SlideShare a Scribd company logo
26.1
Chapter 26
Remote Logging,
Electronic Mail,
and File Transfer
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
26.2
26-1 REMOTE LOGGING26-1 REMOTE LOGGING
It would be impossible to write a specific client/serverIt would be impossible to write a specific client/server
program for each demand. The better solution is aprogram for each demand. The better solution is a
general-purpose client/server program that lets a usergeneral-purpose client/server program that lets a user
access any application program on a remote computer.access any application program on a remote computer.
TELNET
Topics discussed in this section:Topics discussed in this section:
26.3
TELNET is a general-purpose
client/server application program.
Note
26.4
Figure 26.1 Local and remote log-in
26.5
Figure 26.2 Concept of NVT
26.6
Table 26.1 Some NVT control characters
26.7
Figure 26.3 An example of embedding
26.8
Table 26.2 Options
26.9
Table 26.3 NVT character set for option negotiation
26.10
Figure 26.4 shows an example of option negotiation. In
this example, the client wants the server to echo each
character sent to the server. The echo option is enabled by
the server because it is the server that sends the
characters back to the user terminal. Therefore, the client
should request from the server the enabling of the option
using DO. The request consists of three characters: IAC,
DO, and ECHO. The server accepts the request and
enables the option. It informs the client by sending the
three-character approval: IAC, WILL, and ECHO.
Example 26.1
26.11
Figure 26.4 Example 26.1: Echo option
26.12
Table 26.4 Character set for suboptions
26.13
Figure 26.5 shows an example of suboption negotiation.
In this example, the client wants to negotiate the type
of the terminal.
Example 26.2
26.14
Figure 26.5 Example of suboption negotiation
26.15
26-2 ELECTRONIC MAIL26-2 ELECTRONIC MAIL
One of the most popular Internet services is electronicOne of the most popular Internet services is electronic
mail (e-mail). The designers of the Internet probablymail (e-mail). The designers of the Internet probably
never imagined the popularity of this applicationnever imagined the popularity of this application
program. Its architecture consists of severalprogram. Its architecture consists of several
components that we discuss in this chapter.components that we discuss in this chapter.
Architecture
User Agent
Message Transfer Agent: SMTP
Message Access Agent: POP and IMAP
Web-Based Mail
Topics discussed in this section:Topics discussed in this section:
26.16
Figure 26.6 First scenario in electronic mail
26.17
When the sender and the receiver of an
e-mail are on the same system,
we need only two user agents.
Note
26.18
Figure 26.7 Second scenario in electronic mail
26.19
When the sender and the receiver of an
e-mail are on different systems, we
need two UAs and a pair of
MTAs (client and server).
Note
26.20
Figure 26.8 Third scenario in electronic mail
26.21
When the sender is connected to the
mail server via a LAN or a WAN,
we need two UAs and two pairs
of MTAs (client and server).
Note
26.22
Figure 26.9 Fourth scenario in electronic mail
26.23
Figure 26.10 Push versus pull in electronic email
26.24
When both sender and receiver are
connected to the mail server via
a LAN or a WAN, we need two
UAs, two pairs of MTAs
and a pair of MAAs.
This is the most common situation
today.
Note
26.25
Figure 26.11 Services of user agent
26.26
Some examples of command-driven
user agents are mail, pine,
and elm.
Note
26.27
Some examples of GUI-based user
agents are Eudora, Outlook, and
Netscape.
Note
26.28
Figure 26.12 Format of an e-mail
26.29
Figure 26.13 E-mail address
26.30
Figure 26.14 MIME
26.31
Figure 26.15 MIME header
26.32
Table 26.5 Data types and subtypes in MIME
26.33
Table 26.6 Content-transfer-encoding
26.34
Figure 26.16 SMTP range
26.35
Figure 26.17 Commands and responses
26.36
Figure 26.18 Command format
26.37
Table 26.7 Commands
26.38
Table 26.8 Responses
26.39
Table 26.8 Responses (continued)
26.40
Let us see how we can directly use SMTP to send an
e-mail and simulate the commands and responses we
described in this section. We use TELNET to log into port
25 (the well-known port for SMTP). We then use the
commands directly to send an e-mail. In this example,
forouzanb@adelphia.net is sending an e-mail to himself.
The first few lines show TELNET trying to connect to the
Adelphia mail server. After connection, we can type the
SMTP commands and then receive the responses, as
shown on the next slide. Note that we have added, for
clarification, some comment lines, designated by the “=”
signs. These lines are not part of the e-mail procedure.
Example 26.3
26.41
Example 26.3 (continued)
$ telnet mail.adelphia.net 25
Trying 68.168.78.100 . . .
Connected to mail.adelphia.net (68.168.78.100).
26.42
Example 26.3 (continued)
26.43
Example 26.3 (continued)
26.44
Figure 26.19 POP3 and IMAP4
26.45
Figure 26.20 The exchange of commands and responses in POP3
26.46
26-3 FILE TRANSFER26-3 FILE TRANSFER
Transferring files from one computer to another is oneTransferring files from one computer to another is one
of the most common tasks expected from a networkingof the most common tasks expected from a networking
or internetworking environment. As a matter of fact,or internetworking environment. As a matter of fact,
the greatest volume of data exchange in the Internetthe greatest volume of data exchange in the Internet
today is due to file transfer.today is due to file transfer.
File Transfer Protocol (FTP)
Anonymous FTP
Topics discussed in this section:Topics discussed in this section:
26.47
FTP uses the services of TCP. It needs
two TCP connections.
The well-known port 21 is used for the
control connection and the well-known
port 20 for the data connection.
Note
26.48
Figure 26.21 FTP
26.49
Figure 26.22 Using the control connection
26.50
Figure 26.23 Using the data connection
26.51
The following shows an actual FTP session for retrieving
a list of items in a directory. The colored lines show the
responses from the server control connection; the black
lines show the commands sent by the client. The lines in
white with a black background show data transfer.
1. After the control connection is created, the FTP server
sends the 220 response.
2. The client sends its name.
3. The server responds with 331.
Example 26.4
26.52
4. The client sends the password (not shown).
5. The server responds with 230 (user log-in is OK).
6. The client sends the list command (ls reports) to find
the list of files on the directory named report.
7. Now the server responds with 150 and opens the data
connection.
8. The server then sends the list of the files or directories
on the data connection.
Example 26.4 (continued)
9. The client sends a QUIT command.
10. The server responds with 221.
26.53
Example 26.4 (continued)
26.54
We show an example of anonymous FTP. We assume
that some public data are available at internic.net.
Example 26.5
We show an example of anonymous FTP. We assume
that some public data are available at internic.net.
continued on next slide
26.55
Example 26.5 (continued)

More Related Content

PPT
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
PPT
Chapter 23
PPT
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
PPT
Chapter 24
PPT
27 WWW and_HTTP
23 Process to_Process_Delivery_UDP_TCP_and_SCTP
Chapter 23
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 24
27 WWW and_HTTP

What's hot (20)

PPT
Chapter 22
PPT
29 Multimedia
PPT
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
PPT
22 Network Layer_Delivery_forwarding_and_Routing
PDF
Ars msr 1-intradomain
PPT
4c Address Mapping, Error Reporting and Multicasting
PDF
Meeting 11. electronic mail: smtp
PDF
PDF
20CS2007 Computer Communication Networks
PPT
02 Network Models
PPT
11 Data Link_Control
PPT
Chapter 21
PPT
12 Multiple Access
PDF
Cs8591 Computer Networks
DOCX
Simulation of a Wireless Sub Network using QualNET
Chapter 22
29 Multimedia
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
22 Network Layer_Delivery_forwarding_and_Routing
Ars msr 1-intradomain
4c Address Mapping, Error Reporting and Multicasting
Meeting 11. electronic mail: smtp
20CS2007 Computer Communication Networks
02 Network Models
11 Data Link_Control
Chapter 21
12 Multiple Access
Cs8591 Computer Networks
Simulation of a Wireless Sub Network using QualNET
Ad

Similar to 26 Remote Logging_Electronic_Mail_and_File_Transfer (20)

PPT
Chapter 26
PPT
transfer protocols,ftp,smtp,pop,imap
PPT
Electronic mail and Domain Name System
PPT
Electronic mail chap-20
PPT
Lec2_CH02.PPT
PPT
Chap 03
PPT
unit 3 ns.ppt
PPT
CH02.PPTdfsffdsffsdffsdfdfsdfsddsfsdfdsffdsf
PPT
ch02.ppt
PPT
Chap 20 smtp, pop, imap
PDF
Cs8591 Computer Networks
PPT
Ch27
PPTX
Computer Network - Chapter 2
PDF
CCN lecture 2 on computer communication and networking
PPT
Network_Model. In the field of Computer Networking.ppt
PPT
PowerPoint_merge.ppt
PPTX
Network Models Data Communications and networking
PPT
email and dns.. in computer networks ppt
Chapter 26
transfer protocols,ftp,smtp,pop,imap
Electronic mail and Domain Name System
Electronic mail chap-20
Lec2_CH02.PPT
Chap 03
unit 3 ns.ppt
CH02.PPTdfsffdsffsdffsdfdfsdfsddsfsdfdsffdsf
ch02.ppt
Chap 20 smtp, pop, imap
Cs8591 Computer Networks
Ch27
Computer Network - Chapter 2
CCN lecture 2 on computer communication and networking
Network_Model. In the field of Computer Networking.ppt
PowerPoint_merge.ppt
Network Models Data Communications and networking
email and dns.. in computer networks ppt
Ad

More from Ahmar Hashmi (20)

PPT
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
PPT
31 Network Security
PPT
30 Cryptography
PPT
28 Network Management_SNMP
PPT
25 DNS
PPT
24 Congestion Control_and_Quality_of_Service
PPT
20 Network Layer_Internet_Protocol
PPT
19 Network Layer_Logical_Addressing
PPT
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
PPT
17 SONET/SDH
PPT
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
PPT
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
PPT
14 Wireless LAN
PPT
13 Wired Lans_Ethernet
PPT
10 Error Detection_and_Correction
PPT
09 Using Telephone_and_Cable_Networks_for_Data_Transmission
PPT
08 Switching
PPT
07 Transmission Media
PPT
06 Bandwidth Utilization_Multiplexing_and_Spreading
PPT
05 Analog Transmission
32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls
31 Network Security
30 Cryptography
28 Network Management_SNMP
25 DNS
24 Congestion Control_and_Quality_of_Service
20 Network Layer_Internet_Protocol
19 Network Layer_Logical_Addressing
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
17 SONET/SDH
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
14 Wireless LAN
13 Wired Lans_Ethernet
10 Error Detection_and_Correction
09 Using Telephone_and_Cable_Networks_for_Data_Transmission
08 Switching
07 Transmission Media
06 Bandwidth Utilization_Multiplexing_and_Spreading
05 Analog Transmission

Recently uploaded (20)

PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Hazard Identification & Risk Assessment .pdf
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
Empowerment Technology for Senior High School Guide
PDF
1_English_Language_Set_2.pdf probationary
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
Trump Administration's workforce development strategy
PPTX
Cell Types and Its function , kingdom of life
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
advance database management system book.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
Supply Chain Operations Speaking Notes -ICLT Program
UNIT III MENTAL HEALTH NURSING ASSESSMENT
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Final Presentation General Medicine 03-08-2024.pptx
Hazard Identification & Risk Assessment .pdf
Unit 4 Skeletal System.ppt.pptxopresentatiom
LDMMIA Reiki Yoga Finals Review Spring Summer
Empowerment Technology for Senior High School Guide
1_English_Language_Set_2.pdf probationary
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Paper A Mock Exam 9_ Attempt review.pdf.
Trump Administration's workforce development strategy
Cell Types and Its function , kingdom of life
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
advance database management system book.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE

26 Remote Logging_Electronic_Mail_and_File_Transfer

  • 1. 26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 26.2 26-1 REMOTE LOGGING26-1 REMOTE LOGGING It would be impossible to write a specific client/serverIt would be impossible to write a specific client/server program for each demand. The better solution is aprogram for each demand. The better solution is a general-purpose client/server program that lets a usergeneral-purpose client/server program that lets a user access any application program on a remote computer.access any application program on a remote computer. TELNET Topics discussed in this section:Topics discussed in this section:
  • 3. 26.3 TELNET is a general-purpose client/server application program. Note
  • 4. 26.4 Figure 26.1 Local and remote log-in
  • 6. 26.6 Table 26.1 Some NVT control characters
  • 7. 26.7 Figure 26.3 An example of embedding
  • 9. 26.9 Table 26.3 NVT character set for option negotiation
  • 10. 26.10 Figure 26.4 shows an example of option negotiation. In this example, the client wants the server to echo each character sent to the server. The echo option is enabled by the server because it is the server that sends the characters back to the user terminal. Therefore, the client should request from the server the enabling of the option using DO. The request consists of three characters: IAC, DO, and ECHO. The server accepts the request and enables the option. It informs the client by sending the three-character approval: IAC, WILL, and ECHO. Example 26.1
  • 11. 26.11 Figure 26.4 Example 26.1: Echo option
  • 12. 26.12 Table 26.4 Character set for suboptions
  • 13. 26.13 Figure 26.5 shows an example of suboption negotiation. In this example, the client wants to negotiate the type of the terminal. Example 26.2
  • 14. 26.14 Figure 26.5 Example of suboption negotiation
  • 15. 26.15 26-2 ELECTRONIC MAIL26-2 ELECTRONIC MAIL One of the most popular Internet services is electronicOne of the most popular Internet services is electronic mail (e-mail). The designers of the Internet probablymail (e-mail). The designers of the Internet probably never imagined the popularity of this applicationnever imagined the popularity of this application program. Its architecture consists of severalprogram. Its architecture consists of several components that we discuss in this chapter.components that we discuss in this chapter. Architecture User Agent Message Transfer Agent: SMTP Message Access Agent: POP and IMAP Web-Based Mail Topics discussed in this section:Topics discussed in this section:
  • 16. 26.16 Figure 26.6 First scenario in electronic mail
  • 17. 26.17 When the sender and the receiver of an e-mail are on the same system, we need only two user agents. Note
  • 18. 26.18 Figure 26.7 Second scenario in electronic mail
  • 19. 26.19 When the sender and the receiver of an e-mail are on different systems, we need two UAs and a pair of MTAs (client and server). Note
  • 20. 26.20 Figure 26.8 Third scenario in electronic mail
  • 21. 26.21 When the sender is connected to the mail server via a LAN or a WAN, we need two UAs and two pairs of MTAs (client and server). Note
  • 22. 26.22 Figure 26.9 Fourth scenario in electronic mail
  • 23. 26.23 Figure 26.10 Push versus pull in electronic email
  • 24. 26.24 When both sender and receiver are connected to the mail server via a LAN or a WAN, we need two UAs, two pairs of MTAs and a pair of MAAs. This is the most common situation today. Note
  • 26. 26.26 Some examples of command-driven user agents are mail, pine, and elm. Note
  • 27. 26.27 Some examples of GUI-based user agents are Eudora, Outlook, and Netscape. Note
  • 32. 26.32 Table 26.5 Data types and subtypes in MIME
  • 40. 26.40 Let us see how we can directly use SMTP to send an e-mail and simulate the commands and responses we described in this section. We use TELNET to log into port 25 (the well-known port for SMTP). We then use the commands directly to send an e-mail. In this example, forouzanb@adelphia.net is sending an e-mail to himself. The first few lines show TELNET trying to connect to the Adelphia mail server. After connection, we can type the SMTP commands and then receive the responses, as shown on the next slide. Note that we have added, for clarification, some comment lines, designated by the “=” signs. These lines are not part of the e-mail procedure. Example 26.3
  • 41. 26.41 Example 26.3 (continued) $ telnet mail.adelphia.net 25 Trying 68.168.78.100 . . . Connected to mail.adelphia.net (68.168.78.100).
  • 45. 26.45 Figure 26.20 The exchange of commands and responses in POP3
  • 46. 26.46 26-3 FILE TRANSFER26-3 FILE TRANSFER Transferring files from one computer to another is oneTransferring files from one computer to another is one of the most common tasks expected from a networkingof the most common tasks expected from a networking or internetworking environment. As a matter of fact,or internetworking environment. As a matter of fact, the greatest volume of data exchange in the Internetthe greatest volume of data exchange in the Internet today is due to file transfer.today is due to file transfer. File Transfer Protocol (FTP) Anonymous FTP Topics discussed in this section:Topics discussed in this section:
  • 47. 26.47 FTP uses the services of TCP. It needs two TCP connections. The well-known port 21 is used for the control connection and the well-known port 20 for the data connection. Note
  • 49. 26.49 Figure 26.22 Using the control connection
  • 50. 26.50 Figure 26.23 Using the data connection
  • 51. 26.51 The following shows an actual FTP session for retrieving a list of items in a directory. The colored lines show the responses from the server control connection; the black lines show the commands sent by the client. The lines in white with a black background show data transfer. 1. After the control connection is created, the FTP server sends the 220 response. 2. The client sends its name. 3. The server responds with 331. Example 26.4
  • 52. 26.52 4. The client sends the password (not shown). 5. The server responds with 230 (user log-in is OK). 6. The client sends the list command (ls reports) to find the list of files on the directory named report. 7. Now the server responds with 150 and opens the data connection. 8. The server then sends the list of the files or directories on the data connection. Example 26.4 (continued) 9. The client sends a QUIT command. 10. The server responds with 221.
  • 54. 26.54 We show an example of anonymous FTP. We assume that some public data are available at internic.net. Example 26.5 We show an example of anonymous FTP. We assume that some public data are available at internic.net. continued on next slide