SlideShare a Scribd company logo
13
Most read
15
Most read
16
Most read
COMPUTER APPLICATIONS
CLASS X (Code 165)
TOPIC:
UNIT 1: Application Layer Protocols
By
HIMANSHU PATHAK
Contents
• Introduction
• Communication Protocol
• Mail Protocol
• File Transfer Protocol
• Remote Login Protocol
Introduction
• Application Layer uses protocols such as
HTTP(S) on client side applications like
browser.
• The application layer is responsible for
providing services to the user:
– Accessing the www
– Mail Services
– File Transfer and Access
– Remote Log-in
Communication Protocol: HTTP
• HTTP stands for Hyper-Text Transfer Protocol.
• HTTP is used mainly to access data on the world
wide web.
• HTTP provides standard rules for web browsers &
servers to communicate.
• An HTTP is a stateless protocol as each transaction
is executed separately without having any
knowledge of the previous transactions, which
means that once the transaction is completed
between the web browser and the server, the
connection gets lost.
Communication Protocol: HTTPS
• HTTPS stands for Hyper Text Transfer Protocol
Secure.
• It means all communications between your
browser and the website are encrypted.
• The use of HTTPS protocol is mainly required
where we need to enter the bank account
details.
• The HTTPS protocol is mainly used where we
require to enter the login credentials.
HTTP Vs. HTTPS
HTTP HTTPS
It is mainly used for those websites that
provide information like blog writing.
It is a secure protocol, so it is used for those
websites that require to transmit the bank
account details or credit card numbers.
The HTTP transmits the data over port
number 80.
The HTTPS transmits the data over port
number 443.
The page loading speed is fast.
The page loading speed is slow as compared
to HTTP because of the additional feature
that it supports, i.e., security.
It is an application layer protocol. It is a transport layer protocol.
It does not use SSL.
It uses SSL that provides the encryption of
the data.
Mail Protocol: SMTP
• SMTP stands for Simple Mail Transfer Protocol.
• SMTP is the standard mechanism for electronic
mail in the internet.
• The addressing system used by SMTP consists of
two parts: Local part & Domain part
• Local-part @ Domain-part
• The main purpose of SMTP is used to set up
communication rules between servers.
• Most email clients allow for transfers of up to 25
MB.
Mail Protocol: POP3
• The POP protocol stands for Post Office Protocol.
• POP3 is a client/server protocol in which e-mail is
received and held for you by your Internet server.
• Periodically, you (or your client e-mail receiver)
check your mail-box on the server and download
any mail, probably using POP3.
• This standard protocol is built into most popular
e-mail products, such as Eudora and Outlook
Express.
SMTP Vs. POP3
SMTP POP3
SMTP is used to send the email POP is used to receive email
SMTP acts as a MTA (Message Transfer
Agent)
POP3 is a MAA (Message Access Agent)
The port number of SMTP is 25. The port number of POP3 is 110.
File Transfer Protocol: FTP
• FTP stands for File Transfer Protocol.
• FTP is an application layer protocol which moves
files between local and remote file systems.
• FTP establishes two connections between the client
and the server:
– One connection is used for data transfer (port 20).
– And the other for control information (port 21).
• The control connection is maintained during the
entire FTP session while the data connection is
opened and then closed for each file transferred.
File Transfer Protocol: SFTP
• It stands for Secure File Transfer Protocol.
• It builds on the File Transfer Protocol (FTP) and
includes Secure Shell (SSH) security components.
• Secure Shell is a cryptographic component of
internet security.
• SSH and SFTP were designed by the Internet
Engineering Task Force (IETF) for greater web
security.
• SFTP transfers files security using SSH and encrypted
FTP commands to avoid password sniffing and
exposing sensitive information in plain text.
FTP Vs. SFTP
FTP SFTP
FTP uses 2 channels to transfer data SFTP usage 1 channel to transfer data
It usually runs on port no-21 It runs on port no-22
It does not encrypt the data before sending It encrypted data before sending
SCP
• SCP stands for Secure Copy Protocol.
• Secure copy (SCP) is a file transfer protocol,
which helps in transferring computer files
securely from a local host to a remote host.
• It works on the Secure Shell (SSH) protocol
technique.
• It doesn’t allow user to see and modify files on
the server.
SFTP Vs. SCP
SFTP SCP
SFTP is slow SCP is fast
SFTP has to ACK (acknowledge) every tiny
packet
SCP does not need to ACK (acknowledge)
SCP is built purely for file transfers. Generally
speaking, you can't generate directory
listings (to view files within a directory),
create directories, delete directories, delete
files, and so on.
SFTP, on the other hand, can readily perform
these operations on its own.
Remote Login Protocol: Telnet
• Telnet stands for Terminal Network.
• It is a type of protocol that enables one
computer to connect to local computer.
• Computer which starts connection known as
the local computer. Computer which is being
connected to i.e. which accepts the connection
known as remote computer.
• During telnet operation whatever that is
performing on the remote computer will be
displayed by local computer.
Remote Login Protocol: SSH
• The SSH protocol (also referred to as Secure
Shell) is a method for secure remote login from
one computer to another.
• It provides several alternative options for strong
authentication, and it protects the
communications security and integrity with
strong encryption.
• It is a secure alternative to the non-protected
login protocols (such as telnet) and insecure file
transfer methods (such as FTP).
Telnet Vs. SSH
TELNET SSH
Telnet uses port 23 SSH runs on port 22 by default
No privileges are provided for the user's
authentication.
SSH is a more secure protocol, so it uses
public-key encryption for authentication.
Suitable for private networks Suitable for public networks
Today we learn
• Communication protocols
• Remote login and file transfer protocols.
• In the next class, we will see Web Services in
detail.
•Thanks

More Related Content

PPT
Tcpip services and applications
PPTX
Network protocols
PPT
Osi model
PPTX
OSI reference model
PPTX
Network & internet presentation
PPTX
Networking Models
PPTX
PPTX
Simple mail transfer protocol (smtp)
Tcpip services and applications
Network protocols
Osi model
OSI reference model
Network & internet presentation
Networking Models
Simple mail transfer protocol (smtp)

What's hot (20)

PPTX
Network security
PPT
Web security
PPT
P2P-Network.ppt
PPT
network hardware
PPTX
Protocols
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PDF
Network Security Presentation
PPTX
Guided Transmission Media
PPTX
Ip address presentation
PPTX
POP3 Post Office Protocol
PPT
Network Security
PPT
Introduction to web technology
PPT
Types of attacks and threads
PPT
Network security cryptography ppt
PPTX
Network security model.pptx
PPTX
Network layer - design Issues
PPT
Lecture #5 Data Communication and Network
PPTX
Tcp/ip model
PPT
Application layer protocols
Network security
Web security
P2P-Network.ppt
network hardware
Protocols
CRYPTOGRAPHY AND NETWORK SECURITY
Network Security Presentation
Guided Transmission Media
Ip address presentation
POP3 Post Office Protocol
Network Security
Introduction to web technology
Types of attacks and threads
Network security cryptography ppt
Network security model.pptx
Network layer - design Issues
Lecture #5 Data Communication and Network
Tcp/ip model
Application layer protocols
Ad

Similar to Remote Login and File Transfer Protocols (20)

PPTX
Fit project
PPTX
network protocol | Networking by Nitasha Chaturvedi
PPT
network protocols7 class 12 computer .ppt
PPTX
APPLICATION LAYER PROTOCOLS .pptx
PPT
DOCX
application layer
PPTX
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
PPT
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...
PPTX
Basic to advance protocols
PDF
Unit 3 - Protocols and Client-Server Applications - IT
PPTX
Introduction to telnet
PPTX
CN Unit-5.pptx dns jdlj;lvk;ckx; gfvfdcffdf
PPTX
Unit 5 Applifffffffffffcation Layer.pptx
PPTX
Computer networks
PPTX
OSI Application layer. tcp/ip application layer
PPTX
Data Communication Protocols all about software protocols
PPTX
Ports and protocols
PPT
SMTP and TCP protocol
PPTX
Ports and services
PPT
tcp ip protocols.ppt
Fit project
network protocol | Networking by Nitasha Chaturvedi
network protocols7 class 12 computer .ppt
APPLICATION LAYER PROTOCOLS .pptx
application layer
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
The Internet protocol suite, commonly known as TCP/IP, is a framework for org...
Basic to advance protocols
Unit 3 - Protocols and Client-Server Applications - IT
Introduction to telnet
CN Unit-5.pptx dns jdlj;lvk;ckx; gfvfdcffdf
Unit 5 Applifffffffffffcation Layer.pptx
Computer networks
OSI Application layer. tcp/ip application layer
Data Communication Protocols all about software protocols
Ports and protocols
SMTP and TCP protocol
Ports and services
tcp ip protocols.ppt
Ad

More from Himanshu Pathak (18)

PPTX
Introduction to E commerce
PPTX
Digital property rights
PPTX
Intellectual property rights
PPTX
An Introduction to Cyber Ethics
PPTX
Cascading style sheet part 2
PPTX
Cascading style sheet an introduction
PPTX
Html multimedia
PPTX
Html forms
PPTX
Html tables
PPTX
Html link and list tags
PPTX
HTML Text formatting tags
PPTX
Basic html tags
PPTX
Introduction to html
PPTX
Mobile technologies
PPTX
Web services
PPTX
Internet protocol
PPTX
Introduction to internet
PPTX
What is Computer?
Introduction to E commerce
Digital property rights
Intellectual property rights
An Introduction to Cyber Ethics
Cascading style sheet part 2
Cascading style sheet an introduction
Html multimedia
Html forms
Html tables
Html link and list tags
HTML Text formatting tags
Basic html tags
Introduction to html
Mobile technologies
Web services
Internet protocol
Introduction to internet
What is Computer?

Recently uploaded (20)

PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
Insiders guide to clinical Medicine.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Institutional Correction lecture only . . .
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
01-Introduction-to-Information-Management.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Insiders guide to clinical Medicine.pdf
PPH.pptx obstetrics and gynecology in nursing
VCE English Exam - Section C Student Revision Booklet
Abdominal Access Techniques with Prof. Dr. R K Mishra
Anesthesia in Laparoscopic Surgery in India
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Microbial disease of the cardiovascular and lymphatic systems
Institutional Correction lecture only . . .
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
01-Introduction-to-Information-Management.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Complications of Minimal Access Surgery at WLH
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Supply Chain Operations Speaking Notes -ICLT Program
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...

Remote Login and File Transfer Protocols

  • 1. COMPUTER APPLICATIONS CLASS X (Code 165) TOPIC: UNIT 1: Application Layer Protocols By HIMANSHU PATHAK
  • 2. Contents • Introduction • Communication Protocol • Mail Protocol • File Transfer Protocol • Remote Login Protocol
  • 3. Introduction • Application Layer uses protocols such as HTTP(S) on client side applications like browser. • The application layer is responsible for providing services to the user: – Accessing the www – Mail Services – File Transfer and Access – Remote Log-in
  • 4. Communication Protocol: HTTP • HTTP stands for Hyper-Text Transfer Protocol. • HTTP is used mainly to access data on the world wide web. • HTTP provides standard rules for web browsers & servers to communicate. • An HTTP is a stateless protocol as each transaction is executed separately without having any knowledge of the previous transactions, which means that once the transaction is completed between the web browser and the server, the connection gets lost.
  • 5. Communication Protocol: HTTPS • HTTPS stands for Hyper Text Transfer Protocol Secure. • It means all communications between your browser and the website are encrypted. • The use of HTTPS protocol is mainly required where we need to enter the bank account details. • The HTTPS protocol is mainly used where we require to enter the login credentials.
  • 6. HTTP Vs. HTTPS HTTP HTTPS It is mainly used for those websites that provide information like blog writing. It is a secure protocol, so it is used for those websites that require to transmit the bank account details or credit card numbers. The HTTP transmits the data over port number 80. The HTTPS transmits the data over port number 443. The page loading speed is fast. The page loading speed is slow as compared to HTTP because of the additional feature that it supports, i.e., security. It is an application layer protocol. It is a transport layer protocol. It does not use SSL. It uses SSL that provides the encryption of the data.
  • 7. Mail Protocol: SMTP • SMTP stands for Simple Mail Transfer Protocol. • SMTP is the standard mechanism for electronic mail in the internet. • The addressing system used by SMTP consists of two parts: Local part & Domain part • Local-part @ Domain-part • The main purpose of SMTP is used to set up communication rules between servers. • Most email clients allow for transfers of up to 25 MB.
  • 8. Mail Protocol: POP3 • The POP protocol stands for Post Office Protocol. • POP3 is a client/server protocol in which e-mail is received and held for you by your Internet server. • Periodically, you (or your client e-mail receiver) check your mail-box on the server and download any mail, probably using POP3. • This standard protocol is built into most popular e-mail products, such as Eudora and Outlook Express.
  • 9. SMTP Vs. POP3 SMTP POP3 SMTP is used to send the email POP is used to receive email SMTP acts as a MTA (Message Transfer Agent) POP3 is a MAA (Message Access Agent) The port number of SMTP is 25. The port number of POP3 is 110.
  • 10. File Transfer Protocol: FTP • FTP stands for File Transfer Protocol. • FTP is an application layer protocol which moves files between local and remote file systems. • FTP establishes two connections between the client and the server: – One connection is used for data transfer (port 20). – And the other for control information (port 21). • The control connection is maintained during the entire FTP session while the data connection is opened and then closed for each file transferred.
  • 11. File Transfer Protocol: SFTP • It stands for Secure File Transfer Protocol. • It builds on the File Transfer Protocol (FTP) and includes Secure Shell (SSH) security components. • Secure Shell is a cryptographic component of internet security. • SSH and SFTP were designed by the Internet Engineering Task Force (IETF) for greater web security. • SFTP transfers files security using SSH and encrypted FTP commands to avoid password sniffing and exposing sensitive information in plain text.
  • 12. FTP Vs. SFTP FTP SFTP FTP uses 2 channels to transfer data SFTP usage 1 channel to transfer data It usually runs on port no-21 It runs on port no-22 It does not encrypt the data before sending It encrypted data before sending
  • 13. SCP • SCP stands for Secure Copy Protocol. • Secure copy (SCP) is a file transfer protocol, which helps in transferring computer files securely from a local host to a remote host. • It works on the Secure Shell (SSH) protocol technique. • It doesn’t allow user to see and modify files on the server.
  • 14. SFTP Vs. SCP SFTP SCP SFTP is slow SCP is fast SFTP has to ACK (acknowledge) every tiny packet SCP does not need to ACK (acknowledge) SCP is built purely for file transfers. Generally speaking, you can't generate directory listings (to view files within a directory), create directories, delete directories, delete files, and so on. SFTP, on the other hand, can readily perform these operations on its own.
  • 15. Remote Login Protocol: Telnet • Telnet stands for Terminal Network. • It is a type of protocol that enables one computer to connect to local computer. • Computer which starts connection known as the local computer. Computer which is being connected to i.e. which accepts the connection known as remote computer. • During telnet operation whatever that is performing on the remote computer will be displayed by local computer.
  • 16. Remote Login Protocol: SSH • The SSH protocol (also referred to as Secure Shell) is a method for secure remote login from one computer to another. • It provides several alternative options for strong authentication, and it protects the communications security and integrity with strong encryption. • It is a secure alternative to the non-protected login protocols (such as telnet) and insecure file transfer methods (such as FTP).
  • 17. Telnet Vs. SSH TELNET SSH Telnet uses port 23 SSH runs on port 22 by default No privileges are provided for the user's authentication. SSH is a more secure protocol, so it uses public-key encryption for authentication. Suitable for private networks Suitable for public networks
  • 18. Today we learn • Communication protocols • Remote login and file transfer protocols. • In the next class, we will see Web Services in detail. •Thanks