Protocols and Applications Internet and Intranet Protocols and Applications Lecture 4: General Characteristics of Internet Protocols; the Email Protocol February 10, 2004 Arthur Goldberg Computer Science Department New York University

More information

Applications & Application-Layer Protocols: FTP and (SMTP & POP)

Applications & Application-Layer Protocols: FTP and  (SMTP & POP) COMP 431 Internet Services & Protocols Applications & Application-Layer Protocols: FTP and E ( & POP) Jasleen Kaur February 7, 2019 Application-Layer Protocols Outline Example client/ systems and their

More information

CSC 4900 Computer Networks:

CSC 4900 Computer Networks: CSC 4900 Computer Networks: Email Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review Last week we talked about design principles, and the application protocols

More information

WWW: the http protocol

WWW: the http protocol Internet apps: their protocols and transport protocols Application e-mail remote terminal access Web file transfer streaming multimedia remote file Internet telephony Application layer protocol smtp [RFC

More information

Application: Electronic Mail

Application: Electronic Mail Content Application: Electronic Mail Linda Wu Email system model protocol MIME extensions Mail access protocols (CMPT 471 2003-3) Reference: chapter 27 Notes-19 CMPT 471 2003-3 2 Email System Model Client-

More information

Electronic Mail Paradigm

Electronic Mail Paradigm Electronic Mail Paradigm E-mail uses the client-server model. E-mail was designed as an electronic extension of the old paper office memo. - A quick and easy means of low-overhead written communication.

More information

CS348: Computer Networks (SMTP, POP3, IMAP4); FTP

CS348: Computer Networks  (SMTP, POP3, IMAP4); FTP CS348: Computer Networks E-MAIL (SMTP, POP3, IMAP4); FTP Dr. Manas Khatua Assistant Professor Dept. of CSE, IIT Guwahati E-mail: manaskhatua@iitg.ac.in Electronic mail (E-mail) Allows users to exchange

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

CS 43: Computer Networks. 12: and SMTP September 28, 2018

CS 43: Computer Networks. 12:  and SMTP September 28, 2018 CS 43: Computer Networks 12: Email and SMTP September 28, 2018 A. HTTP Mail s communicate using B. IMAP C. POP D. SMTP Lecture 12 - Slide 2 Mail s typically A. send messages directly from the sending s

More information

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP,  , SMTP, Telnet, FTP, Security-PGP-SSH. APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Application Layer II Dmitri Loguinov Texas A&M University February 6, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

Electronic Mail

Electronic Mail Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing

More information

INTERNET & WORLD WIDE WEB (UNIT-1) MECHANISM OF INTERNET

INTERNET & WORLD WIDE WEB (UNIT-1) MECHANISM OF INTERNET INTERNET & WORLD WIDE WEB (UNIT-1) MECHANISM OF INTERNET 1. INTRODUCTION Hello friends are topic is Internet and World Wide Web the most popular services of our topic is social networking and online shopping

More information

The Application Layer: SMTP, FTP

The Application Layer: SMTP, FTP The Application Layer: SMTP, FTP CS 352, Lecture 5 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana 1 Recap: Application-layer protocols DNS: lookup a (machine-readable) address using a (humanreadable)

More information

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services

More information

Internet Architecture

Internet Architecture Internet Architecture Lecture 10: How Email Work Assistant Teacher Samraa Adnan Al-Asadi 1 How Email Works Electronic mail, or email, might be the most heavily used feature of the Internet. You can use

More information

FTP. FTP offers many facilities :

FTP. FTP offers many facilities : FTP Given a reliable end-to-end trasport protocol like TCP, File Transfer might seem trivial. But, the details authorization, representation among heterogeneous machines make the protocol complex. FTP

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

Electronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur

Electronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur Electronic Mail Prof. Indranil Sen Gupta Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur 1 Introduction Most heavily used application on the Internet. Simple

More information

Network Applications Principles of Network Applications

Network Applications Principles of Network Applications Network Applications Principles of Network Applications A Network application is an application running on one host and provides communication to another application running on a different host. At the

More information

Electronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol

Electronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol SMTP Electronic Mail Three Components: 1. User Agents a.k.a. mail reader e.g., gmail, Outlook, yahoo 2. Mail Servers mailbox contains incoming messages for user message queue of outgoing (to be sent) mail

More information

SMTP. George Porter CSE 124 February 12, 2015

SMTP. George Porter CSE 124 February 12, 2015 SMTP George Porter CSE 124 February 12, 2015 Homework 2 out Announcements Project 2 checkpoint due Tuesday Traditional Applications Two of the most popular The World Wide Web and Email. Broadly speaking,

More information

Objectives CINS/F1-01

Objectives CINS/F1-01 Email Security (1) Objectives Understand how e-mail systems operate over networks. Classify the threats to the security of e-mail. Study how S/MIME and PGP can be used to add security to e-mail systems.

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Application Layer: Cookies, Web Caching, SMTP Sec 2.2.4-2.4 Prof. Lina Battestilli Fall 2017 Outline Application Layer (ch 2) 2.1 principles of network

More information

Different Layers Lecture 21

Different Layers Lecture 21 Different Layers Lecture 21 10/17/2003 Jian Ren 1 The Transport Layer 10/17/2003 Jian Ren 2 Transport Services and Protocols Provide logical communication between app processes running on different hosts

More information

CompSci 356: Computer Network Architectures. Lecture 23: Application Layer Protocols Chapter 9.1. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 23: Application Layer Protocols Chapter 9.1. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 23: Application Layer Protocols Chapter 9.1 Xiaowei Yang xwy@cs.duke.edu The Internet Architecture Application layer Transport layer / Layer 4 Network

More information

CS321: Computer Networks ELECTRONIC MAIL

CS321: Computer Networks ELECTRONIC MAIL CS321: Computer Networks ELECTRONIC MAIL Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Electronic mail (E-mail) It allows users to exchange messages. In HTTP

More information

Lecture 6: Application Layer Web proxies, , and SMTP

Lecture 6: Application Layer Web proxies,  , and SMTP Lecture 6: Application Layer Web proxies, Email, and SMTP COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,

More information

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer Computer Networking Chapter #1 Dr. Abdulrhaman Alameer What is Computer Network? It is a collection of computers and devices interconnected by communications channels that facilitate communications among

More information

Networking. Layered Model. DoD Model. Application Layer. ISO/OSI Model

Networking. Layered Model. DoD Model. Application Layer. ISO/OSI Model Networking Networking is concerned with the physical topology of two or more communicating entities and the logical topology of data transmission. Layered Model Systems communicate over a shared communication

More information

Electronic mail, usually called , consists of simple text messages a piece of text sent to a recipient via the internet.

Electronic mail, usually called  , consists of simple text messages a piece of text sent to a recipient via the internet. 1 Electronic Mail Electronic mail, usually called e-mail, consists of simple text messages a piece of text sent to a recipient via the internet. E-mail Clients To read e-mail, we use an e-mail client,

More information

CS 356 Internet Security Protocols. Fall 2013

CS 356 Internet Security Protocols. Fall 2013 CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5

More information

Application Layer: OSI and TCP/IP Models

Application Layer: OSI and TCP/IP Models Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service

More information

Layered Model. DoD Model. ISO/OSI Model

Layered Model. DoD Model. ISO/OSI Model Data Communications vs Networking (later) Communication is concerned with the transmission of data over a communication medium/channel between two entities. Here we are more concerned about EE issues such

More information

Chapter 10: Application Layer

Chapter 10: Application Layer Chapter 10: Application Layer Application, Session and Presentation Presentation and Session Layers Session layer Functions, creates, and maintains dialogs between source and destination applications Handles

More information

Debian/GNU Linux Mailing

Debian/GNU Linux Mailing Debian/GNU Linux Mailing Overview of the Mailing Károly Erdei October 15, 2014 Károly Erdei Debian/GNU Linux Mailing 1/67 Agenda 1 Mailing 2 Protocols 3 SPAM 4 Antispam 5 Thunderbird 6 TB-Preferences 7

More information

Electronic Mail. Electronic Mailboxes

Electronic Mail. Electronic Mailboxes Electronic Mail E-mail belongs to the Application Layer Has been around since the early 80 s Enables new forms of interaction Fast Automatic processing (sorting, reply) Can carry other content Electronic

More information

Application Level Protocols

Application Level Protocols Application Level Protocols 2 Application Level Protocols Applications handle different kinds of content e.g.. e-mail, web pages, voice Different types of content require different kinds of protocols Application

More information

Lecture 25. Tuesday, November 21 CS 475 Networks - Lecture 25 1

Lecture 25. Tuesday, November 21 CS 475 Networks - Lecture 25 1 Lecture 25 Reminders: Homework 7 due today. Homework 8 posted. Due at the beginning of the last day of class for final exam review. Programming Project 6 posted. Final project worth double. Due by 4:30pm,

More information

Computer Network 1 1

Computer Network 1 1 Computer Network 1 1 Chapter 10: Application Layer Advanced Principal Concepts Samples and Techniques Foundation Summary Question and Answer 2 Outline Application Layer There is a need for support protocols,

More information

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing Motivation For Networking Information access Interaction among cooperative application programs Resource sharing CS422 -- PART 1 13 2003 Practical Results E-mail File transfer/access Web browsing Remote

More information

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 10 Chapter 10 - Sections & Objectives 10.1 Application Layer Protocols Explain the operation of the application

More information

System: Basic Functionality

System: Basic Functionality E-mail System: Basic Functionality E-mail systems support five basic functions: Composition: Creating messages Transfer: Moving messages from the originator to the recipient E-mail transfer is a connection-oriented

More information

Objective. Application Layer Functionality and Protocols. CCNA Exploration 4.0 Network Fundamentals Chapter 03. Universitas Dian Nuswantoro

Objective. Application Layer Functionality and Protocols. CCNA Exploration 4.0 Network Fundamentals Chapter 03. Universitas Dian Nuswantoro CCNA Exploration 4.0 Network Fundamentals Chapter 03 Application Layer Functionality and Protocols Universitas Dian Nuswantoro 1 Objective In this chapter, you will learn to: Describe how the functions

More information

Review of Previous Lecture

Review of Previous Lecture Review of Previous Lecture Network access and physical media Internet structure and ISPs Delay & loss in packet-switched networks Protocol layers, service models Some slides are in courtesy of J. Kurose

More information

Applications FTP. FTP offers many facilities :

Applications FTP. FTP offers many facilities : Applications FTP Given a reliable end-to-end trasport protocol like TCP, File Transfer might seem trivial. But, the details authorization, representation among heterogeneous machines make the protocol

More information

Internet Electronic Mail

Internet Electronic Mail Internet Electronic Mail Antonio Carzaniga Faculty of Informatics University of Lugano March 9, 2010 Outline General concepts Transport protocol: SMTP Basic message format MIME format A Postal Service

More information

ECE697AA Lecture 2. Today s lecture

ECE697AA Lecture 2. Today s lecture ECE697AA Lecture 2 Application Layer: HTTP Tilman Wolf Department of Electrical and Computer Engineering 09/04/08 Protocol stack Application layer Client-server architecture Example protocol: HTTP Demo

More information

Special expressions, phrases, abbreviations and terms of Computer Networks

Special expressions, phrases, abbreviations and terms of Computer Networks access access point adapter Adderssing Realm ADSL (Asymmetrical Digital Subscriber Line) algorithm amplify amplitude analog antenna application architecture ARP (Address Resolution Protocol) AS (Autonomous

More information

SCS3004 Networking Technologies Application Layer Protocols

SCS3004 Networking Technologies Application Layer Protocols SCS3004 Networking Technologies Application Layer Protocols Dr. Ajantha Atukorale University of Colombo School of Computing (UCSC) 2 TCP/IP Suit Applications and application-layer layer protocols Application:

More information

4. The transport layer

4. The transport layer 4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application

More information

Network Encryption Methods

Network Encryption Methods Network Encryption Network Encryption Methods CSC362, Information Security Objectives understanding the impact of employing encryption at different protocol layers application layer encryption transport

More information

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the

More information

Debian/GNU Linux Mailing

Debian/GNU Linux Mailing Debian/GNU Linux Mailing Overview of the Mailing Károly Erdei November 15, 2010 Károly Erdei Debian/GNU Linux Mailing 1/43 Agenda 1 Mailing 2 Protocols 3 SPAM 4 Antispam 5 Thunderbird 6 Links Károly Erdei

More information

Unit 28 Website Production ASSIGNMENT 1

Unit 28 Website Production ASSIGNMENT 1 Unit 28 Website Production ASSIGNMENT 1 Last week Learning outcomes History HTML skeleton Annotated diagram of a WAN Servers, routers, client PC, browser, Server OS Switch, packet Architecture ISP Web

More information

Fig (1) sending and receiving s

Fig (1) sending and receiving  s Electronic Mail Protocols (SMTP, POP, IMAP) It is important to (1) distinguish the user interface (i.e., your mail reader) from the underlying message transfer protocols (such as SMTP, POP or IMAP), and

More information

13. Internet Applications 최양희서울대학교컴퓨터공학부

13. Internet Applications 최양희서울대학교컴퓨터공학부 13. Internet Applications 최양희서울대학교컴퓨터공학부 Internet Applications Telnet File Transfer (FTP) E-mail (SMTP) Web (HTTP) Internet Telephony (SIP/SDP) Presence Multimedia (Audio/Video Broadcasting, AoD/VoD) Network

More information

. SMTP, POP, and IMAP

. SMTP, POP, and IMAP E-Mail SMTP, POP, and IMAP Scope How Email Appears to Work How Email Really Works Mail User Agent (MUA) Message Format Mail Delivery Agent (MDA)/ Mail Transfer Agent (MTA) Firewalls, Spam and Virus Filters

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. Application Layer 1 Chapter 2: Application layer 2.1 Principles

More information

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Lecture 4 Audio Transcript Slide 1 Welcome to Networking and Health Information Exchange, ISO Open System Interconnection

More information

Internet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!

Internet Protocol Stack! Principles of Network Applications! Some Network Apps (and Their Protocols)! Application-Layer Protocols! Our goals:! Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams

More information

is still the most used Internet app. According to some studies around 85% of Internet users still use for communication.

is still the most used Internet app. According to some studies around 85% of Internet users still use  for communication. 1 E-mail is still the most used Internet app. According to some studies around 85% of Internet users still use e-mail for communication. Electronic mail is a method to exchange digital messages from a

More information

b) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc.

b) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc. Objectives CPS221 Lecture: Layered Network Architecture last revised 6/22/10 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

FTP,HTTP. By Nidhi Jindal

FTP,HTTP. By Nidhi Jindal APPLICATION LAYER: SMTP, POP, IMAP, FTP,HTTP By Nidhi Jindal. MESSAGE TRANSFER AGENT: SMTP The actual mail transfer requires message transfer agents (MTAs). The protocol that defines the MTA client and

More information

CSC 4900 Computer Networks: End-to-End Design

CSC 4900 Computer Networks: End-to-End Design CSC 4900 Computer Networks: End-to-End Design Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review In the last two lectures, we discussed the fundamentals of networking

More information

Internet Technology 2/10/2016

Internet Technology 2/10/2016 Internet Technology 03r. Application layer protocols: email Email: (Simple Mail Transfer Protocol) Paul Krzyzanowski Rutgers University Spring 2016 1 2 Simple Mail Transfer Protocol () Protocol defined

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/8/14 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

CCNA R&S: Introduction to Networks. Chapter 10: The Application Layer

CCNA R&S: Introduction to Networks. Chapter 10: The Application Layer CCNA R&S: Introduction to Networks Chapter 10: The Application Layer Frank Schneemann 10.0.1.1 Introduction 10.0.1.2 Activity - Application Investigation 10.1.1.1 OSI and TCP/IP Models Revisited The application

More information

Implications of MIME for Internet Mail Gateways

Implications of MIME for Internet Mail Gateways Network Working Group N. Borenstein, Bellcore Request for Comments: 1344 June 1992 Implications of MIME for Internet Mail Gateways Status of This Memo This is an informational memo for the Internet community,

More information

The Applications and Gaming Tab - Port Range Forward

The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized

More information

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University Computer Networks More on Standards & Protocols Quality of Service Week 10 College of Information Science and Engineering Ritsumeikan University Introduction to Protocols l A protocol is a set of rules

More information

Chapter 4. Internet Applications

Chapter 4. Internet Applications Chapter 4 Internet Application Protocols 1 Internet Applications! Domain Name System! Electronic mail! Remote login! File transfer! World Wide Web! All use client-server model 2 Names! Internet communication

More information

Telemetry Data Sharing Using S/MIME

Telemetry Data Sharing Using S/MIME Telemetry Data Sharing Using S/MIME Item Type text; Proceedings Authors Kalibjian, Jeffrey R. Publisher International Foundation for Telemetering Journal International Telemetering Conference Proceedings

More information

Electronic Mail (SMTP)

Electronic Mail (SMTP) Electronic Mail (SMTP) Nowadays email is more popular than the paper letters called snail-mails. It is a form of network communication. Some of the other forms of network communication being voice-over-internet,

More information

CMSC 322 Computer Networks Applications and End-To- End

CMSC 322 Computer Networks Applications and End-To- End CMSC 322 Computer Networks Applications and End-To- End Professor Doug Szajda CMSC 332: Computer Networks Announcements Project 2 has been posted and is due Monday, February 8 (No extension!) Homework

More information

Application Layer Chapter 2

Application Layer Chapter 2 Application Layer Chapter 2 Silvia Giordano SUPSI CH-6928 Manno silvia.giordano@supsi.ch http://www.supsi.ch SUPSI-DTI Silvia Giordano 10/06/2004 Application Layer 1 Chapter goals: learn about protocols

More information

How Internet Works

How Internet  Works How Internet Email Works Everything you never wanted to know about email but were afraid to ask... Dave O'Neill So, you use email...... but do you know how it works? If

More information

Computer Engineering II Solution to Exercise Sheet Chapter 4

Computer Engineering II Solution to Exercise Sheet Chapter 4 Distributed Computing FS 2018 Prof. R. Wattenhofer Computer Engineering II Solution to Exercise Sheet Chapter 4 1 Quiz Questions a) A user provides his login credentials. The server then returns a cookie

More information

Lecture 7 Application Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 7 Application Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 7 Application Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Application-layer protocols Application: communicating, distributed processes running in network hosts

More information

Chapter 2 Application Layer. Lecture 4: principles of network applications. Computer Networking: A Top Down Approach

Chapter 2 Application Layer. Lecture 4: principles of network applications. Computer Networking: A Top Down Approach Chapter 2 Application Layer Lecture 4: principles of network applications Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Chapter

More information

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 3 Application Layer Functionality and Protocols Application Layer Functionality and Protocols Applications: The Interface Between the Networks Horny/Coufal

More information

2. Introduction to Internet Applications

2. Introduction to Internet Applications 2. Introduction to Internet Applications 1. Representation and Transfer 2. Web Protocols 3. Some Other Application Layer Protocols 4. Uniform Resource Identifiers (URIs) 5. Uniform Resource Locators (URLs)

More information

Chapter 2: Application layer

Chapter 2: Application layer Chapter 2: Application layer 2.1 Principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 Electronic Mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 Socket programming with TCP 2.8 Socket

More information

Networking Revision. TCP/IP Protocol Stack & OSI reference model. Basic Protocols. TCP/IP Model ANTHONY KAO NETWORKING FINAL EXAM SPRING 2014 REVISION

Networking Revision. TCP/IP Protocol Stack & OSI reference model. Basic Protocols. TCP/IP Model ANTHONY KAO NETWORKING FINAL EXAM SPRING 2014 REVISION Networking Revision TCP/IP Protocol Stack & OSI reference model Basic Protocols TCP/IP Model 1 OSI (Open Systems Interconnection) Model main purpose to aid in clearer understanding of the functions and

More information

Debian/GNU Linux Mailing

Debian/GNU Linux Mailing Debian/GNU Linux Mailing Overview of the Mailing Károly Erdei December 9, 2009 Károly Erdei Debian/GNU Linux Mailing 1/46 Agenda 1 Mailing 2 Protocols 3 SPAM 4 Antispam 5 Thunderbird 6 Domain Name System

More information

Overview. Electronic mail. History Format of . Sending . Retrieving . RFC 822, MIME, addresses SMTP, DNS. POP, IMAP, Web-based

Overview. Electronic mail. History Format of  . Sending  . Retrieving  . RFC 822, MIME,  addresses SMTP, DNS. POP, IMAP, Web-based Electronic Mail Electronic mail History Format of email Overview RFC 822, MIME, email addresses Sending email SMTP, DNS Retrieving email POP, IMAP, Web-based 2 Flashback to the 70s ARPANET just recently

More information

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Network Models The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding and developing computer-to-computer communication

More information

Goal and A sample Network App

Goal and A sample Network App Application Layer Goal and A sample Network App Write programs that run on different end systems and communicate over a network. e.g., Web: Web server software communicates with browser software Little

More information

CIT 470: Advanced Network and System Administration. Topics. Mail Policies.

CIT 470: Advanced Network and System Administration. Topics. Mail Policies. CIT 470: Advanced Network and System Administration E-mail CIT 470: Advanced Network and System Administration Slide #1 Topics 1. Mail Policies 2. Anatomy of a Mail Message 3. Components of an E-mail System

More information

COSC 301 Network Management. Lecture 14: Electronic Mail

COSC 301 Network Management. Lecture 14: Electronic Mail COSC 301 Network Management Lecture 14: Electronic Mail Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 14: Electronic Mail 1 Today s Focus Electronic Mail -- How does it work? -- How

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

Lab 3.4.3: Services and Protocols

Lab 3.4.3:  Services and Protocols Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0 10.10.10.5

More information

Network Applications and Protocols

Network Applications and Protocols Network Applications and Protocols VoIP (Voice over Internet Protocol) Voice over IP (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over

More information

UDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data

UDP and TCP. Introduction. So far we have studied some data link layer protocols such as PPP which are responsible for getting data ELEX 4550 : Wide Area Networks 2015 Winter Session UDP and TCP is lecture describes the two most common transport-layer protocols used by IP networks: the User Datagram Protocol (UDP) and the Transmission

More information

Internet Applications. Dr Steve Gordon ICT, SIIT

Internet Applications. Dr Steve Gordon ICT, SIIT Internet Applications Dr Steve Gordon ICT, SIIT Contents Network Application Models Transport Layer Interface Selected Applications and Services Naming Resources Web Access Email Network Management Other

More information