SlideShare a Scribd company logo
1 of 13
Learning Outcomes
1. Explain the Domain Name Service
(DNS)
2. Describe the relationship between
Web clients and servers.
3. Describe the relationship between
FTP clients and servers.
4. Explain e-mail protocols in clients and
servers: SMTP, POP3, IMAP4
Recap!!
Explain Domain Name
Service (DNS)???
DNS Server
Host
Yahoo
Server
Yahoo is
74.125.135.105
Request
&
Response
I need
Yahoo.com
Web Client & Server
• When a web client receives the IP address
of a web server, the client browser uses that
IP address and sends a request to
destination port.
• Hypertext Transfer Protocol (HTTP) - Port 80
Web Client & Server (cont…)
• Port 80 request, it responds to the client
request and sends the HTML (Hypertext
Mark-up Language) web page to the client.
• HTTP protocol is not a secure protocol.
• Secure transport protocols (HTTPS) – Port
443
• To provide security for the data, HTTP can be
used with secure transport protocols.
FTP Client & Server
• File Transfer Protocol (FTP) – Port 20 and 21. FTP
allows users to transfer files.
• Requests to begin a FTP session are sent to the
server using destination port 21. Once the session is
opened, the server will change to port 20 to transfer
the data files.
• FTP Control – Port 21, FTP Data – Port 20.
• Example: FileZilla, SmartFTP, CuteFTP
Email Client & Server
• Email is one of the most popular client/server
applications on the Internet. Email servers - interact
with clients and with other email servers over the
network.
• Mailboxes are identified by the format:
user@company.domain
hafizah@jtmk.ict.edu.my
• Various application protocols used in processing
email include SMTP, POP3, IMAP4
Simple Mail Transfer Protocol (SMTP)
• SMTP is a required configuration that
allow email to be transmitted over the
Internet.
• It is used by an email client to send
messages to email server.
• SMTP requests are sent to port 25.
Send Mail
Post Office Protocol (POP3)
• POP3 is an application layer Internet
standard protocol used to retrieve email
from a remote server to a local client over
a TCP/IP connection.
• By default, messages are not kept on the
server after they have been accessed by
the client.
• Clients contact POP3 servers on port 110.
Download Mail
Internet Message Access Protocol (IMAP4)
• IMAP is an application layer Internet
protocol that allows a local client to access
email on a remote server.
• A server that supports IMAP clients also
receives and stores messages addressed
to its users.
• Client requests on port 143.
Read Mail
E-mail Protocol in Client &
Server
Port Number Table
The table shows some of the more common well-known ports.
I don’t stop when I’m tired.
I only stop when I’m done…

More Related Content

What's hot (20)

MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5
MVA slides lesson 5
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 
Internal architecture of isp 54
Internal architecture of isp  54Internal architecture of isp  54
Internal architecture of isp 54
 
Remote access connection
Remote access connection Remote access connection
Remote access connection
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
IPV4 addresses
IPV4 addressesIPV4 addresses
IPV4 addresses
 
Network Fundamentals: Ch6 - Addressing the Network IP v4
Network Fundamentals: Ch6 - Addressing the Network IP v4Network Fundamentals: Ch6 - Addressing the Network IP v4
Network Fundamentals: Ch6 - Addressing the Network IP v4
 
Chapter 6 - Networking
Chapter 6 - NetworkingChapter 6 - Networking
Chapter 6 - Networking
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
 
Computer network coe351- part3-final
Computer network coe351- part3-finalComputer network coe351- part3-final
Computer network coe351- part3-final
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Network Protocol
Network ProtocolNetwork Protocol
Network Protocol
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architecture
 
Presentation 1 The Internet
Presentation 1 The InternetPresentation 1 The Internet
Presentation 1 The Internet
 
Network th ITM3
Network th ITM3Network th ITM3
Network th ITM3
 
Computer Networks basics
Computer Networks basicsComputer Networks basics
Computer Networks basics
 
Cs553 st7 ch18-internet_protocols
Cs553 st7 ch18-internet_protocolsCs553 st7 ch18-internet_protocols
Cs553 st7 ch18-internet_protocols
 
Remote Access
Remote AccessRemote Access
Remote Access
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
 

Similar to Topic 2.4 network services

Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit vJAIGANESH SEKAR
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mailtumetr1
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITDeepraj Bhujel
 
Clients and Servers.ppt
Clients and Servers.pptClients and Servers.ppt
Clients and Servers.pptMohammed Ilyas
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applicationsOnline
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10Irsandi Hasan
 
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptxZahouAmel1
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10Waqas Ahmed Nawaz
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxAASTHAJAJOO
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocolsFabMinds
 
11 - ftp & web.ppt
11 - ftp & web.ppt11 - ftp & web.ppt
11 - ftp & web.pptssuserf7cd2b
 
009478419.pdf
009478419.pdf009478419.pdf
009478419.pdfEidTahir
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolMaitree Patel
 
Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Hamza Malik
 

Similar to Topic 2.4 network services (20)

15 Application layer.pptx
15 Application layer.pptx15 Application layer.pptx
15 Application layer.pptx
 
Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit v
 
Http Introduction
Http IntroductionHttp Introduction
Http Introduction
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mail
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - IT
 
Clients and Servers.ppt
Clients and Servers.pptClients and Servers.ppt
Clients and Servers.ppt
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
 
CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10CCNA RS_ITN - Chapter 10
CCNA RS_ITN - Chapter 10
 
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
4-Lect_4-2.pptx4-Lect_4-2.pptx4-Lect_4-2.pptx
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 10
 
HTTP
HTTPHTTP
HTTP
 
http presentation 1.pptx
http presentation 1.pptxhttp presentation 1.pptx
http presentation 1.pptx
 
Module 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptxModule 5 Application and presentation Layer .pptx
Module 5 Application and presentation Layer .pptx
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
11 - ftp & web.ppt
11 - ftp & web.ppt11 - ftp & web.ppt
11 - ftp & web.ppt
 
Compute rNetwork.pptx
Compute rNetwork.pptxCompute rNetwork.pptx
Compute rNetwork.pptx
 
E mail flow
E mail flowE mail flow
E mail flow
 
009478419.pdf
009478419.pdf009478419.pdf
009478419.pdf
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10Ccna v5-S1-Chapter 10
Ccna v5-S1-Chapter 10
 

More from Atika Zaimi

Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Atika Zaimi
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technologyAtika Zaimi
 
Topic 3.2 internet service provider
Topic 3.2 internet service providerTopic 3.2 internet service provider
Topic 3.2 internet service providerAtika Zaimi
 
Topic 3.1 data transmission and networking media
Topic 3.1 data transmission and networking mediaTopic 3.1 data transmission and networking media
Topic 3.1 data transmission and networking mediaAtika Zaimi
 
Topic 2.1 network communication using osi model part1
Topic 2.1 network communication using osi   model part1Topic 2.1 network communication using osi   model part1
Topic 2.1 network communication using osi model part1Atika Zaimi
 
Topic 1.3 create lan using networking devices
Topic 1.3 create lan using networking devicesTopic 1.3 create lan using networking devices
Topic 1.3 create lan using networking devicesAtika Zaimi
 
Topic 1.2 principle of communication in networking
Topic 1.2 principle of communication in networkingTopic 1.2 principle of communication in networking
Topic 1.2 principle of communication in networkingAtika Zaimi
 

More from Atika Zaimi (7)

Topic 5.0 basic security part 1
Topic 5.0 basic security part 1Topic 5.0 basic security part 1
Topic 5.0 basic security part 1
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
 
Topic 3.2 internet service provider
Topic 3.2 internet service providerTopic 3.2 internet service provider
Topic 3.2 internet service provider
 
Topic 3.1 data transmission and networking media
Topic 3.1 data transmission and networking mediaTopic 3.1 data transmission and networking media
Topic 3.1 data transmission and networking media
 
Topic 2.1 network communication using osi model part1
Topic 2.1 network communication using osi   model part1Topic 2.1 network communication using osi   model part1
Topic 2.1 network communication using osi model part1
 
Topic 1.3 create lan using networking devices
Topic 1.3 create lan using networking devicesTopic 1.3 create lan using networking devices
Topic 1.3 create lan using networking devices
 
Topic 1.2 principle of communication in networking
Topic 1.2 principle of communication in networkingTopic 1.2 principle of communication in networking
Topic 1.2 principle of communication in networking
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Topic 2.4 network services

  • 1.
  • 2. Learning Outcomes 1. Explain the Domain Name Service (DNS) 2. Describe the relationship between Web clients and servers. 3. Describe the relationship between FTP clients and servers. 4. Explain e-mail protocols in clients and servers: SMTP, POP3, IMAP4
  • 3. Recap!! Explain Domain Name Service (DNS)??? DNS Server Host Yahoo Server Yahoo is 74.125.135.105 Request & Response I need Yahoo.com
  • 4. Web Client & Server • When a web client receives the IP address of a web server, the client browser uses that IP address and sends a request to destination port. • Hypertext Transfer Protocol (HTTP) - Port 80
  • 5. Web Client & Server (cont…) • Port 80 request, it responds to the client request and sends the HTML (Hypertext Mark-up Language) web page to the client. • HTTP protocol is not a secure protocol. • Secure transport protocols (HTTPS) – Port 443 • To provide security for the data, HTTP can be used with secure transport protocols.
  • 6. FTP Client & Server • File Transfer Protocol (FTP) – Port 20 and 21. FTP allows users to transfer files. • Requests to begin a FTP session are sent to the server using destination port 21. Once the session is opened, the server will change to port 20 to transfer the data files. • FTP Control – Port 21, FTP Data – Port 20. • Example: FileZilla, SmartFTP, CuteFTP
  • 7. Email Client & Server • Email is one of the most popular client/server applications on the Internet. Email servers - interact with clients and with other email servers over the network. • Mailboxes are identified by the format: user@company.domain hafizah@jtmk.ict.edu.my • Various application protocols used in processing email include SMTP, POP3, IMAP4
  • 8. Simple Mail Transfer Protocol (SMTP) • SMTP is a required configuration that allow email to be transmitted over the Internet. • It is used by an email client to send messages to email server. • SMTP requests are sent to port 25. Send Mail
  • 9. Post Office Protocol (POP3) • POP3 is an application layer Internet standard protocol used to retrieve email from a remote server to a local client over a TCP/IP connection. • By default, messages are not kept on the server after they have been accessed by the client. • Clients contact POP3 servers on port 110. Download Mail
  • 10. Internet Message Access Protocol (IMAP4) • IMAP is an application layer Internet protocol that allows a local client to access email on a remote server. • A server that supports IMAP clients also receives and stores messages addressed to its users. • Client requests on port 143. Read Mail
  • 11. E-mail Protocol in Client & Server
  • 12. Port Number Table The table shows some of the more common well-known ports.
  • 13. I don’t stop when I’m tired. I only stop when I’m done…