Julian Padget Tel: x6971, October 12, 2011

Size: px
Start display at page:

Download "Julian Padget Tel: x6971, October 12, 2011"

Transcription

1 Tel: x6971, Protocols and Applications Acknowledgements: Russell Bradford October 12, 2011 (CS/Bath) October 12, / 30

2 Outline (CS/Bath) October 12, / 30

3 Objectives To introduce some of the core application layer protocols of the internet To illustrate through analysis and example: The use of layers and encapsulation The steady increase in sophistication The composability of protocols thanks to encapsulation The relative simplicity of the key protocols The weaknesses identified in current protocols Hence, create an appreciation of How to design a protocol How to integrate it with the existing internet How to begin a risk assessment of a protocol (CS/Bath) October 12, / 30

4 Remote Access Increasing expectations... telnet simple character-based terminal or process connection ssh secured version of telnet Virtual Private Network (VPN) layer a virtual network over a physical network to provide complete, secured access from remote locations. Deferred until discussion of security (CS/Bath) October 12, / 30

5 Telnet 1/2 Purpose: provide bi-directional, eight-bit byte oriented communications facility. Goal: standard method of interfacing terminal devices and terminal-oriented processes to each other. Vision: terminal-terminal communication ( linking ) and process-process communication (distributed computation) Definition: RFC854, 1983 Usage: telnet [-468ELadr] [-S tos] [-b address] [-e escapechar] [-l user] [-n tracefile] [host [port]] (CS/Bath) October 12, / 30

6 Telnet 2/2 For example: telnet gate.cs.bath.ac.uk, defaults to (TCP) port 23 Or telnet mailhost.zen.co.uk 25, for the SMTP (mail) port Function: relay characters from one end of connection to other (port to port) Insecure: all data (including passwords) readable by machines en-route Now replaced by Secure SHell (CS/Bath) October 12, / 30

7 File Transfer Support for bulk transfer also necessary Original: File Transfer Protocol (FTP) over TCP Secure FTP (SFTP) builds on OpenSSH Operations: get, put, directory manipulation, etc. Replacements/extensions: Remote copy (rcp) builds on OpenSSH, now obsolete Secure copy (scp) builds on OpenSSH Remote sync (rsync) copy/update using file differences Often (some of) these service ports are blocked for security Direct usage now very low: function embedded in HTTP (CS/Bath) October 12, / 30

8 Secure SHell (SSH) Purpose: secure remote login and other secure network services over an insecure network. Definition: RFC4251 (Architecture), notation + terminology + mechanism for local extensions Components: 1 Transport layer (RFC2453): server authentication, confidentiality, and integrity with perfect forward secrecy 2 User Authentication Protocol (RFC4252): authenticates the client to the server 3 Connection Protocol (RFC4254): multiplexes the encrypted tunnel into several logical channels Usage: do man ssh Note: X forwarding Example: ssh gate.cs.bath.ac.uk -l username (CS/Bath) October 12, / 30

9 Components MTA Transport Agent MTC Transport Client Server delivery point for messages Consider three aspects: 1 Sending mail SMTP 2 Spam 3 Fetching mail POP/IMAP (CS/Bath) October 12, / 30

10 Simple Transfer Protocol (SMTP)1/3 Definition: RFC0821, 1982, obsoleted by RFC2821, 2001 Requirements: reliable ordered data stream channel (TCP!) Model: 1 Sender-SMTP establishes a two-way transmission channel to a receiver-smtp. 2 Receiver-SMTP may be destination or intermediate 3 Sender-SMTP sends commands to receiver-smtp 4 Receiver-SMTP replies sender-smtp See [Bradford, 2007] Ch.12 and/or [Stevens, 1993], Ch.28 at com.ezp2.bath.ac.uk/ /ch28 User File System Sender- SMTP SMTP Commands Replies Receiver- SMTP File System (CS/Bath) October 12, / 30

11 SMTP 2/3 SMTP is an old protocol; uses human-readable messages, such as HELO, MAIL FROM, etc. to help in debugging Example session: yourhost.bath.ac.uk ESMTP Postfix 2 HELO myhost yourhost.bath.ac.uk 4 MAIL FROM: me@myhost Ok 6 RCPT TO: you@yourhost Ok 8 DATA End data with <CR><LF>.<CR><LF> 10 Date: Fri, 20 May :37: From: me@myhost 12 To: you@yourhost 13 Subject: sending This is an example Ok: queued as 1BC31201B82 (CS/Bath) October 12, / 30

12 SMTP 3/3 Lines with numbers are from server; function as return codes, indicating success, failure or other states, e.g. 220: service ready 250: success 354: start mail input Other lines are from client; called the envelope HELO: name of client MAIL FROM: send of RCPT TO: intended recipient(s) DATA: start of message End of mail is a lone full-stop (CS/Bath) October 12, / 30

13 Spam Ca perhaps 80% of the world s is bulk unsolicited commercial , also known as spam SMTP was designed/developed in an academic environment: no consideration of authentication The FROM field is useless as it can be anything the sender wants Secure SMTP known as both SMPTS and SSMTP, uses SSL. Secures content in transit no help Spam filtering: Where does mail come from? What does it contain? Keyword matching? Probabilistic matching? (Spam Assassin) application of machine learning (CS/Bath) October 12, / 30

14 Combatting Spam Blacklist: refuse to accept mail from certain addresses. Improve effectiveness by using DNS and Realtime Blackhole Lists (RBLs) to lookup up IP addresses Whitelist: always accept mail from certain addresses. Good for individuals, but not for companies. Greylist: use a whitelist; reply to unknown addresses with a (temporary) delivery failure message, then add address to whitelist with an expiry time. Normal senders wait a bit and re-try, spammers do not bother. Sender Policy Framework (SPF, aka Sender Permitted From): can help against forging the From field. Uses DNS to look up to see if the From address is permitted to send from the actual IP address the came from Domain Keys: use DNS to store public encryption keys that can be used to check signatures on s (CS/Bath) October 12, / 30

15 servers MTC uses SMTP to send mail and POP or IMAP to fetch mail Originally users had one mailbox and used one machine Now situation is very different: want access to multiple mailboxes from anywhere POP = Post Office Protocol IMAP = Internet Message Access Protocol Secure variants exist: SPOP, SIMAP (aka IMAPS) both of which run over SSL/TLS (CS/Bath) October 12, / 30

16 Post Office Protocol (POP) 1/2 RFC1939, Post Office Protocol - Version 3, J.Myers, M.Rose, 1996 There are 24 RFCs in relation to POP (at the time of writing) POP3 works over a TCP/IP connection using TCP on network port 110 POP3 requirements derived from view that a workstation cannot support SMTP and mail delivery continuously and is not permanently connected POP3 supports a maildrop model: download and delete (from server) moving through three states: 1 Authorization: client identification USER, PASS 2 Transaction: client requests server actions (STAT, LIST, RETR, DELE, NOOP, RSET), ending with QUIT 3 Update: release resources and terminate protocol Several optional commands: TOP, UIDL, APOP (CS/Bath) October 12, / 30

17 POP 2/2 Sample transaction: 1 jap@jap-lap2:~> telnet mailhost.zen.co.uk Trying Connected to mailhost.zen.co.uk. 4 Escape character is ^]. 5 +OK smarthost03.mail, Zen Internet POP3 Server Ready 6 USER julian.padget 7 +OK Please enter your pass, with the PASS command. 8 PASS not-a-password 9 -ERR Authentication Failed. 10 Connection closed by foreign host. POP4 adds selected features from IMAP, but appears to be moribund since 2003 (CS/Bath) October 12, / 30

18 Internet Message Access Protocol RFC3501 Internet Message Access Protocol - Version 4rev1, M.Crispin, 2003 There are 56 RFCs in relation to IMAP (at the time of writing) IMAP provides a mailstore facility that assumes extended connectivity Offers greater functionality than POP3: Connected and disconnected modes of operation Multiple clients simultaneously connected to the same mailbox (transactional) Access to MIME message parts and partial fetch Message state information Multiple mailboxes on the server Server-side searches Built-in extension mechanism (CS/Bath) October 12, / 30

19 Over Internet Protocol (VOIP) Origins in Network Protocol (NVP) specification (RFC 741), 1973 US telcos requested the US Congress to ban internet telephony in 1996 Builds on several protocols for different purposes: Session Initiation Protocol (SIP), RFC3261. Used for most standards based in-house and internet telephony (e.g. resnet in bath) H.323 teleconferencing Real Time Protocol (RTP) A combination of UDP and TCP, generally UDP for voice data and TCP for control of the connection is easily digitised and sent on the Internet The marginal cost of internet use is very small compared to that of long-distance calls (CS/Bath) October 12, / 30

20 Addressing in VOIP ITU Electronic Numbering (ENUM) standard unifies telephone numbers and IP domains: A number such as Translates to the E.164 address e164.arpa This resolves to the relevant IP end-point Week tbd: VOIP seminar (CS/Bath) October 12, / 30

21 HTTP HyperText Transfer Protocol (HTTP) is the protocol over which the web works Simple requst-response protocol (originally) Definition: HTTP 1.0 in RFC1945, 1996 Revised and extended: HTTP 1.1 in RFC2616, 1999 Like SMTP, designed for human readability for ease of debugging An example web page request (using HTTP1.0): GET /home.html HTTP/1.0 Host:xanadu:80 Note blank line (instead of lone full stop) at end 80 is the conventional port for the web server (CS/Bath) October 12, / 30

22 HTTP response Header and data Data encapsulated in a MIME block Server communicates information using codes: Successful 2xx: e.g. 200 OK Redirection 3xx: e.g. 301 Moved Permanently Client error 4xx: e.g. 404 Not Found Server error 5xx: e.g. 500 Internal Server Error HTTP/ OK Server: Wombat Server 1.0 MIME-version: 1.0 Content-type: text/html Content-length: 81 Expires: Tue Feb 14 22:57: <html> <head> <title>example</title> </head> <body> Hello world. </body> </html> (CS/Bath) October 12, / 30

23 HTTP mechanics HTTP1.0 opens a new TCP connection for each request One web page may results in many requests (one for each image, for example) High overhead in TCP handshake + teardown Solutions: A persistent connection Share connections between users by a proxy Proxy enables: 1 Security: one point of organization entry/exit 2 Monitoring: collect request data 3 Control: prevent access to specified sites (CS/Bath) October 12, / 30

24 HTTP verbs GET uri: retrieve content identified by uri POST uri content: requests server to accept content as subordinate of uri (subject to local processing) PUT uri content: requests server to store content under uri DELETE uri: requests server to delete content under uri HEAD uri: like GET, but only returns meta-information TRACE: request recipient returns message received body of a 200 (OK) response CONNECT: reserved for use with a proxy that can dynamically switch to being a tunnel, such as SSL HTTP 1.1: supports Chunked Transfer Coding modifies the body of a message to transfer it as a series of chunks, each with its own size indicator. See RFC2616 HTTP/1.1 (CS/Bath) October 12, / 30

25 HTTP Headers Format = <name>: <value> ; four categories: general-header (RFC2616, 4.5) request-header (RFC2616, 5.3) response-header (RFC2616, 6.2) entity-header (RFC2616, 7.1) Session management (response header): Cookie: <attribute> Set-Cookie: <attribute> = <value> Also specify some of: domain, max-age, path, secure, version (required) For example: Content-type: text/html Set-Cookie: foo=bar; path=/; expires Mon, 09-Dec :46:00 GMT Header key for proxy: contains information to enable proxy to forward request (CS/Bath) October 12, / 30

26 HTTPS/SSL HTTP telnet: data can be read by any machine en-route HTTPS ssh: HTTP over an encrypting layer SSL/TLS (detailed discussion under Security) SHTTP is an extension to the HTTP protocol to include security and authentication usage uncommon HTTPS is widely used the padlock sign on the browser for pages requesting confidential data (CS/Bath) October 12, / 30

27 Summary Protocols over protocols all of the above Encapsulation: higher level protocols package up their data to pass it over lower levels (e.g. TCP) Protocols are not adaptable (probably for the better!) and have to be revised, extended, replaced to cope with changed environment Most protocols layer on TCP Most protocols use human-readable commands to help debugging Omissions: File sharing: deferred to discussion of programming frameworks due to use of Remote Procedure Call (RPC) Security: deferred to SSL/TLS, VPNs to Security in order to treat whole topic MIME encapsulation: deferred to discussion of data representation (CS/Bath) October 12, / 30

28 Resources I Never believe one source web standards development, publication of recommendations. Russell Bradford s website: http: //people.bath.ac.uk/masrjb/aocn/links.html RFC0821 Simple Transfer Protocol, J.Postel, 1982 RFC854 Telnet Protocol Specification, J.Postel and J.Reynolds, 1983 RFC1939, Post Office Protocol - Version 3, J.Myers, M.Rose, 1996 (CS/Bath) October 12, / 30

29 Resources II RFC1945 Transfer Protocol HTTP/1.0, T. Berners-Lee, R. Fielding, H. Frystyk, 1996 RFC2616 Transfer Protocol HTTP/1.1, R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, T. Berners-Lee, 1999 RFC2821 Simple Transfer Protocol, J.Klensin (ed), 2001, obsoletes RFC0821 RFC3261 SIP: Session Initiation Protocol, J.Rosenberg, H.Schulzrinne, G.Camarillo, A.Johnston, J.Peterson, R.Sparks, M.Handley, E.Schooler, 2002 RFC3501 Internet Message Access Protocol - Version 4rev1, M.Crispin, 2003 (CS/Bath) October 12, / 30

30 Bradford, R. (2007). The Art of Computer Networking. Prentice Hall. ISBN-13: , on-line resources can be retrieved from Stevens, W. R. (1993). TCP/IP Illustrated, Volume 1: The Protocols. Addison Wesley. Retrieved via Safari at Bath : (CS/Bath) October 12, / 30

Internet and Intranet Protocols and Applications

Internet and Intranet Protocols and Applications Internet and Intranet Protocols and Applications Lecture 4: General Characteristics of Internet Protocols; the Email Protocol February 10, 2004 Arthur Goldberg Computer Science Department New York University

More information

CN Assignment I. 1. With an example explain how cookies are used in e-commerce application to improve the performance.

CN Assignment I. 1. With an example explain how cookies are used in e-commerce application to improve the performance. CN Assignment I 1. With an example explain how cookies are used in e-commerce application to improve the performance. In an e-commerce application, when the user sends a login form to the server, the server

More information

Internet Technology. 03r. Application layer protocols: . Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 03r. Application layer protocols:  . Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 03r. Application layer protocols: email Paul Krzyzanowski Rutgers University Spring 2016 1 Email: SMTP (Simple Mail Transfer Protocol) 2 Simple Mail Transfer Protocol (SMTP) Protocol

More information

WWW: the http protocol

WWW: the http protocol Internet apps: their protocols and transport protocols Application e-mail remote terminal access Web file transfer streaming multimedia remote file Internet telephony Application layer protocol smtp [RFC

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

Internet Mail: The SMTP Model

Internet Mail: The SMTP Model Internet Mail: The SMTP Model User File System Sender- SMTP SMTP Commands Replies Receiver- SMTP File System Simple Mail Transfer Protocol (SMTP) to transfer e-mails Depending on the operating system,

More information

SMTP. George Porter CSE 124 February 12, 2015

SMTP. George Porter CSE 124 February 12, 2015 SMTP George Porter CSE 124 February 12, 2015 Homework 2 out Announcements Project 2 checkpoint due Tuesday Traditional Applications Two of the most popular The World Wide Web and Email. Broadly speaking,

More information

The Application Layer: & SMTP

The Application Layer:  & SMTP The Application Layer: email & SMTP Smith College, CSC 249 Feb 1, 2018 4-1 Chapter 2: Application layer q 2.1 Principles of network applications q 2.2 Web and HTTP q 2.3 FTP q 2.4 Electronic Mail v SMTP,

More information

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP Chapter 2: outline 2.1 principles of network applications app architectures app requirements 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming

More information

SCS3004 Networking Technologies Application Layer Protocols

SCS3004 Networking Technologies Application Layer Protocols SCS3004 Networking Technologies Application Layer Protocols Dr. Ajantha Atukorale University of Colombo School of Computing (UCSC) 2 TCP/IP Suit Applications and application-layer layer protocols Application:

More information

Produced by. Mobile Application Development. Higher Diploma in Science in Computer Science. Eamonn de Leastar

Produced by. Mobile Application Development. Higher Diploma in Science in Computer Science. Eamonn de Leastar Mobile Application Development Higher Diploma in Science in Computer Science Produced by Eamonn de Leastar (edeleastar@wit.ie) Department of Computing, Maths & Physics Waterford Institute of Technology

More information

ECE697AA Lecture 2. Today s lecture

ECE697AA Lecture 2. Today s lecture ECE697AA Lecture 2 Application Layer: HTTP Tilman Wolf Department of Electrical and Computer Engineering 09/04/08 Protocol stack Application layer Client-server architecture Example protocol: HTTP Demo

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Application Layer II Dmitri Loguinov Texas A&M University February 6, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

CS 43: Computer Networks. 12: and SMTP September 28, 2018

CS 43: Computer Networks. 12:  and SMTP September 28, 2018 CS 43: Computer Networks 12: Email and SMTP September 28, 2018 A. HTTP Mail s communicate using B. IMAP C. POP D. SMTP Lecture 12 - Slide 2 Mail s typically A. send messages directly from the sending s

More information

CSC 4900 Computer Networks:

CSC 4900 Computer Networks: CSC 4900 Computer Networks: Email Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review Last week we talked about design principles, and the application protocols

More information

Applications & Application-Layer Protocols: FTP and (SMTP & POP)

Applications & Application-Layer Protocols: FTP and  (SMTP & POP) COMP 431 Internet Services & Protocols Applications & Application-Layer Protocols: FTP and E ( & POP) Jasleen Kaur February 7, 2019 Application-Layer Protocols Outline Example client/ systems and their

More information

Application-layer Protocols and Internet Services

Application-layer Protocols and Internet Services Application-layer Protocols and Internet Services Computer Networks Lecture 8 http://goo.gl/pze5o8 Terminal Emulation 2 Purpose of Telnet Service Supports remote terminal connected via network connection

More information

Application Level Protocols

Application Level Protocols Application Level Protocols 2 Application Level Protocols Applications handle different kinds of content e.g.. e-mail, web pages, voice Different types of content require different kinds of protocols Application

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer Reference: Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. Application Layer 1 Chapter 2: Application layer 2.1 Principles

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Application Layer: Cookies, Web Caching, SMTP Sec 2.2.4-2.4 Prof. Lina Battestilli Fall 2017 Outline Application Layer (ch 2) 2.1 principles of network

More information

Lecture 25. Tuesday, November 21 CS 475 Networks - Lecture 25 1

Lecture 25. Tuesday, November 21 CS 475 Networks - Lecture 25 1 Lecture 25 Reminders: Homework 7 due today. Homework 8 posted. Due at the beginning of the last day of class for final exam review. Programming Project 6 posted. Final project worth double. Due by 4:30pm,

More information

anti-spam techniques beyond Bayesian filters

anti-spam techniques beyond Bayesian filters anti-spam techniques beyond Bayesian filters Plain Old SMTP protocol overview Grey-Listing save resources on receiver side Authentication of Senders Sender ID Framework DomainKeys signingbased IP-based

More information

Introduction to Networking

Introduction to Networking Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI

More information

Networking. Layered Model. DoD Model. Application Layer. ISO/OSI Model

Networking. Layered Model. DoD Model. Application Layer. ISO/OSI Model Networking Networking is concerned with the physical topology of two or more communicating entities and the logical topology of data transmission. Layered Model Systems communicate over a shared communication

More information

Electronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur

Electronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur Electronic Mail Prof. Indranil Sen Gupta Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur 1 Introduction Most heavily used application on the Internet. Simple

More information

The Application Layer: SMTP, FTP

The Application Layer: SMTP, FTP The Application Layer: SMTP, FTP CS 352, Lecture 5 http://www.cs.rutgers.edu/~sn624/352-s19 Srinivas Narayana 1 Recap: Application-layer protocols DNS: lookup a (machine-readable) address using a (humanreadable)

More information

Layered Model. DoD Model. ISO/OSI Model

Layered Model. DoD Model. ISO/OSI Model Data Communications vs Networking (later) Communication is concerned with the transmission of data over a communication medium/channel between two entities. Here we are more concerned about EE issues such

More information

Information Network Systems The application layer. Stephan Sigg

Information Network Systems The application layer. Stephan Sigg Information Network Systems The application layer Stephan Sigg Tokyo, November 15, 2012 Introduction 04.10.2012 Introduction to the internet 11.10.2012 The link layer 18.10.2012 The network layer 25.10.2012

More information

CS 716: Introduction to communication networks. Instructor: Sridhar Iyer Demo by: Swati Patil IIT Bombay

CS 716: Introduction to communication networks. Instructor: Sridhar Iyer Demo by: Swati Patil IIT Bombay CS 716: Introduction to communication networks - 16 th class; 28 th Sept 2011 Instructor: Sridhar Iyer Demo by: Swati Patil IIT Bombay What is IP address An identifier for a computer or device on a TCP/IP

More information

Lecture 6: Application Layer Web proxies, , and SMTP

Lecture 6: Application Layer Web proxies,  , and SMTP Lecture 6: Application Layer Web proxies, Email, and SMTP COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,

More information

COSC 301 Network Management. Lecture 14: Electronic Mail

COSC 301 Network Management. Lecture 14: Electronic Mail COSC 301 Network Management Lecture 14: Electronic Mail Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 14: Electronic Mail 1 Today s Focus Electronic Mail -- How does it work? -- How

More information

Internet Electronic Mail

Internet Electronic Mail Internet Electronic Mail Antonio Carzaniga Faculty of Informatics University of Lugano March 9, 2010 Outline General concepts Transport protocol: SMTP Basic message format MIME format A Postal Service

More information

Objectives CINS/F1-01

Objectives CINS/F1-01 Email Security (1) Objectives Understand how e-mail systems operate over networks. Classify the threats to the security of e-mail. Study how S/MIME and PGP can be used to add security to e-mail systems.

More information

Internet Protocol Stack! Principles of Network Applications! Some Network Apps" (and Their Protocols)! Application-Layer Protocols! Our goals:!

Internet Protocol Stack! Principles of Network Applications! Some Network Apps (and Their Protocols)! Application-Layer Protocols! Our goals:! Internet Protocol Stack! Principles of Network Applications! application: supporting network applications!! HTTP,, FTP, etc.! transport: endhost-endhost data transfer!! TCP, UDP! network: routing of datagrams

More information

Electronic Mail

Electronic Mail Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing

More information

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples

More information

Internet Technology 2/10/2016

Internet Technology 2/10/2016 Internet Technology 03r. Application layer protocols: email Email: (Simple Mail Transfer Protocol) Paul Krzyzanowski Rutgers University Spring 2016 1 2 Simple Mail Transfer Protocol () Protocol defined

More information

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer

Computer Networking. Chapter #1. Dr. Abdulrhaman Alameer Computer Networking Chapter #1 Dr. Abdulrhaman Alameer What is Computer Network? It is a collection of computers and devices interconnected by communications channels that facilitate communications among

More information

COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ

COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS. Web Access: HTTP Mehmet KORKMAZ COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS Web Access: HTTP 16501018 Mehmet KORKMAZ World Wide Web What is WWW? WWW = World Wide Web = Web!= Internet Internet is a global system of interconnected computer

More information

13. Internet Applications 최양희서울대학교컴퓨터공학부

13. Internet Applications 최양희서울대학교컴퓨터공학부 13. Internet Applications 최양희서울대학교컴퓨터공학부 Internet Applications Telnet File Transfer (FTP) E-mail (SMTP) Web (HTTP) Internet Telephony (SIP/SDP) Presence Multimedia (Audio/Video Broadcasting, AoD/VoD) Network

More information

Network Applications Principles of Network Applications

Network Applications Principles of Network Applications Network Applications Principles of Network Applications A Network application is an application running on one host and provides communication to another application running on a different host. At the

More information

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP,  , SMTP, Telnet, FTP, Security-PGP-SSH. APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.

More information

Network concepts introduction & wireshark

Network concepts introduction & wireshark Network concepts introduction & wireshark W0RKSH0P @KirilsSolovjovs Why am I doing this? Many people attending hacker conferences are not in fact experts, but come here to learn and have fun Opportunity

More information

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 TRANSMISSION CONTROL PROTOCOL ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016 ETI 2506 - TELECOMMUNICATION SYLLABUS Principles of Telecom (IP Telephony and IP TV) - Key Issues to remember 1.

More information

Fig (1) sending and receiving s

Fig (1) sending and receiving  s Electronic Mail Protocols (SMTP, POP, IMAP) It is important to (1) distinguish the user interface (i.e., your mail reader) from the underlying message transfer protocols (such as SMTP, POP or IMAP), and

More information

Simple Network Management Protocol (SNMP)

Simple Network Management Protocol (SNMP) Announcements Project #5 extended until Dec. 10 Reading: 7.3, start 7.4 Midterm #2 last day to request re-grades Th in class HW#2 (due Tuesday Dec. 7) 1 Simple Network Management Protocol (SNMP) Managed

More information

CS 3516: Computer Networks

CS 3516: Computer Networks Welcome to CS 3516: Computer Networks Prof. Yanhua Li Time: 9:00am 9:50am M, T, R, and F Location: AK219 Fall 2018 A-term 1 Some slides are originally from the course materials of the textbook Computer

More information

Chapter 2: Application Layer. Chapter 2 Application Layer. Some network apps. Application architectures. Chapter 2: Application layer

Chapter 2: Application Layer. Chapter 2 Application Layer. Some network apps. Application architectures. Chapter 2: Application layer Chapter 2 Application Layer Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009. Chapter 2: Application Layer Our goals: conceptual, implementation

More information

Lecture 7b: HTTP. Feb. 24, Internet and Intranet Protocols and Applications

Lecture 7b: HTTP. Feb. 24, Internet and Intranet Protocols and Applications Internet and Intranet Protocols and Applications Lecture 7b: HTTP Feb. 24, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu WWW - HTTP/1.1 Web s application layer protocol

More information

Application Layer Introduction; HTTP; FTP

Application Layer Introduction; HTTP; FTP Application Layer Introduction; HTTP; FTP Tom Kelliher, CS 325 Feb. 4, 2011 1 Administrivia Announcements Assignment Read 2.4 2.6. From Last Time Packet-switched network characteristics; protocol layers

More information

HyperText Transfer Protocol

HyperText Transfer Protocol Outline Introduce Socket Programming Domain Name Service (DNS) Standard Application-level Protocols email (SMTP) HTTP HyperText Transfer Protocol Defintitions A web page consists of a base HTML-file which

More information

Network Services, VU 2.0

Network Services, VU 2.0 Network Services, VU 2.0 Email (SMTP, POP3, IMAP) News Dipl.-Ing. Johann Oberleiter Institute for Informationsystems, Distributed Systems Group Agenda Mail general info SMTP (Simple Mail Transfer Protocol)

More information

Chapter 2 Application Layer

Chapter 2 Application Layer Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Some network apps e-mail web text messaging remote

More information

CompSci 356: Computer Network Architectures. Lecture 23: Application Layer Protocols Chapter 9.1. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 23: Application Layer Protocols Chapter 9.1. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 23: Application Layer Protocols Chapter 9.1 Xiaowei Yang xwy@cs.duke.edu The Internet Architecture Application layer Transport layer / Layer 4 Network

More information

World-Wide Web Protocols CS 571 Fall Kenneth L. Calvert All rights reserved

World-Wide Web Protocols CS 571 Fall Kenneth L. Calvert All rights reserved World-Wide Web Protocols CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved World-Wide Web The Information Universe World-Wide Web structure: hypertext Nonlinear presentation of information Key

More information

Application Layer: OSI and TCP/IP Models

Application Layer: OSI and TCP/IP Models Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service

More information

Electronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol

Electronic Mail. Three Components: SMTP SMTP. SMTP mail server. 1. User Agents. 2. Mail Servers. 3. SMTP protocol SMTP Electronic Mail Three Components: 1. User Agents a.k.a. mail reader e.g., gmail, Outlook, yahoo 2. Mail Servers mailbox contains incoming messages for user message queue of outgoing (to be sent) mail

More information

Ciphermail Webmail Messenger Administration Guide

Ciphermail Webmail Messenger Administration Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Webmail Messenger Administration Guide October 27, 2017, Rev: 8630 Copyright 2013-2017, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Admin login

More information

CIT 470: Advanced Network and System Administration. Topics. Mail Policies.

CIT 470: Advanced Network and System Administration. Topics. Mail Policies. CIT 470: Advanced Network and System Administration E-mail CIT 470: Advanced Network and System Administration Slide #1 Topics 1. Mail Policies 2. Anatomy of a Mail Message 3. Components of an E-mail System

More information

Chapter 6: Security of higher layers. (network security)

Chapter 6: Security of higher layers. (network security) Chapter 6: Security of higher layers (network security) Outline TLS SET 1. TLS History of TLS SSL = Secure Socket Layer defined by Netscape normalized as TLS TLS = Transport Layer Security between TCP

More information

FTP. FTP offers many facilities :

FTP. FTP offers many facilities : FTP Given a reliable end-to-end trasport protocol like TCP, File Transfer might seem trivial. But, the details authorization, representation among heterogeneous machines make the protocol complex. FTP

More information

Application: Electronic Mail

Application: Electronic Mail Content Application: Electronic Mail Linda Wu Email system model protocol MIME extensions Mail access protocols (CMPT 471 2003-3) Reference: chapter 27 Notes-19 CMPT 471 2003-3 2 Email System Model Client-

More information

CMPE 151: Network Administration. Servers

CMPE 151: Network Administration. Servers CMPE 151: Network Administration Servers Announcements Unix shell+emacs tutorial. Basic Servers Telnet/Finger FTP Web SSH NNTP Let s look at the underlying protocols. Client-Server Model Request Response

More information

Chapter 2 Application Layer. Lecture 4: principles of network applications. Computer Networking: A Top Down Approach

Chapter 2 Application Layer. Lecture 4: principles of network applications. Computer Networking: A Top Down Approach Chapter 2 Application Layer Lecture 4: principles of network applications Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Chapter

More information

Lecture 7 Application Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 7 Application Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 7 Application Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Application-layer protocols Application: communicating, distributed processes running in network hosts

More information

Network Applications Electronic Mail

Network Applications Electronic Mail Network Applications Electronic Mail The OSI way to do this is specified in X.400 (84 & 88) Overall Architecture UA P3 UA MS P7 P1 MTS At the core of the X.400 Message Handling System (MHS) is the Message

More information

Applications & Application-Layer Protocols: The Web & HTTP

Applications & Application-Layer Protocols: The Web & HTTP CPSC 360 Network Programming Applications & Application-Layer Protocols: The Web & HTTP Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu http://www.cs.clemson.edu/~mweigle/courses/cpsc360

More information

Application Protocols and HTTP

Application Protocols and HTTP Application Protocols and HTTP 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Lab #0 due

More information

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Introduction to Computer Science William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Chapter 4: Networking and the Internet No one owns the Internet, and only one

More information

Application Layer: HTTP

Application Layer: HTTP Application Layer: HTTP EECS 3214 Slides courtesy of J.F Kurose and K.W. Ross, All Rights Reserved 23-Jan-18 1-1 Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP 2.3 electronic

More information

CS348: Computer Networks (SMTP, POP3, IMAP4); FTP

CS348: Computer Networks  (SMTP, POP3, IMAP4); FTP CS348: Computer Networks E-MAIL (SMTP, POP3, IMAP4); FTP Dr. Manas Khatua Assistant Professor Dept. of CSE, IIT Guwahati E-mail: manaskhatua@iitg.ac.in Electronic mail (E-mail) Allows users to exchange

More information

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to 1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats

More information

How Internet Works

How Internet  Works How Internet Email Works Everything you never wanted to know about email but were afraid to ask... Dave O'Neill So, you use email...... but do you know how it works? If

More information

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP

Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming with UDP and TCP Application

More information

Ethernet / TCP-IP - Training Suite Application level protocols

Ethernet / TCP-IP - Training Suite Application level protocols Ethernet / TCP-IP - Training Suite 05 - Application level protocols Application layer protocols 2 World Wide Web HTTP I want HTTP this resource. Hypertext Transfer Protocol (HTTP) Used by the World Wide

More information

EEC-682/782 Computer Networks I

EEC-682/782 Computer Networks I EEC-682/782 Computer Networks I Lecture 20 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser at

More information

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects Internet 1) Internet basic technology (overview) 2) Mobility aspects 3) Quality of Service (QoS) aspects Relevant information: these slides (overview) course textbook (Part H) www.ietf.org (details) IP

More information

Electronic Mail Paradigm

Electronic Mail Paradigm Electronic Mail Paradigm E-mail uses the client-server model. E-mail was designed as an electronic extension of the old paper office memo. - A quick and easy means of low-overhead written communication.

More information

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing Motivation For Networking Information access Interaction among cooperative application programs Resource sharing CS422 -- PART 1 13 2003 Practical Results E-mail File transfer/access Web browsing Remote

More information

Internet Protocols. Robin Sharp

Internet Protocols. Robin Sharp Internet Protocols Robin Sharp Informatics and Mathematical Modelling Technical University of Denmark Phone: (+45) 4525 3749 e-mail: robin@imm.dtu.dk Internet Protocols Just to remind you: Application

More information

. SMTP, POP, and IMAP

. SMTP, POP, and IMAP E-Mail SMTP, POP, and IMAP Scope How Email Appears to Work How Email Really Works Mail User Agent (MUA) Message Format Mail Delivery Agent (MDA)/ Mail Transfer Agent (MTA) Firewalls, Spam and Virus Filters

More information

October 4, 2000 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this Memo

October 4, 2000 Expires in six months. SMTP Service Extension for Secure SMTP over TLS. Status of this Memo Internet Draft draft-hoffman-rfc2487bis-04.txt October 4, 2000 Expires in six months Paul Hoffman Internet Mail Consortium Status of this Memo SMTP Service Extension for Secure SMTP over TLS This document

More information

Simple Network Management Protocol (SNMP)

Simple Network Management Protocol (SNMP) Announcements Project #5 extended until Dec. 10 Reading: 7.3, start 7.4 Midterm #2 last day to request re-grades Th in class HW#2 (due Tuesday Dec. 7) 1 Simple Network Management Protocol (SNMP) Managed

More information

Foundations of Python

Foundations of Python Foundations of Python Network Programming The comprehensive guide to building network applications with Python Second Edition Brandon Rhodes John Goerzen Apress Contents Contents at a Glance About the

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet 2015 Pearson Education Limited 2015 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols

More information

. indigoo.com INTRODUCTION TO MAIL TRANSFER PROTOCOLS FOR THE INTERNET. Peter R. Egli INDIGOO.COM. 1/35 Rev Peter R.

. indigoo.com  INTRODUCTION TO MAIL TRANSFER PROTOCOLS FOR THE INTERNET. Peter R. Egli INDIGOO.COM. 1/35 Rev Peter R. EMAIL INTRODUCTION TO MAIL TRANSFER PROTOCOLS FOR THE INTERNET Peter R. Egli INDIGOO.COM 1/35 Contents 1. EMail Electronic Mail RFC821/RFC822 2. Email Elements 3. Email Message 4. Email Transfer with SMTP

More information

Protocols and Software. Nixu Ltd.

Protocols and Software. Nixu Ltd. E-mail Protocols and Software Nixu Ltd. CONTENTS SMTP Interaction with DNS Sendmail IMAP and POP MIME Spam Nixu Ltd. 2/39 E-mail Protocols and Software History In the dawn of times (= before Internet)

More information

4. The transport layer

4. The transport layer 4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application

More information

Electronic Mail (SMTP)

Electronic Mail (SMTP) Electronic Mail (SMTP) Nowadays email is more popular than the paper letters called snail-mails. It is a form of network communication. Some of the other forms of network communication being voice-over-internet,

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP

More information

Notes beforehand... For more details: See the (online) presentation program.

Notes beforehand... For more details: See the (online) presentation program. Notes beforehand... Notes beforehand... For more details: See the (online) presentation program. Topical overview: main arcs fundamental subjects advanced subject WTRs Lecture: 2 3 4 5 6 7 8 Today: the

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

Mail agents. Introduction to Internet Mail. Message format (1) Message format (2)

Mail agents. Introduction to Internet Mail. Message format (1) Message format (2) Introduction to Internet Mail Noah Sematimba Based on Materials by Philip Hazel. Mail agents MUA = Mail User Agent Interacts directly with the end user Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,

More information

Version SurfControl RiskFilter - Administrator's Guide

Version SurfControl RiskFilter -  Administrator's Guide Version 5.2.4 SurfControl RiskFilter - E-mail Administrator's Guide CONTENTS Notices...i FINDING YOUR WAY AROUND...1 How RiskFilter works...2 Managing your messages with RiskFilter...2 Load balancing with

More information

Chapter 2 part B: outline

Chapter 2 part B: outline Chapter 2 part B: outline 2.3 FTP 2.4 electronic, POP3, IMAP 2.5 DNS Application Layer 2-1 FTP: the file transfer protocol at host FTP interface FTP client local file system file transfer FTP remote file

More information

FTP,HTTP. By Nidhi Jindal

FTP,HTTP. By Nidhi Jindal APPLICATION LAYER: SMTP, POP, IMAP, FTP,HTTP By Nidhi Jindal. MESSAGE TRANSFER AGENT: SMTP The actual mail transfer requires message transfer agents (MTAs). The protocol that defines the MTA client and

More information

Fortinet.Certdumps.FCESP.v by.Zocki.81q. Exam Code: FCESP. Exam Name: Fortinet Certified Security Professional

Fortinet.Certdumps.FCESP.v by.Zocki.81q. Exam Code: FCESP. Exam Name: Fortinet Certified  Security Professional Fortinet.Certdumps.FCESP.v2014-03-05.by.Zocki.81q Number: FCESP Passing Score: 600 Time Limit: 105 min File Version: 18.5 http://www.gratisexam.com/ Exam Code: FCESP Exam Name: Fortinet Certified Email

More information

Chapter 4: Networking and the Internet. Copyright 2015 Pearson Education, Inc.

Chapter 4: Networking and the Internet. Copyright 2015 Pearson Education, Inc. Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols 4.5 Security 4-2 Network Classifications

More information

System: Basic Functionality

System: Basic Functionality E-mail System: Basic Functionality E-mail systems support five basic functions: Composition: Creating messages Transfer: Moving messages from the originator to the recipient E-mail transfer is a connection-oriented

More information

Appliance Installation Guide

Appliance Installation Guide Appliance Installation Guide GWAVA 5 Copyright 2009. GWAVA Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com 1 Contents Overview... 2 Minimum System Requirements...

More information