SlideShare a Scribd company logo
1 of 24
Application
Layer
Protocols
HTTP –
HyperText
Transfer
Protocol
○ Many applications are running concurrently over
the Web, such as web browsing/surfing, e-mail,
file transfer, audio & video streaming, and so
on. In order for proper communication to take
place between the client and the server, these
applications must agree on a specific application-
level protocol such as HTTP, FTP, SMTP, POP, and
etc.
3
HyperText Transfer Protocol (HTTP)
HTTP is an asymmetric request-response client-server protocol as
illustrated. An HTTP client sends a request message to an HTTP
server. The server, in turn, returns a response message. In other
words, HTTP is a pull protocol, the client pulls information from the
server (instead of server pushes information down to the client).
4
“ 5
Whenever you issues a URL from your browser to get a web resource using HTTP,
e.g. http://www.nowhere123.com/index.html, the browser turns the URL into a request message and sends it to the
HTTP server. The HTTP server interprets the request message, and returns you an appropriate response message
which is either the resource you requested or an error message. This process is illustrated below:
HTTP – Request Message
As mentioned, whenever you enter a URL in the address box of the browser, the browser
translates the URL into a request message according to the specified protocol; and sends
the request message to the server. For example, the browser translated the URL
http://www.test101.com/doc/index.html into the following request message:
6
“Request Message Format-
bytecode
for carriage
return
bytes that
are placed as
end-of-line
markers.
HTTP – Response Message
When this request message reaches the server, the server can take either one of these
actions:
1)The server interprets the request received, maps the request into a file under the
server's document directory, and returns the file requested to the client.
2)The server interprets the request received, maps the request into a program kept in the
server, executes the program, and returns the output of the program to the client.
3)The request cannot be satisfied, the server returns an error message.
Response Message Format-
“○ HTTP Request Methods
HTTP protocol defines a set of request methods. The methods are:
GET: A client can use the GET request to get a web resource from the server.
HEAD: A client can use the HEAD request to get the header that a GET request would have
obtained. Since the header contains the last-modified date of the data, this can be used to
check against the local cache copy.
POST: Used to post data up to the web server.
PUT: Ask the server to store the data.
DELETE: Ask the server to delete the data.
TRACE: Ask the server to return a diagnostic trace of the actions it takes.
OPTIONS: Ask the server to return the list of request methods it supports.
CONNECT: Used to tell a proxy to make a connection to another host and simply reply the
content, without attempting to parse or cache it. This is often used to make SSL connection
through the proxy.
GET - Request method
GET is the most common HTTP request method. A client can use the GET request method to request (or
"get") for a piece of resource from an HTTP server. A GET request message takes the following syntax:
GET request-URI HTTP-version
(optional request headers)
(blank line)
(optional request body)
 The keyword GET is case sensitive and must be in uppercase.
 request-URI: specifies the path of resource requested, which must begin from the root
"/" of the document base directory.
 HTTP-version: Either HTTP/1.0 or HTTP/1.1. This client negotiates the protocol to be used
for the current session. For example, the client may request to use HTTP/1.1. If the server
does not support HTTP/1.1, it may inform the client in the response to use HTTP/1.0.
 The client uses the optional request headers (such as Accept, Accept-Language, and etc)
to negotiate with the server and ask the server to deliver the preferred contents (e.g., in
the language that the client preferred).
 GET request message has an optional request body which contains the query string
“○ For Deep learning of HTTP protocol-
Testing HTTP Requests
Network Program
Response Status Code
Misspelt Request Method
404 File Not Found
Wrong HTTP Version Number
Wrong Request-URI
Keep-Alive Connection
https://www.ntu.edu.sg/home/ehchua/programming/webprog
ramming/HTTP_Basics.html
Simple Mail Transfer Protocol (SMTP)
SMTP is a push protocol and is used to send the mail whereas POP (post office protocol)
or IMAP (internet message access protocol) are used to retrieve those mails at the
receiver’s side.
“○ SMTP System
Connection Establishment-
MTA Client MTA Server
220 Service Ready
Helo deanza.edu
250 OK
Email Message Process-
“○ Connection Termination
SMTP Commands-
“○ Post Office Protocol-
Post Office Protocol (POP) is a type of computer networking and Internet standard protocol that extracts
and retrieves email from a remote mail server for access by the host machine.
Techopedia explains Post Office Protocol (POP)
Post Office Protocol is the primary protocol behind email communication. POP works through a
supporting email software client that integrates POP for connecting to the remote email server and
downloading email messages to the recipient’s computer machine.
POP uses the TCP/IP protocol stack for network connection and works with Simple Mail Transfer Protocol
(SMTP) for end-to-end email communication, where POP pulls messages and SMTP pushes them to the
server. As of 2012, Post Office Protocol is in its third version known as POP 3 and is commonly used in
most email client/server communication architecture.
Downloading
Email in POP 3
“○ Disadvantages of POP3
1)Opening attachments is a quick and painless process, unless the attachment has a virus
payload in it.
If you have JavaScript enabled in your email reader, you might be target of rogue JavaScript
embedded in an email.
2)All messages are stored on your hard drive eating up what is sometimes very valuable
space.
Since all attachments are stored (downloaded) on your PC there is a potential danger of
virus attack if they are not properly scanned by virus scanners. Then sirus scans can only
address 60% of attacks effectively leaving your PC to a great danger.
3)Email folders can become corrupted and sometimes lost forever. Recovering is often a
painful exercise.
4)All messages are stored on your system, and privacy disappears when someone sits down
at your machine. Even if your email reader is password protected, it is often possible for
someone who knows what they are doing to read your email by using another application
to open your mail folders.
Thanks !
Any questions?
You can find detail info at
https://en.wikibooks.org/wiki/Communication_Networks/HTTP_Protocol
😉
https://technet.microsoft.com/en-us/library/cc737236(v=ws.10).aspx

More Related Content

What's hot

Lecture application layer
Lecture application layerLecture application layer
Lecture application layer
Hasam Panezai
 
Chapter 2 : Application Layer
Chapter 2 : Application LayerChapter 2 : Application Layer
Chapter 2 : Application Layer
Amin Omi
 
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocol
Tom Hanstead
 

What's hot (20)

Application layer
Application layerApplication layer
Application layer
 
Application layer
Application layerApplication layer
Application layer
 
Application layer
Application layerApplication layer
Application layer
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Lecture application layer
Lecture application layerLecture application layer
Lecture application layer
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Application layer
Application layerApplication layer
Application layer
 
Application protocols
Application protocolsApplication protocols
Application protocols
 
Application layer
Application layerApplication layer
Application layer
 
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocol
 
CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10CCNA 1 Routing and Switching v5.0 Chapter 10
CCNA 1 Routing and Switching v5.0 Chapter 10
 
Chapter 2 : Application Layer
Chapter 2 : Application LayerChapter 2 : Application Layer
Chapter 2 : Application Layer
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocol
 
file transfer and access utilities
file transfer and access utilitiesfile transfer and access utilities
file transfer and access utilities
 
Chapter4
Chapter4Chapter4
Chapter4
 
Protocol
ProtocolProtocol
Protocol
 
Application Layer Functionality and Protocols
Application Layer Functionality and ProtocolsApplication Layer Functionality and Protocols
Application Layer Functionality and Protocols
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
 

Similar to Application layer

Hypertex transfer protocol
Hypertex transfer protocolHypertex transfer protocol
Hypertex transfer protocol
wanangwa234
 
internet programming and java notes 5th sem mca
internet programming and java notes 5th sem mcainternet programming and java notes 5th sem mca
internet programming and java notes 5th sem mca
Renu Thakur
 
Web Server Technologies I: HTTP
Web Server Technologies I: HTTP Web Server Technologies I: HTTP
Web Server Technologies I: HTTP
webhostingguy
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
Raghunathan52
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
Raghunathan52
 

Similar to Application layer (20)

Hypertex transfer protocol
Hypertex transfer protocolHypertex transfer protocol
Hypertex transfer protocol
 
Http Introduction
Http IntroductionHttp Introduction
Http Introduction
 
HTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
HTTPProtocol HTTPProtocol.pptHTTPProtocol.pptHTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
HTTPProtocol HTTPProtocol.pptHTTPProtocol.ppt
 
Http
HttpHttp
Http
 
Http_Protocol.pptx
Http_Protocol.pptxHttp_Protocol.pptx
Http_Protocol.pptx
 
http presentation 1.pptx
http presentation 1.pptxhttp presentation 1.pptx
http presentation 1.pptx
 
internet programming and java notes 5th sem mca
internet programming and java notes 5th sem mcainternet programming and java notes 5th sem mca
internet programming and java notes 5th sem mca
 
Www and http
Www and httpWww and http
Www and http
 
CN UNIT V.pptx
CN UNIT V.pptxCN UNIT V.pptx
CN UNIT V.pptx
 
The HTTP and Web
The HTTP and Web The HTTP and Web
The HTTP and Web
 
Web Server Technologies I: HTTP
Web Server Technologies I: HTTP Web Server Technologies I: HTTP
Web Server Technologies I: HTTP
 
Web Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting StartedWeb Server Technologies I: HTTP & Getting Started
Web Server Technologies I: HTTP & Getting Started
 
Application layer
Application layer Application layer
Application layer
 
Www and http
Www and httpWww and http
Www and http
 
Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3
 
15 Application layer.pptx
15 Application layer.pptx15 Application layer.pptx
15 Application layer.pptx
 
Compute rNetwork.pptx
Compute rNetwork.pptxCompute rNetwork.pptx
Compute rNetwork.pptx
 
Web Programming HTML.pptx
Web Programming HTML.pptxWeb Programming HTML.pptx
Web Programming HTML.pptx
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
 
Web Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdfWeb Technologies Notes - TutorialsDuniya.pdf
Web Technologies Notes - TutorialsDuniya.pdf
 

Recently uploaded

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
chumtiyababu
 

Recently uploaded (20)

S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 

Application layer

  • 1.
  • 3. HTTP – HyperText Transfer Protocol ○ Many applications are running concurrently over the Web, such as web browsing/surfing, e-mail, file transfer, audio & video streaming, and so on. In order for proper communication to take place between the client and the server, these applications must agree on a specific application- level protocol such as HTTP, FTP, SMTP, POP, and etc. 3
  • 4. HyperText Transfer Protocol (HTTP) HTTP is an asymmetric request-response client-server protocol as illustrated. An HTTP client sends a request message to an HTTP server. The server, in turn, returns a response message. In other words, HTTP is a pull protocol, the client pulls information from the server (instead of server pushes information down to the client). 4
  • 5. “ 5 Whenever you issues a URL from your browser to get a web resource using HTTP, e.g. http://www.nowhere123.com/index.html, the browser turns the URL into a request message and sends it to the HTTP server. The HTTP server interprets the request message, and returns you an appropriate response message which is either the resource you requested or an error message. This process is illustrated below:
  • 6. HTTP – Request Message As mentioned, whenever you enter a URL in the address box of the browser, the browser translates the URL into a request message according to the specified protocol; and sends the request message to the server. For example, the browser translated the URL http://www.test101.com/doc/index.html into the following request message: 6
  • 7. “Request Message Format- bytecode for carriage return bytes that are placed as end-of-line markers.
  • 8. HTTP – Response Message When this request message reaches the server, the server can take either one of these actions: 1)The server interprets the request received, maps the request into a file under the server's document directory, and returns the file requested to the client. 2)The server interprets the request received, maps the request into a program kept in the server, executes the program, and returns the output of the program to the client. 3)The request cannot be satisfied, the server returns an error message.
  • 10. “○ HTTP Request Methods HTTP protocol defines a set of request methods. The methods are: GET: A client can use the GET request to get a web resource from the server. HEAD: A client can use the HEAD request to get the header that a GET request would have obtained. Since the header contains the last-modified date of the data, this can be used to check against the local cache copy. POST: Used to post data up to the web server. PUT: Ask the server to store the data. DELETE: Ask the server to delete the data. TRACE: Ask the server to return a diagnostic trace of the actions it takes. OPTIONS: Ask the server to return the list of request methods it supports. CONNECT: Used to tell a proxy to make a connection to another host and simply reply the content, without attempting to parse or cache it. This is often used to make SSL connection through the proxy.
  • 11. GET - Request method GET is the most common HTTP request method. A client can use the GET request method to request (or "get") for a piece of resource from an HTTP server. A GET request message takes the following syntax: GET request-URI HTTP-version (optional request headers) (blank line) (optional request body)  The keyword GET is case sensitive and must be in uppercase.  request-URI: specifies the path of resource requested, which must begin from the root "/" of the document base directory.  HTTP-version: Either HTTP/1.0 or HTTP/1.1. This client negotiates the protocol to be used for the current session. For example, the client may request to use HTTP/1.1. If the server does not support HTTP/1.1, it may inform the client in the response to use HTTP/1.0.  The client uses the optional request headers (such as Accept, Accept-Language, and etc) to negotiate with the server and ask the server to deliver the preferred contents (e.g., in the language that the client preferred).  GET request message has an optional request body which contains the query string
  • 12. “○ For Deep learning of HTTP protocol- Testing HTTP Requests Network Program Response Status Code Misspelt Request Method 404 File Not Found Wrong HTTP Version Number Wrong Request-URI Keep-Alive Connection https://www.ntu.edu.sg/home/ehchua/programming/webprog ramming/HTTP_Basics.html
  • 13. Simple Mail Transfer Protocol (SMTP) SMTP is a push protocol and is used to send the mail whereas POP (post office protocol) or IMAP (internet message access protocol) are used to retrieve those mails at the receiver’s side.
  • 15. Connection Establishment- MTA Client MTA Server 220 Service Ready Helo deanza.edu 250 OK
  • 19.
  • 20. “○ Post Office Protocol- Post Office Protocol (POP) is a type of computer networking and Internet standard protocol that extracts and retrieves email from a remote mail server for access by the host machine. Techopedia explains Post Office Protocol (POP) Post Office Protocol is the primary protocol behind email communication. POP works through a supporting email software client that integrates POP for connecting to the remote email server and downloading email messages to the recipient’s computer machine. POP uses the TCP/IP protocol stack for network connection and works with Simple Mail Transfer Protocol (SMTP) for end-to-end email communication, where POP pulls messages and SMTP pushes them to the server. As of 2012, Post Office Protocol is in its third version known as POP 3 and is commonly used in most email client/server communication architecture.
  • 21.
  • 23. “○ Disadvantages of POP3 1)Opening attachments is a quick and painless process, unless the attachment has a virus payload in it. If you have JavaScript enabled in your email reader, you might be target of rogue JavaScript embedded in an email. 2)All messages are stored on your hard drive eating up what is sometimes very valuable space. Since all attachments are stored (downloaded) on your PC there is a potential danger of virus attack if they are not properly scanned by virus scanners. Then sirus scans can only address 60% of attacks effectively leaving your PC to a great danger. 3)Email folders can become corrupted and sometimes lost forever. Recovering is often a painful exercise. 4)All messages are stored on your system, and privacy disappears when someone sits down at your machine. Even if your email reader is password protected, it is often possible for someone who knows what they are doing to read your email by using another application to open your mail folders.
  • 24. Thanks ! Any questions? You can find detail info at https://en.wikibooks.org/wiki/Communication_Networks/HTTP_Protocol 😉 https://technet.microsoft.com/en-us/library/cc737236(v=ws.10).aspx