Julian Padget Tel: x6971, October 12, 2011
|
|
- Elfreda Thornton
- 6 years ago
- Views:
Transcription
1 Tel: x6971, Protocols and Applications Acknowledgements: Russell Bradford October 12, 2011 (CS/Bath) October 12, / 30
2 Outline (CS/Bath) October 12, / 30
3 Objectives To introduce some of the core application layer protocols of the internet To illustrate through analysis and example: The use of layers and encapsulation The steady increase in sophistication The composability of protocols thanks to encapsulation The relative simplicity of the key protocols The weaknesses identified in current protocols Hence, create an appreciation of How to design a protocol How to integrate it with the existing internet How to begin a risk assessment of a protocol (CS/Bath) October 12, / 30
4 Remote Access Increasing expectations... telnet simple character-based terminal or process connection ssh secured version of telnet Virtual Private Network (VPN) layer a virtual network over a physical network to provide complete, secured access from remote locations. Deferred until discussion of security (CS/Bath) October 12, / 30
5 Telnet 1/2 Purpose: provide bi-directional, eight-bit byte oriented communications facility. Goal: standard method of interfacing terminal devices and terminal-oriented processes to each other. Vision: terminal-terminal communication ( linking ) and process-process communication (distributed computation) Definition: RFC854, 1983 Usage: telnet [-468ELadr] [-S tos] [-b address] [-e escapechar] [-l user] [-n tracefile] [host [port]] (CS/Bath) October 12, / 30
6 Telnet 2/2 For example: telnet gate.cs.bath.ac.uk, defaults to (TCP) port 23 Or telnet mailhost.zen.co.uk 25, for the SMTP (mail) port Function: relay characters from one end of connection to other (port to port) Insecure: all data (including passwords) readable by machines en-route Now replaced by Secure SHell (CS/Bath) October 12, / 30
7 File Transfer Support for bulk transfer also necessary Original: File Transfer Protocol (FTP) over TCP Secure FTP (SFTP) builds on OpenSSH Operations: get, put, directory manipulation, etc. Replacements/extensions: Remote copy (rcp) builds on OpenSSH, now obsolete Secure copy (scp) builds on OpenSSH Remote sync (rsync) copy/update using file differences Often (some of) these service ports are blocked for security Direct usage now very low: function embedded in HTTP (CS/Bath) October 12, / 30
8 Secure SHell (SSH) Purpose: secure remote login and other secure network services over an insecure network. Definition: RFC4251 (Architecture), notation + terminology + mechanism for local extensions Components: 1 Transport layer (RFC2453): server authentication, confidentiality, and integrity with perfect forward secrecy 2 User Authentication Protocol (RFC4252): authenticates the client to the server 3 Connection Protocol (RFC4254): multiplexes the encrypted tunnel into several logical channels Usage: do man ssh Note: X forwarding Example: ssh gate.cs.bath.ac.uk -l username (CS/Bath) October 12, / 30
9 Components MTA Transport Agent MTC Transport Client Server delivery point for messages Consider three aspects: 1 Sending mail SMTP 2 Spam 3 Fetching mail POP/IMAP (CS/Bath) October 12, / 30
10 Simple Transfer Protocol (SMTP)1/3 Definition: RFC0821, 1982, obsoleted by RFC2821, 2001 Requirements: reliable ordered data stream channel (TCP!) Model: 1 Sender-SMTP establishes a two-way transmission channel to a receiver-smtp. 2 Receiver-SMTP may be destination or intermediate 3 Sender-SMTP sends commands to receiver-smtp 4 Receiver-SMTP replies sender-smtp See [Bradford, 2007] Ch.12 and/or [Stevens, 1993], Ch.28 at com.ezp2.bath.ac.uk/ /ch28 User File System Sender- SMTP SMTP Commands Replies Receiver- SMTP File System (CS/Bath) October 12, / 30
11 SMTP 2/3 SMTP is an old protocol; uses human-readable messages, such as HELO, MAIL FROM, etc. to help in debugging Example session: yourhost.bath.ac.uk ESMTP Postfix 2 HELO myhost yourhost.bath.ac.uk 4 MAIL FROM: me@myhost Ok 6 RCPT TO: you@yourhost Ok 8 DATA End data with <CR><LF>.<CR><LF> 10 Date: Fri, 20 May :37: From: me@myhost 12 To: you@yourhost 13 Subject: sending This is an example Ok: queued as 1BC31201B82 (CS/Bath) October 12, / 30
12 SMTP 3/3 Lines with numbers are from server; function as return codes, indicating success, failure or other states, e.g. 220: service ready 250: success 354: start mail input Other lines are from client; called the envelope HELO: name of client MAIL FROM: send of RCPT TO: intended recipient(s) DATA: start of message End of mail is a lone full-stop (CS/Bath) October 12, / 30
13 Spam Ca perhaps 80% of the world s is bulk unsolicited commercial , also known as spam SMTP was designed/developed in an academic environment: no consideration of authentication The FROM field is useless as it can be anything the sender wants Secure SMTP known as both SMPTS and SSMTP, uses SSL. Secures content in transit no help Spam filtering: Where does mail come from? What does it contain? Keyword matching? Probabilistic matching? (Spam Assassin) application of machine learning (CS/Bath) October 12, / 30
14 Combatting Spam Blacklist: refuse to accept mail from certain addresses. Improve effectiveness by using DNS and Realtime Blackhole Lists (RBLs) to lookup up IP addresses Whitelist: always accept mail from certain addresses. Good for individuals, but not for companies. Greylist: use a whitelist; reply to unknown addresses with a (temporary) delivery failure message, then add address to whitelist with an expiry time. Normal senders wait a bit and re-try, spammers do not bother. Sender Policy Framework (SPF, aka Sender Permitted From): can help against forging the From field. Uses DNS to look up to see if the From address is permitted to send from the actual IP address the came from Domain Keys: use DNS to store public encryption keys that can be used to check signatures on s (CS/Bath) October 12, / 30
15 servers MTC uses SMTP to send mail and POP or IMAP to fetch mail Originally users had one mailbox and used one machine Now situation is very different: want access to multiple mailboxes from anywhere POP = Post Office Protocol IMAP = Internet Message Access Protocol Secure variants exist: SPOP, SIMAP (aka IMAPS) both of which run over SSL/TLS (CS/Bath) October 12, / 30
16 Post Office Protocol (POP) 1/2 RFC1939, Post Office Protocol - Version 3, J.Myers, M.Rose, 1996 There are 24 RFCs in relation to POP (at the time of writing) POP3 works over a TCP/IP connection using TCP on network port 110 POP3 requirements derived from view that a workstation cannot support SMTP and mail delivery continuously and is not permanently connected POP3 supports a maildrop model: download and delete (from server) moving through three states: 1 Authorization: client identification USER, PASS 2 Transaction: client requests server actions (STAT, LIST, RETR, DELE, NOOP, RSET), ending with QUIT 3 Update: release resources and terminate protocol Several optional commands: TOP, UIDL, APOP (CS/Bath) October 12, / 30
17 POP 2/2 Sample transaction: 1 jap@jap-lap2:~> telnet mailhost.zen.co.uk Trying Connected to mailhost.zen.co.uk. 4 Escape character is ^]. 5 +OK smarthost03.mail, Zen Internet POP3 Server Ready 6 USER julian.padget 7 +OK Please enter your pass, with the PASS command. 8 PASS not-a-password 9 -ERR Authentication Failed. 10 Connection closed by foreign host. POP4 adds selected features from IMAP, but appears to be moribund since 2003 (CS/Bath) October 12, / 30
18 Internet Message Access Protocol RFC3501 Internet Message Access Protocol - Version 4rev1, M.Crispin, 2003 There are 56 RFCs in relation to IMAP (at the time of writing) IMAP provides a mailstore facility that assumes extended connectivity Offers greater functionality than POP3: Connected and disconnected modes of operation Multiple clients simultaneously connected to the same mailbox (transactional) Access to MIME message parts and partial fetch Message state information Multiple mailboxes on the server Server-side searches Built-in extension mechanism (CS/Bath) October 12, / 30
19 Over Internet Protocol (VOIP) Origins in Network Protocol (NVP) specification (RFC 741), 1973 US telcos requested the US Congress to ban internet telephony in 1996 Builds on several protocols for different purposes: Session Initiation Protocol (SIP), RFC3261. Used for most standards based in-house and internet telephony (e.g. resnet in bath) H.323 teleconferencing Real Time Protocol (RTP) A combination of UDP and TCP, generally UDP for voice data and TCP for control of the connection is easily digitised and sent on the Internet The marginal cost of internet use is very small compared to that of long-distance calls (CS/Bath) October 12, / 30
20 Addressing in VOIP ITU Electronic Numbering (ENUM) standard unifies telephone numbers and IP domains: A number such as Translates to the E.164 address e164.arpa This resolves to the relevant IP end-point Week tbd: VOIP seminar (CS/Bath) October 12, / 30
21 HTTP HyperText Transfer Protocol (HTTP) is the protocol over which the web works Simple requst-response protocol (originally) Definition: HTTP 1.0 in RFC1945, 1996 Revised and extended: HTTP 1.1 in RFC2616, 1999 Like SMTP, designed for human readability for ease of debugging An example web page request (using HTTP1.0): GET /home.html HTTP/1.0 Host:xanadu:80 Note blank line (instead of lone full stop) at end 80 is the conventional port for the web server (CS/Bath) October 12, / 30
22 HTTP response Header and data Data encapsulated in a MIME block Server communicates information using codes: Successful 2xx: e.g. 200 OK Redirection 3xx: e.g. 301 Moved Permanently Client error 4xx: e.g. 404 Not Found Server error 5xx: e.g. 500 Internal Server Error HTTP/ OK Server: Wombat Server 1.0 MIME-version: 1.0 Content-type: text/html Content-length: 81 Expires: Tue Feb 14 22:57: <html> <head> <title>example</title> </head> <body> Hello world. </body> </html> (CS/Bath) October 12, / 30
23 HTTP mechanics HTTP1.0 opens a new TCP connection for each request One web page may results in many requests (one for each image, for example) High overhead in TCP handshake + teardown Solutions: A persistent connection Share connections between users by a proxy Proxy enables: 1 Security: one point of organization entry/exit 2 Monitoring: collect request data 3 Control: prevent access to specified sites (CS/Bath) October 12, / 30
24 HTTP verbs GET uri: retrieve content identified by uri POST uri content: requests server to accept content as subordinate of uri (subject to local processing) PUT uri content: requests server to store content under uri DELETE uri: requests server to delete content under uri HEAD uri: like GET, but only returns meta-information TRACE: request recipient returns message received body of a 200 (OK) response CONNECT: reserved for use with a proxy that can dynamically switch to being a tunnel, such as SSL HTTP 1.1: supports Chunked Transfer Coding modifies the body of a message to transfer it as a series of chunks, each with its own size indicator. See RFC2616 HTTP/1.1 (CS/Bath) October 12, / 30
25 HTTP Headers Format = <name>: <value> ; four categories: general-header (RFC2616, 4.5) request-header (RFC2616, 5.3) response-header (RFC2616, 6.2) entity-header (RFC2616, 7.1) Session management (response header): Cookie: <attribute> Set-Cookie: <attribute> = <value> Also specify some of: domain, max-age, path, secure, version (required) For example: Content-type: text/html Set-Cookie: foo=bar; path=/; expires Mon, 09-Dec :46:00 GMT Header key for proxy: contains information to enable proxy to forward request (CS/Bath) October 12, / 30
26 HTTPS/SSL HTTP telnet: data can be read by any machine en-route HTTPS ssh: HTTP over an encrypting layer SSL/TLS (detailed discussion under Security) SHTTP is an extension to the HTTP protocol to include security and authentication usage uncommon HTTPS is widely used the padlock sign on the browser for pages requesting confidential data (CS/Bath) October 12, / 30
27 Summary Protocols over protocols all of the above Encapsulation: higher level protocols package up their data to pass it over lower levels (e.g. TCP) Protocols are not adaptable (probably for the better!) and have to be revised, extended, replaced to cope with changed environment Most protocols layer on TCP Most protocols use human-readable commands to help debugging Omissions: File sharing: deferred to discussion of programming frameworks due to use of Remote Procedure Call (RPC) Security: deferred to SSL/TLS, VPNs to Security in order to treat whole topic MIME encapsulation: deferred to discussion of data representation (CS/Bath) October 12, / 30
28 Resources I Never believe one source web standards development, publication of recommendations. Russell Bradford s website: http: //people.bath.ac.uk/masrjb/aocn/links.html RFC0821 Simple Transfer Protocol, J.Postel, 1982 RFC854 Telnet Protocol Specification, J.Postel and J.Reynolds, 1983 RFC1939, Post Office Protocol - Version 3, J.Myers, M.Rose, 1996 (CS/Bath) October 12, / 30
29 Resources II RFC1945 Transfer Protocol HTTP/1.0, T. Berners-Lee, R. Fielding, H. Frystyk, 1996 RFC2616 Transfer Protocol HTTP/1.1, R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, T. Berners-Lee, 1999 RFC2821 Simple Transfer Protocol, J.Klensin (ed), 2001, obsoletes RFC0821 RFC3261 SIP: Session Initiation Protocol, J.Rosenberg, H.Schulzrinne, G.Camarillo, A.Johnston, J.Peterson, R.Sparks, M.Handley, E.Schooler, 2002 RFC3501 Internet Message Access Protocol - Version 4rev1, M.Crispin, 2003 (CS/Bath) October 12, / 30
30 Bradford, R. (2007). The Art of Computer Networking. Prentice Hall. ISBN-13: , on-line resources can be retrieved from Stevens, W. R. (1993). TCP/IP Illustrated, Volume 1: The Protocols. Addison Wesley. Retrieved via Safari at Bath : (CS/Bath) October 12, / 30
Internet and Intranet Protocols and Applications
Internet and Intranet Protocols and Applications Lecture 4: General Characteristics of Internet Protocols; the Email Protocol February 10, 2004 Arthur Goldberg Computer Science Department New York University
More informationCN Assignment I. 1. With an example explain how cookies are used in e-commerce application to improve the performance.
CN Assignment I 1. With an example explain how cookies are used in e-commerce application to improve the performance. In an e-commerce application, when the user sends a login form to the server, the server
More informationInternet Technology. 03r. Application layer protocols: . Paul Krzyzanowski. Rutgers University. Spring 2016
Internet Technology 03r. Application layer protocols: email Paul Krzyzanowski Rutgers University Spring 2016 1 Email: SMTP (Simple Mail Transfer Protocol) 2 Simple Mail Transfer Protocol (SMTP) Protocol
More informationWWW: the http protocol
Internet apps: their protocols and transport protocols Application e-mail remote terminal access Web file transfer streaming multimedia remote file Internet telephony Application layer protocol smtp [RFC
More informationChapter 2 Application Layer
Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationInternet Mail: The SMTP Model
Internet Mail: The SMTP Model User File System Sender- SMTP SMTP Commands Replies Receiver- SMTP File System Simple Mail Transfer Protocol (SMTP) to transfer e-mails Depending on the operating system,
More informationSMTP. George Porter CSE 124 February 12, 2015
SMTP George Porter CSE 124 February 12, 2015 Homework 2 out Announcements Project 2 checkpoint due Tuesday Traditional Applications Two of the most popular The World Wide Web and Email. Broadly speaking,
More informationThe Application Layer: & SMTP
The Application Layer: email & SMTP Smith College, CSC 249 Feb 1, 2018 4-1 Chapter 2: Application layer q 2.1 Principles of network applications q 2.2 Web and HTTP q 2.3 FTP q 2.4 Electronic Mail v SMTP,
More informationChapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP
Chapter 2: outline 2.1 principles of network applications app architectures app requirements 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming
More informationSCS3004 Networking Technologies Application Layer Protocols
SCS3004 Networking Technologies Application Layer Protocols Dr. Ajantha Atukorale University of Colombo School of Computing (UCSC) 2 TCP/IP Suit Applications and application-layer layer protocols Application:
More informationProduced by. Mobile Application Development. Higher Diploma in Science in Computer Science. Eamonn de Leastar
Mobile Application Development Higher Diploma in Science in Computer Science Produced by Eamonn de Leastar (edeleastar@wit.ie) Department of Computing, Maths & Physics Waterford Institute of Technology
More informationECE697AA Lecture 2. Today s lecture
ECE697AA Lecture 2 Application Layer: HTTP Tilman Wolf Department of Electrical and Computer Engineering 09/04/08 Protocol stack Application layer Client-server architecture Example protocol: HTTP Demo
More informationCSCE 463/612 Networks and Distributed Processing Spring 2018
CSCE 463/612 Networks and Distributed Processing Spring 2018 Application Layer II Dmitri Loguinov Texas A&M University February 6, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter
More informationCS 43: Computer Networks. 12: and SMTP September 28, 2018
CS 43: Computer Networks 12: Email and SMTP September 28, 2018 A. HTTP Mail s communicate using B. IMAP C. POP D. SMTP Lecture 12 - Slide 2 Mail s typically A. send messages directly from the sending s
More informationCSC 4900 Computer Networks:
CSC 4900 Computer Networks: Email Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review Last week we talked about design principles, and the application protocols
More informationApplications & Application-Layer Protocols: FTP and (SMTP & POP)
COMP 431 Internet Services & Protocols Applications & Application-Layer Protocols: FTP and E ( & POP) Jasleen Kaur February 7, 2019 Application-Layer Protocols Outline Example client/ systems and their
More informationApplication-layer Protocols and Internet Services
Application-layer Protocols and Internet Services Computer Networks Lecture 8 http://goo.gl/pze5o8 Terminal Emulation 2 Purpose of Telnet Service Supports remote terminal connected via network connection
More informationApplication Level Protocols
Application Level Protocols 2 Application Level Protocols Applications handle different kinds of content e.g.. e-mail, web pages, voice Different types of content require different kinds of protocols Application
More informationChapter 2 Application Layer
Chapter 2 Application Layer Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. Application Layer 1 Chapter 2: Application layer 2.1 Principles
More informationCSC 401 Data and Computer Communications Networks
CSC 401 Data and Computer Communications Networks Application Layer: Cookies, Web Caching, SMTP Sec 2.2.4-2.4 Prof. Lina Battestilli Fall 2017 Outline Application Layer (ch 2) 2.1 principles of network
More informationLecture 25. Tuesday, November 21 CS 475 Networks - Lecture 25 1
Lecture 25 Reminders: Homework 7 due today. Homework 8 posted. Due at the beginning of the last day of class for final exam review. Programming Project 6 posted. Final project worth double. Due by 4:30pm,
More informationanti-spam techniques beyond Bayesian filters
anti-spam techniques beyond Bayesian filters Plain Old SMTP protocol overview Grey-Listing save resources on receiver side Authentication of Senders Sender ID Framework DomainKeys signingbased IP-based
More informationIntroduction to Networking
Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI
More informationNetworking. Layered Model. DoD Model. Application Layer. ISO/OSI Model
Networking Networking is concerned with the physical topology of two or more communicating entities and the logical topology of data transmission. Layered Model Systems communicate over a shared communication
More informationElectronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur
Electronic Mail Prof. Indranil Sen Gupta Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur 1 Introduction Most heavily used application on the Internet. Simple
More informationThe Application Layer: SMTP, FTP
The Application Layer: SMTP, FTP CS 352, Lecture 5 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana 1 Recap: Application-layer protocols DNS: lookup a (machine-readable) address using a (humanreadable)
More informationLayered Model. DoD Model. ISO/OSI Model
Data Communications vs Networking (later) Communication is concerned with the transmission of data over a communication medium/channel between two entities. Here we are more concerned about EE issues such
More informationInformation Network Systems The application layer. Stephan Sigg
Information Network Systems The application layer Stephan Sigg Tokyo, November 15, 2012 Introduction 04.10.2012 Introduction to the internet 11.10.2012 The link layer 18.10.2012 The network layer 25.10.2012
More informationCS 716: Introduction to communication networks. Instructor: Sridhar Iyer Demo by: Swati Patil IIT Bombay
CS 716: Introduction to communication networks - 16 th class; 28 th Sept 2011 Instructor: Sridhar Iyer Demo by: Swati Patil IIT Bombay What is IP address An identifier for a computer or device on a TCP/IP
More informationLecture 6: Application Layer Web proxies, , and SMTP
Lecture 6: Application Layer Web proxies, Email, and SMTP COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationCOSC 301 Network Management. Lecture 14: Electronic Mail
COSC 301 Network Management Lecture 14: Electronic Mail Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 14: Electronic Mail 1 Today s Focus Electronic Mail -- How does it work? -- How
More informationInternet Electronic Mail
Internet Electronic Mail Antonio Carzaniga Faculty of Informatics University of Lugano March 9, 2010 Outline General concepts Transport protocol: SMTP Basic message format MIME format A Postal Service
More informationObjectives CINS/F1-01
Email Security (1) Objectives Understand how e-mail systems operate over networks. Classify the threats to the security of e-mail. Study how S/MIME and PGP can be used to add security to e-mail systems.
More informationInternet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!
Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams
More informationElectronic Mail
Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing
More informationSC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers
SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples
More informationInternet Technology 2/10/2016
Internet Technology 03r. Application layer protocols: email Email: (Simple Mail Transfer Protocol) Paul Krzyzanowski Rutgers University Spring 2016 1 2 Simple Mail Transfer Protocol () Protocol defined
More informationComputer Networking. Chapter #1. Dr. Abdulrhaman Alameer
Computer Networking Chapter #1 Dr. Abdulrhaman Alameer What is Computer Network? It is a collection of computers and devices interconnected by communications channels that facilitate communications among
More informationCOMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ
COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Web Access: HTTP 16501018 Mehmet KORKMAZ World Wide Web What is WWW? WWW = World Wide Web = Web!= Internet Internet is a global system of interconnected computer
More information13. Internet Applications 최양희서울대학교컴퓨터공학부
13. Internet Applications 최양희서울대학교컴퓨터공학부 Internet Applications Telnet File Transfer (FTP) E-mail (SMTP) Web (HTTP) Internet Telephony (SIP/SDP) Presence Multimedia (Audio/Video Broadcasting, AoD/VoD) Network
More informationNetwork Applications Principles of Network Applications
Network Applications Principles of Network Applications A Network application is an application running on one host and provides communication to another application running on a different host. At the
More informationAPPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.
APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.
More informationNetwork concepts introduction & wireshark
Network concepts introduction & wireshark W0RKSH0P @KirilsSolovjovs Why am I doing this? Many people attending hacker conferences are not in fact experts, but come here to learn and have fun Opportunity
More informationTRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016
TRANSMISSION CONTROL PROTOCOL ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 ETI 2506 - TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember 1.
More informationFig (1) sending and receiving s
Electronic Mail Protocols (SMTP, POP, IMAP) It is important to (1) distinguish the user interface (i.e., your mail reader) from the underlying message transfer protocols (such as SMTP, POP or IMAP), and
More informationSimple Network Management Protocol (SNMP)
Announcements Project #5 extended until Dec. 10 Reading: 7.3, start 7.4 Midterm #2 last day to request re-grades Th in class HW#2 (due Tuesday Dec. 7) 1 Simple Network Management Protocol (SNMP) Managed
More informationCS 3516: Computer Networks
Welcome to CS 3516: Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: AK219 Fall 2018 A-term 1 Some slides are originally from the course materials of the textbook Computer
More informationChapter 2: Application Layer. Chapter 2 Application Layer. Some network apps. Application architectures. Chapter 2: Application layer
Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009. Chapter 2: Application Layer Our goals: conceptual, implementation
More informationLecture 7b: HTTP. Feb. 24, Internet and Intranet Protocols and Applications
Internet and Intranet Protocols and Applications Lecture 7b: HTTP Feb. 24, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu WWW - HTTP/1.1 Web s application layer protocol
More informationApplication Layer Introduction; HTTP; FTP
Application Layer Introduction; HTTP; FTP Tom Kelliher, CS 325 Feb. 4, 2011 1 Administrivia Announcements Assignment Read 2.4 2.6. From Last Time Packet-switched network characteristics; protocol layers
More informationHyperText Transfer Protocol
Outline Introduce Socket Programming Domain Name Service (DNS) Standard Application-level Protocols email (SMTP) HTTP HyperText Transfer Protocol Defintitions A web page consists of a base HTML-file which
More informationNetwork Services, VU 2.0
Network Services, VU 2.0 Email (SMTP, POP3, IMAP) News Dipl.-Ing. Johann Oberleiter Institute for Informationsystems, Distributed Systems Group Agenda Mail general info SMTP (Simple Mail Transfer Protocol)
More informationChapter 2 Application Layer
Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Some network apps e-mail web text messaging remote
More informationCompSci 356: Computer Network Architectures. Lecture 23: Application Layer Protocols Chapter 9.1. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 23: Application Layer Protocols Chapter 9.1 Xiaowei Yang xwy@cs.duke.edu The Internet Architecture Application layer Transport layer / Layer 4 Network
More informationWorld-Wide Web Protocols CS 571 Fall Kenneth L. Calvert All rights reserved
World-Wide Web Protocols CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved World-Wide Web The Information Universe World-Wide Web structure: hypertext Nonlinear presentation of information Key
More informationApplication Layer: OSI and TCP/IP Models
Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service
More informationElectronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol
SMTP Electronic Mail Three Components: 1. User Agents a.k.a. mail reader e.g., gmail, Outlook, yahoo 2. Mail Servers mailbox contains incoming messages for user message queue of outgoing (to be sent) mail
More informationCiphermail Webmail Messenger Administration Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Webmail Messenger Administration Guide October 27, 2017, Rev: 8630 Copyright 2013-2017, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Admin login
More informationCIT 470: Advanced Network and System Administration. Topics. Mail Policies.
CIT 470: Advanced Network and System Administration E-mail CIT 470: Advanced Network and System Administration Slide #1 Topics 1. Mail Policies 2. Anatomy of a Mail Message 3. Components of an E-mail System
More informationChapter 6: Security of higher layers. (network security)
Chapter 6: Security of higher layers (network security) Outline TLS SET 1. TLS History of TLS SSL = Secure Socket Layer defined by Netscape normalized as TLS TLS = Transport Layer Security between TCP
More informationFTP. FTP offers many facilities :
FTP Given a reliable end-to-end trasport protocol like TCP, File Transfer might seem trivial. But, the details authorization, representation among heterogeneous machines make the protocol complex. FTP
More informationApplication: Electronic Mail
Content Application: Electronic Mail Linda Wu Email system model protocol MIME extensions Mail access protocols (CMPT 471 2003-3) Reference: chapter 27 Notes-19 CMPT 471 2003-3 2 Email System Model Client-
More informationCMPE 151: Network Administration. Servers
CMPE 151: Network Administration Servers Announcements Unix shell+emacs tutorial. Basic Servers Telnet/Finger FTP Web SSH NNTP Let s look at the underlying protocols. Client-Server Model Request Response
More informationChapter 2 Application Layer. Lecture 4: principles of network applications. Computer Networking: A Top Down Approach
Chapter 2 Application Layer Lecture 4: principles of network applications Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Chapter
More informationLecture 7 Application Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it
Lecture 7 Application Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Application-layer protocols Application: communicating, distributed processes running in network hosts
More informationNetwork Applications Electronic Mail
Network Applications Electronic Mail The OSI way to do this is specified in X.400 (84 & 88) Overall Architecture UA P3 UA MS P7 P1 MTS At the core of the X.400 Message Handling System (MHS) is the Message
More informationApplications & Application-Layer Protocols: The Web & HTTP
CPSC 360 Network Programming Applications & Application-Layer Protocols: The Web & HTTP Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu http://www.cs.clemson.edu/~mweigle/courses/cpsc360
More informationApplication Protocols and HTTP
Application Protocols and HTTP 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Lab #0 due
More informationIntroduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University
Introduction to Computer Science William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Chapter 4: Networking and the Internet No one owns the Internet, and only one
More informationApplication Layer: HTTP
Application Layer: HTTP EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 23-Jan-18 1-1 Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP 2.3 electronic
More informationCS348: Computer Networks (SMTP, POP3, IMAP4); FTP
CS348: Computer Networks E-MAIL (SMTP, POP3, IMAP4); FTP Dr. Manas Khatua Assistant Professor Dept. of CSE, IIT Guwahati E-mail: manaskhatua@iitg.ac.in Electronic mail (E-mail) Allows users to exchange
More informationThe World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to
1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats
More informationHow Internet Works
How Internet Email Works Everything you never wanted to know about email but were afraid to ask... Dave O'Neill So, you use email...... but do you know how it works? If
More informationChapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP
Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming with UDP and TCP Application
More informationEthernet / TCP-IP - Training Suite Application level protocols
Ethernet / TCP-IP - Training Suite 05 - Application level protocols Application layer protocols 2 World Wide Web HTTP I want HTTP this resource. Hypertext Transfer Protocol (HTTP) Used by the World Wide
More informationEEC-682/782 Computer Networks I
EEC-682/782 Computer Networks I Lecture 20 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at
More informationInternet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects
Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP
More informationElectronic Mail Paradigm
Electronic Mail Paradigm E-mail uses the client-server model. E-mail was designed as an electronic extension of the old paper office memo. - A quick and easy means of low-overhead written communication.
More informationMotivation For Networking. Information access Interaction among cooperative application programs Resource sharing
Motivation For Networking Information access Interaction among cooperative application programs Resource sharing CS422 -- PART 1 13 2003 Practical Results E-mail File transfer/access Web browsing Remote
More informationInternet Protocols. Robin Sharp
Internet Protocols Robin Sharp Informatics and Mathematical Modelling Technical University of Denmark Phone: (+45) 4525 3749 e-mail: robin@imm.dtu.dk Internet Protocols Just to remind you: Application
More information. SMTP, POP, and IMAP
E-Mail SMTP, POP, and IMAP Scope How Email Appears to Work How Email Really Works Mail User Agent (MUA) Message Format Mail Delivery Agent (MDA)/ Mail Transfer Agent (MTA) Firewalls, Spam and Virus Filters
More informationOctober 4, 2000 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this Memo
Internet Draft draft-hoffman-rfc2487bis-04.txt October 4, 2000 Expires in six months Paul Hoffman Internet Mail Consortium Status of this Memo SMTP Service Extension for Secure SMTP over TLS This document
More informationSimple Network Management Protocol (SNMP)
Announcements Project #5 extended until Dec. 10 Reading: 7.3, start 7.4 Midterm #2 last day to request re-grades Th in class HW#2 (due Tuesday Dec. 7) 1 Simple Network Management Protocol (SNMP) Managed
More informationFoundations of Python
Foundations of Python Network Programming The comprehensive guide to building network applications with Python Second Edition Brandon Rhodes John Goerzen Apress Contents Contents at a Glance About the
More informationChapter 4: Networking and the Internet
Chapter 4: Networking and the Internet 2015 Pearson Education Limited 2015 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols
More information. indigoo.com INTRODUCTION TO MAIL TRANSFER PROTOCOLS FOR THE INTERNET. Peter R. Egli INDIGOO.COM. 1/35 Rev Peter R.
EMAIL INTRODUCTION TO MAIL TRANSFER PROTOCOLS FOR THE INTERNET Peter R. Egli INDIGOO.COM 1/35 Contents 1. EMail Electronic Mail RFC821/RFC822 2. Email Elements 3. Email Message 4. Email Transfer with SMTP
More informationProtocols and Software. Nixu Ltd.
E-mail Protocols and Software Nixu Ltd. CONTENTS SMTP Interaction with DNS Sendmail IMAP and POP MIME Spam Nixu Ltd. 2/39 E-mail Protocols and Software History In the dawn of times (= before Internet)
More information4. The transport layer
4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application
More informationElectronic Mail (SMTP)
Electronic Mail (SMTP) Nowadays email is more popular than the paper letters called snail-mails. It is a form of network communication. Some of the other forms of network communication being voice-over-internet,
More informationIntroduction to TCP/IP
Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP
More informationNotes beforehand... For more details: See the (online) presentation program.
Notes beforehand... Notes beforehand... For more details: See the (online) presentation program. Topical overview: main arcs fundamental subjects advanced subject WTRs Lecture: 2 3 4 5 6 7 8 Today: the
More informationVII. Corente Services SSL Client
VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...
More informationMail agents. Introduction to Internet Mail. Message format (1) Message format (2)
Introduction to Internet Mail Noah Sematimba Based on Materials by Philip Hazel. Mail agents MUA = Mail User Agent Interacts directly with the end user Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
More informationVersion SurfControl RiskFilter - Administrator's Guide
Version 5.2.4 SurfControl RiskFilter - E-mail Administrator's Guide CONTENTS Notices...i FINDING YOUR WAY AROUND...1 How RiskFilter works...2 Managing your messages with RiskFilter...2 Load balancing with
More informationChapter 2 part B: outline
Chapter 2 part B: outline 2.3 FTP 2.4 electronic, POP3, IMAP 2.5 DNS Application Layer 2-1 FTP: the file transfer protocol at host FTP interface FTP client local file system file transfer FTP remote file
More informationFTP,HTTP. By Nidhi Jindal
APPLICATION LAYER: SMTP, POP, IMAP, FTP,HTTP By Nidhi Jindal. MESSAGE TRANSFER AGENT: SMTP The actual mail transfer requires message transfer agents (MTAs). The protocol that defines the MTA client and
More informationFortinet.Certdumps.FCESP.v by.Zocki.81q. Exam Code: FCESP. Exam Name: Fortinet Certified Security Professional
Fortinet.Certdumps.FCESP.v2014-03-05.by.Zocki.81q Number: FCESP Passing Score: 600 Time Limit: 105 min File Version: 18.5 http://www.gratisexam.com/ Exam Code: FCESP Exam Name: Fortinet Certified Email
More informationChapter 4: Networking and the Internet. Copyright 2015 Pearson Education, Inc.
Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols 4.5 Security 4-2 Network Classifications
More informationSystem: Basic Functionality
E-mail System: Basic Functionality E-mail systems support five basic functions: Composition: Creating messages Transfer: Moving messages from the originator to the recipient E-mail transfer is a connection-oriented
More informationAppliance Installation Guide
Appliance Installation Guide GWAVA 5 Copyright 2009. GWAVA Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com 1 Contents Overview... 2 Minimum System Requirements...
More information