SlideShare a Scribd company logo
1 of 18
COMPUTER APPLICATIONS
CLASS X (Code 165)
TOPIC:
UNIT 1: Application Layer Protocols
By
HIMANSHU PATHAK
Contents
• Introduction
• Communication Protocol
• Mail Protocol
• File Transfer Protocol
• Remote Login Protocol
Introduction
• Application Layer uses protocols such as
HTTP(S) on client side applications like
browser.
• The application layer is responsible for
providing services to the user:
– Accessing the www
– Mail Services
– File Transfer and Access
– Remote Log-in
Communication Protocol: HTTP
• HTTP stands for Hyper-Text Transfer Protocol.
• HTTP is used mainly to access data on the world
wide web.
• HTTP provides standard rules for web browsers &
servers to communicate.
• An HTTP is a stateless protocol as each transaction
is executed separately without having any
knowledge of the previous transactions, which
means that once the transaction is completed
between the web browser and the server, the
connection gets lost.
Communication Protocol: HTTPS
• HTTPS stands for Hyper Text Transfer Protocol
Secure.
• It means all communications between your
browser and the website are encrypted.
• The use of HTTPS protocol is mainly required
where we need to enter the bank account
details.
• The HTTPS protocol is mainly used where we
require to enter the login credentials.
HTTP Vs. HTTPS
HTTP HTTPS
It is mainly used for those websites that
provide information like blog writing.
It is a secure protocol, so it is used for those
websites that require to transmit the bank
account details or credit card numbers.
The HTTP transmits the data over port
number 80.
The HTTPS transmits the data over port
number 443.
The page loading speed is fast.
The page loading speed is slow as compared
to HTTP because of the additional feature
that it supports, i.e., security.
It is an application layer protocol. It is a transport layer protocol.
It does not use SSL.
It uses SSL that provides the encryption of
the data.
Mail Protocol: SMTP
• SMTP stands for Simple Mail Transfer Protocol.
• SMTP is the standard mechanism for electronic
mail in the internet.
• The addressing system used by SMTP consists of
two parts: Local part & Domain part
• Local-part @ Domain-part
• The main purpose of SMTP is used to set up
communication rules between servers.
• Most email clients allow for transfers of up to 25
MB.
Mail Protocol: POP3
• The POP protocol stands for Post Office Protocol.
• POP3 is a client/server protocol in which e-mail is
received and held for you by your Internet server.
• Periodically, you (or your client e-mail receiver)
check your mail-box on the server and download
any mail, probably using POP3.
• This standard protocol is built into most popular
e-mail products, such as Eudora and Outlook
Express.
SMTP Vs. POP3
SMTP POP3
SMTP is used to send the email POP is used to receive email
SMTP acts as a MTA (Message Transfer
Agent)
POP3 is a MAA (Message Access Agent)
The port number of SMTP is 25. The port number of POP3 is 110.
File Transfer Protocol: FTP
• FTP stands for File Transfer Protocol.
• FTP is an application layer protocol which moves
files between local and remote file systems.
• FTP establishes two connections between the client
and the server:
– One connection is used for data transfer (port 20).
– And the other for control information (port 21).
• The control connection is maintained during the
entire FTP session while the data connection is
opened and then closed for each file transferred.
File Transfer Protocol: SFTP
• It stands for Secure File Transfer Protocol.
• It builds on the File Transfer Protocol (FTP) and
includes Secure Shell (SSH) security components.
• Secure Shell is a cryptographic component of
internet security.
• SSH and SFTP were designed by the Internet
Engineering Task Force (IETF) for greater web
security.
• SFTP transfers files security using SSH and encrypted
FTP commands to avoid password sniffing and
exposing sensitive information in plain text.
FTP Vs. SFTP
FTP SFTP
FTP uses 2 channels to transfer data SFTP usage 1 channel to transfer data
It usually runs on port no-21 It runs on port no-22
It does not encrypt the data before sending It encrypted data before sending
SCP
• SCP stands for Secure Copy Protocol.
• Secure copy (SCP) is a file transfer protocol,
which helps in transferring computer files
securely from a local host to a remote host.
• It works on the Secure Shell (SSH) protocol
technique.
• It doesn’t allow user to see and modify files on
the server.
SFTP Vs. SCP
SFTP SCP
SFTP is slow SCP is fast
SFTP has to ACK (acknowledge) every tiny
packet
SCP does not need to ACK (acknowledge)
SCP is built purely for file transfers. Generally
speaking, you can't generate directory
listings (to view files within a directory),
create directories, delete directories, delete
files, and so on.
SFTP, on the other hand, can readily perform
these operations on its own.
Remote Login Protocol: Telnet
• Telnet stands for Terminal Network.
• It is a type of protocol that enables one
computer to connect to local computer.
• Computer which starts connection known as
the local computer. Computer which is being
connected to i.e. which accepts the connection
known as remote computer.
• During telnet operation whatever that is
performing on the remote computer will be
displayed by local computer.
Remote Login Protocol: SSH
• The SSH protocol (also referred to as Secure
Shell) is a method for secure remote login from
one computer to another.
• It provides several alternative options for strong
authentication, and it protects the
communications security and integrity with
strong encryption.
• It is a secure alternative to the non-protected
login protocols (such as telnet) and insecure file
transfer methods (such as FTP).
Telnet Vs. SSH
TELNET SSH
Telnet uses port 23 SSH runs on port 22 by default
No privileges are provided for the user's
authentication.
SSH is a more secure protocol, so it uses
public-key encryption for authentication.
Suitable for private networks Suitable for public networks
Today we learn
• Communication protocols
• Remote login and file transfer protocols.
• In the next class, we will see Web Services in
detail.
•Thanks

More Related Content

What's hot

What's hot (20)

Modems
ModemsModems
Modems
 
Computer communication and networks
Computer communication and networksComputer communication and networks
Computer communication and networks
 
E mail protocols
E mail protocolsE mail protocols
E mail protocols
 
Ftp
FtpFtp
Ftp
 
FTP - File Transfer Protocol
FTP - File Transfer ProtocolFTP - File Transfer Protocol
FTP - File Transfer Protocol
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Types of internet connections
Types of internet connectionsTypes of internet connections
Types of internet connections
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
Network Components
Network ComponentsNetwork Components
Network Components
 
Wired Transmission Media
Wired Transmission MediaWired Transmission Media
Wired Transmission Media
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
File Transfer protocols
File Transfer protocolsFile Transfer protocols
File Transfer protocols
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Bluetooth technology
Bluetooth  technologyBluetooth  technology
Bluetooth technology
 
Internet protocol
Internet protocol Internet protocol
Internet protocol
 

Similar to Remote Login and File Transfer Protocols

Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocolsFabMinds
 
filetranferprotocolseminarpresentation.pptx
filetranferprotocolseminarpresentation.pptxfiletranferprotocolseminarpresentation.pptx
filetranferprotocolseminarpresentation.pptxDSPL
 
Computer Networks
Computer NetworksComputer Networks
Computer NetworksShylesh BC
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and ProtocolsRubal Sagwal
 
Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...smitha273566
 
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their  DEFNITIONS BY NAVEEN.pptxTypes of Protocals and their  DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their DEFNITIONS BY NAVEEN.pptxNaveenreddyMeegada
 
Application layer and protocols of application layer
Application layer and protocols of application layerApplication layer and protocols of application layer
Application layer and protocols of application layerTahmina Shopna
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocolsPriyanka Shinde
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.Šhæÿæñ Æhmęd
 
File Transfer Protocol - FTP
File Transfer Protocol - FTPFile Transfer Protocol - FTP
File Transfer Protocol - FTPMahfuzRahman94
 

Similar to Remote Login and File Transfer Protocols (20)

Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
filetranferprotocolseminarpresentation.pptx
filetranferprotocolseminarpresentation.pptxfiletranferprotocolseminarpresentation.pptx
filetranferprotocolseminarpresentation.pptx
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
protocols (1).pptx
protocols (1).pptxprotocols (1).pptx
protocols (1).pptx
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...
 
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their  DEFNITIONS BY NAVEEN.pptxTypes of Protocals and their  DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
 
Application Protocol
Application Protocol Application Protocol
Application Protocol
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Application layer and protocols of application layer
Application layer and protocols of application layerApplication layer and protocols of application layer
Application layer and protocols of application layer
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocols
 
Fit project
Fit projectFit project
Fit project
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
application layer
application layerapplication layer
application layer
 
Vishal patel.pptx
Vishal patel.pptxVishal patel.pptx
Vishal patel.pptx
 
Introduction to telnet
Introduction to telnetIntroduction to telnet
Introduction to telnet
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 
Web protocol.pptx
Web protocol.pptxWeb protocol.pptx
Web protocol.pptx
 
File Transfer Protocol - FTP
File Transfer Protocol - FTPFile Transfer Protocol - FTP
File Transfer Protocol - FTP
 

More from Himanshu Pathak

More from Himanshu Pathak (18)

Introduction to E commerce
Introduction to E commerceIntroduction to E commerce
Introduction to E commerce
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
An Introduction to Cyber Ethics
An Introduction to Cyber EthicsAn Introduction to Cyber Ethics
An Introduction to Cyber Ethics
 
Cascading style sheet part 2
Cascading style sheet   part 2Cascading style sheet   part 2
Cascading style sheet part 2
 
Cascading style sheet an introduction
Cascading style sheet   an introductionCascading style sheet   an introduction
Cascading style sheet an introduction
 
Html multimedia
Html multimediaHtml multimedia
Html multimedia
 
Html forms
Html formsHtml forms
Html forms
 
Html tables
Html tablesHtml tables
Html tables
 
Html link and list tags
Html link and list tagsHtml link and list tags
Html link and list tags
 
HTML Text formatting tags
HTML Text formatting tagsHTML Text formatting tags
HTML Text formatting tags
 
Basic html tags
Basic html tagsBasic html tags
Basic html tags
 
Introduction to html
Introduction to htmlIntroduction to html
Introduction to html
 
Mobile technologies
Mobile technologiesMobile technologies
Mobile technologies
 
Web services
Web servicesWeb services
Web services
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
What is Computer?
What is Computer?What is Computer?
What is Computer?
 

Recently uploaded

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 

Recently uploaded (20)

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 

Remote Login and File Transfer Protocols

  • 1. COMPUTER APPLICATIONS CLASS X (Code 165) TOPIC: UNIT 1: Application Layer Protocols By HIMANSHU PATHAK
  • 2. Contents • Introduction • Communication Protocol • Mail Protocol • File Transfer Protocol • Remote Login Protocol
  • 3. Introduction • Application Layer uses protocols such as HTTP(S) on client side applications like browser. • The application layer is responsible for providing services to the user: – Accessing the www – Mail Services – File Transfer and Access – Remote Log-in
  • 4. Communication Protocol: HTTP • HTTP stands for Hyper-Text Transfer Protocol. • HTTP is used mainly to access data on the world wide web. • HTTP provides standard rules for web browsers & servers to communicate. • An HTTP is a stateless protocol as each transaction is executed separately without having any knowledge of the previous transactions, which means that once the transaction is completed between the web browser and the server, the connection gets lost.
  • 5. Communication Protocol: HTTPS • HTTPS stands for Hyper Text Transfer Protocol Secure. • It means all communications between your browser and the website are encrypted. • The use of HTTPS protocol is mainly required where we need to enter the bank account details. • The HTTPS protocol is mainly used where we require to enter the login credentials.
  • 6. HTTP Vs. HTTPS HTTP HTTPS It is mainly used for those websites that provide information like blog writing. It is a secure protocol, so it is used for those websites that require to transmit the bank account details or credit card numbers. The HTTP transmits the data over port number 80. The HTTPS transmits the data over port number 443. The page loading speed is fast. The page loading speed is slow as compared to HTTP because of the additional feature that it supports, i.e., security. It is an application layer protocol. It is a transport layer protocol. It does not use SSL. It uses SSL that provides the encryption of the data.
  • 7. Mail Protocol: SMTP • SMTP stands for Simple Mail Transfer Protocol. • SMTP is the standard mechanism for electronic mail in the internet. • The addressing system used by SMTP consists of two parts: Local part & Domain part • Local-part @ Domain-part • The main purpose of SMTP is used to set up communication rules between servers. • Most email clients allow for transfers of up to 25 MB.
  • 8. Mail Protocol: POP3 • The POP protocol stands for Post Office Protocol. • POP3 is a client/server protocol in which e-mail is received and held for you by your Internet server. • Periodically, you (or your client e-mail receiver) check your mail-box on the server and download any mail, probably using POP3. • This standard protocol is built into most popular e-mail products, such as Eudora and Outlook Express.
  • 9. SMTP Vs. POP3 SMTP POP3 SMTP is used to send the email POP is used to receive email SMTP acts as a MTA (Message Transfer Agent) POP3 is a MAA (Message Access Agent) The port number of SMTP is 25. The port number of POP3 is 110.
  • 10. File Transfer Protocol: FTP • FTP stands for File Transfer Protocol. • FTP is an application layer protocol which moves files between local and remote file systems. • FTP establishes two connections between the client and the server: – One connection is used for data transfer (port 20). – And the other for control information (port 21). • The control connection is maintained during the entire FTP session while the data connection is opened and then closed for each file transferred.
  • 11. File Transfer Protocol: SFTP • It stands for Secure File Transfer Protocol. • It builds on the File Transfer Protocol (FTP) and includes Secure Shell (SSH) security components. • Secure Shell is a cryptographic component of internet security. • SSH and SFTP were designed by the Internet Engineering Task Force (IETF) for greater web security. • SFTP transfers files security using SSH and encrypted FTP commands to avoid password sniffing and exposing sensitive information in plain text.
  • 12. FTP Vs. SFTP FTP SFTP FTP uses 2 channels to transfer data SFTP usage 1 channel to transfer data It usually runs on port no-21 It runs on port no-22 It does not encrypt the data before sending It encrypted data before sending
  • 13. SCP • SCP stands for Secure Copy Protocol. • Secure copy (SCP) is a file transfer protocol, which helps in transferring computer files securely from a local host to a remote host. • It works on the Secure Shell (SSH) protocol technique. • It doesn’t allow user to see and modify files on the server.
  • 14. SFTP Vs. SCP SFTP SCP SFTP is slow SCP is fast SFTP has to ACK (acknowledge) every tiny packet SCP does not need to ACK (acknowledge) SCP is built purely for file transfers. Generally speaking, you can't generate directory listings (to view files within a directory), create directories, delete directories, delete files, and so on. SFTP, on the other hand, can readily perform these operations on its own.
  • 15. Remote Login Protocol: Telnet • Telnet stands for Terminal Network. • It is a type of protocol that enables one computer to connect to local computer. • Computer which starts connection known as the local computer. Computer which is being connected to i.e. which accepts the connection known as remote computer. • During telnet operation whatever that is performing on the remote computer will be displayed by local computer.
  • 16. Remote Login Protocol: SSH • The SSH protocol (also referred to as Secure Shell) is a method for secure remote login from one computer to another. • It provides several alternative options for strong authentication, and it protects the communications security and integrity with strong encryption. • It is a secure alternative to the non-protected login protocols (such as telnet) and insecure file transfer methods (such as FTP).
  • 17. Telnet Vs. SSH TELNET SSH Telnet uses port 23 SSH runs on port 22 by default No privileges are provided for the user's authentication. SSH is a more secure protocol, so it uses public-key encryption for authentication. Suitable for private networks Suitable for public networks
  • 18. Today we learn • Communication protocols • Remote login and file transfer protocols. • In the next class, we will see Web Services in detail. •Thanks