SlideShare a Scribd company logo
Chapter 26 Remote Logging,  Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
26-1  REMOTE LOGGING It would be impossible to write a specific client/server program for each demand. The better solution is a general-purpose client/server program that lets a user access any application program on a remote computer. TELNET Topics discussed in this section:
TELNET is a general-purpose client/server application program. Note
Figure 26.1  Local and remote log-in
Figure 26.2  Concept of NVT
Table 26.1  Some NVT control characters
Figure 26.3  An example of embedding
Table 26.2  Options
Table 26.3  NVT character set for option negotiation
Figure 26.4 shows an example of option negotiation. In this example, the client wants the server to echo each character sent to the server. The echo option is enabled by the server because it is the server that sends the characters back to the user terminal. Therefore, the client should request from the server the enabling of the option using DO. The request consists of three characters: IAC, DO, and ECHO. The server accepts the request and enables the option. It informs the client by sending the three-character approval: IAC, WILL, and ECHO. Example 26.1
Figure 26.4  Example 26.1: Echo option
Table 26.4  Character set for suboptions
Figure 26.5 shows an example of suboption negotiation. In this example, the client wants to negotiate the type  of the terminal. Example 26.2
Figure 26.5  Example of suboption negotiation
26-2  ELECTRONIC MAIL One of the most popular Internet services is electronic mail (e-mail). The designers of the Internet probably never imagined the popularity of this application program. Its architecture consists of several components that we discuss in this chapter. Architecture User Agent Message Transfer Agent: SMTP Message Access Agent: POP and IMAP Web-Based Mail Topics discussed in this section:
Figure 26.6  First scenario in electronic mail
When the sender and the receiver of an e-mail are on the same system, we need only two user agents. Note
Figure 26.7  Second scenario in electronic mail
When the sender and the receiver of an e-mail are on different systems, we need two UAs and a pair of  MTAs (client and server). Note
Figure 26.8  Third scenario in electronic mail
When the sender is connected to the mail server via a LAN or a WAN, we need two UAs and two pairs of MTAs (client and server). Note
Figure 26.9  Fourth scenario in electronic mail
Figure 26.10  Push versus pull in electronic email
When both sender and receiver are connected to the mail server via  a LAN or a WAN, we need two  UAs, two pairs of MTAs  and a pair of MAAs. This is the most common situation today. Note
Figure 26.11  Services of user agent
Some examples of command-driven user agents are  mail ,  pine ,  and  elm . Note
Some examples of GUI-based user agents are  Eudora ,  Outlook , and  Netscape . Note
Figure 26.12  Format of an e-mail
Figure 26.13  E-mail address
Figure 26.14  MIME
Figure 26.15  MIME header
Table 26.5  Data types and subtypes in MIME
Table 26.6  Content-transfer-encoding
Figure 26.16  SMTP range
Figure 26.17  Commands and responses
Figure 26.18  Command format
Table 26.7  Commands
Table 26.8  Responses
Table 26.8  Responses  (continued)
Let us see how we can directly use SMTP to send an  e-mail and simulate the commands and responses we described in this section. We use TELNET to log into port 25 (the well-known port for SMTP). We then use the commands directly to send an e-mail. In this example, forouzanb@adelphia.net is sending an e-mail to himself. The first few lines show TELNET trying to connect to the Adelphia mail server. After connection, we can type the SMTP commands and then receive the responses, as shown on the next slide. Note that we have added, for clarification, some comment lines, designated by the “=” signs. These lines are not part of the e-mail procedure. Example 26.3
Example 26.3 (continued) $ telnet mail.adelphia.net 25 Trying 68.168.78.100 . . . Connected to mail.adelphia.net (68.168.78.100).
Example 26.3 (continued)
Example 26.3 (continued)
Figure 26.19  POP3 and IMAP4
Figure 26.20  The exchange of commands and responses in POP3
26-3  FILE TRANSFER Transferring files from one computer to another is one of the most common tasks expected from a networking or internetworking environment. As a matter of fact, the greatest volume of data exchange in the Internet today is due to file transfer.  File Transfer Protocol (FTP) Anonymous FTP Topics discussed in this section:
FTP uses the services of TCP. It needs two TCP connections. The well-known port 21 is used for the control connection and the well-known port 20 for the data connection. Note
Figure 26.21  FTP
Figure 26.22  Using the control connection
Figure 26.23  Using the data connection
The following shows an actual FTP session for retrieving a list of items in a directory. The colored lines show the responses from the server control connection; the black lines show the commands sent by the client. The lines in white with a black background show data transfer. 1.  After the control connection is created, the FTP server   sends the 220 response. 2.  The client sends its name. 3.  The server responds with 331. Example 26.4
4.  The client sends the password (not shown). 5 . The server responds with 230 (user log-in is OK). 6.  The client sends the list command (ls reports) to find   the list of files on the directory named report. 7.  Now the server responds with 150 and opens the data   connection. 8.  The server then sends the list of the files or directories   on the data connection. Example 26.4 (continued) 9.  The client sends a QUIT command. 10.  The  server responds with 221.
Example 26.4 (continued)
We show an example of anonymous FTP. We assume that some public data are available at internic.net. Example 26.5 We show an example of anonymous FTP. We assume that some public data are available at internic.net. continued on next slide
Example 26.5 (continued)

More Related Content

What's hot

Chapter 19
Chapter 19Chapter 19
Chapter 19
Faisal Mehmood
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
Faisal Mehmood
 
Chapter 25
Chapter 25Chapter 25
Chapter 25
Faisal Mehmood
 
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTPTRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
Pankaj Debbarma
 
Chapter 31
Chapter 31Chapter 31
Chapter 31
Faisal Mehmood
 
Chapter 27
Chapter 27Chapter 27
Chapter 27
Faisal Mehmood
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
Faisal Mehmood
 
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferWayne Jones Jnr
 
Chapter 18
Chapter 18Chapter 18
Chapter 18
Faisal Mehmood
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
Faisal Mehmood
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
Faisal Mehmood
 
Chapter 32
Chapter 32Chapter 32
Chapter 32
Faisal Mehmood
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
Faisal Mehmood
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
Faisal Mehmood
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
Peter R. Egli
 
Chapter 28
Chapter 28Chapter 28
Chapter 28
Faisal Mehmood
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
Mahesh Kumar Chelimilla
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
N.Jagadish Kumar
 

What's hot (20)

Chapter 19
Chapter 19Chapter 19
Chapter 19
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Chapter 25
Chapter 25Chapter 25
Chapter 25
 
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTPTRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
TRANSPORT LAYER - Process-to-Process Delivery: UDP, TCP and SCTP
 
Chapter 31
Chapter 31Chapter 31
Chapter 31
 
Chapter 27
Chapter 27Chapter 27
Chapter 27
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
 
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
 
Chapter 18
Chapter 18Chapter 18
Chapter 18
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Chapter 32
Chapter 32Chapter 32
Chapter 32
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
 
Chapter 30 - Cry
Chapter 30 - CryChapter 30 - Cry
Chapter 30 - Cry
 
Chapter 28
Chapter 28Chapter 28
Chapter 28
 
Ch22
Ch22Ch22
Ch22
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 

Viewers also liked

abstract Naod Mekonnen(4)
abstract Naod Mekonnen(4)abstract Naod Mekonnen(4)
abstract Naod Mekonnen(4)Naod Mekonnen
 
Himmelfahrt konfieinführung 2014 9 5-2013
Himmelfahrt konfieinführung 2014 9 5-2013Himmelfahrt konfieinführung 2014 9 5-2013
Himmelfahrt konfieinführung 2014 9 5-2013Pfarramt
 
Valoración del autoconsumo de la actividad cinegética
Valoración del autoconsumo de la actividad cinegéticaValoración del autoconsumo de la actividad cinegética
Valoración del autoconsumo de la actividad cinegética
Consejería de Sostenibilidad, Medio Ambiente y Economía Azul
 
Fibr Optica de Rafael Zancatl
Fibr Optica de Rafael ZancatlFibr Optica de Rafael Zancatl
Fibr Optica de Rafael Zancatlsangato
 
Cdr Rakesh Pandey{Vet}Int
Cdr Rakesh Pandey{Vet}IntCdr Rakesh Pandey{Vet}Int
Cdr Rakesh Pandey{Vet}IntRAKESH PANDEY
 
Docentes ingeniososyrso18feb2011
Docentes ingeniososyrso18feb2011Docentes ingeniososyrso18feb2011
Docentes ingeniososyrso18feb2011Redtebas
 
Los mitos griegos
Los mitos griegosLos mitos griegos
Los mitos griegos231097
 
Epinion Credential
Epinion CredentialEpinion Credential
Epinion CredentialEpinion
 
Foro de las Ciudades de IFEMA (junio 2014)
Foro de las Ciudades de IFEMA (junio 2014)Foro de las Ciudades de IFEMA (junio 2014)
Foro de las Ciudades de IFEMA (junio 2014)carlos marti ramos
 
Do impresso para o tablet
Do impresso para o tabletDo impresso para o tablet
Do impresso para o tablet
dualpixel
 
Fedegan_Animal_Ganadero_Buenas_Practicas_Colombia_Resolución_2341_2007
Fedegan_Animal_Ganadero_Buenas_Practicas_Colombia_Resolución_2341_2007Fedegan_Animal_Ganadero_Buenas_Practicas_Colombia_Resolución_2341_2007
Fedegan_Animal_Ganadero_Buenas_Practicas_Colombia_Resolución_2341_2007Fedegan
 
Programa symposium exernet
Programa symposium exernetPrograma symposium exernet
Programa symposium exernet
Fernando Senent
 
Elena Trifonova presentation-Project 015
Elena Trifonova presentation-Project 015Elena Trifonova presentation-Project 015
Elena Trifonova presentation-Project 015Elena Trifonova
 
La mujer profesional contador público
La mujer profesional contador públicoLa mujer profesional contador público
La mujer profesional contador público
elsaugarte
 
"I disegni e i modelli comunitari” vis a vis la tutela brevettuale
"I disegni e i modelli comunitari” vis a vis la tutela brevettuale"I disegni e i modelli comunitari” vis a vis la tutela brevettuale
"I disegni e i modelli comunitari” vis a vis la tutela brevettuale
Diritto & Information and Communication Technology
 
Sample preparation of feeds and forage for NIR analysis
Sample preparation of feeds and forage for NIR analysisSample preparation of feeds and forage for NIR analysis
Sample preparation of feeds and forage for NIR analysis
Milling and Grain magazine
 
"La content strategy per un engagement multicanale" - Paolo d'Ammassa, Connexia
"La content strategy per un engagement multicanale" - Paolo d'Ammassa, Connexia"La content strategy per un engagement multicanale" - Paolo d'Ammassa, Connexia
"La content strategy per un engagement multicanale" - Paolo d'Ammassa, Connexia
Osservatorio Multicanalità
 

Viewers also liked (20)

abstract Naod Mekonnen(4)
abstract Naod Mekonnen(4)abstract Naod Mekonnen(4)
abstract Naod Mekonnen(4)
 
Himmelfahrt konfieinführung 2014 9 5-2013
Himmelfahrt konfieinführung 2014 9 5-2013Himmelfahrt konfieinführung 2014 9 5-2013
Himmelfahrt konfieinführung 2014 9 5-2013
 
Valoración del autoconsumo de la actividad cinegética
Valoración del autoconsumo de la actividad cinegéticaValoración del autoconsumo de la actividad cinegética
Valoración del autoconsumo de la actividad cinegética
 
Fibr Optica de Rafael Zancatl
Fibr Optica de Rafael ZancatlFibr Optica de Rafael Zancatl
Fibr Optica de Rafael Zancatl
 
Cdr Rakesh Pandey{Vet}Int
Cdr Rakesh Pandey{Vet}IntCdr Rakesh Pandey{Vet}Int
Cdr Rakesh Pandey{Vet}Int
 
Docentes ingeniososyrso18feb2011
Docentes ingeniososyrso18feb2011Docentes ingeniososyrso18feb2011
Docentes ingeniososyrso18feb2011
 
Los mitos griegos
Los mitos griegosLos mitos griegos
Los mitos griegos
 
Epinion Credential
Epinion CredentialEpinion Credential
Epinion Credential
 
Foro de las Ciudades de IFEMA (junio 2014)
Foro de las Ciudades de IFEMA (junio 2014)Foro de las Ciudades de IFEMA (junio 2014)
Foro de las Ciudades de IFEMA (junio 2014)
 
Do impresso para o tablet
Do impresso para o tabletDo impresso para o tablet
Do impresso para o tablet
 
Fedegan_Animal_Ganadero_Buenas_Practicas_Colombia_Resolución_2341_2007
Fedegan_Animal_Ganadero_Buenas_Practicas_Colombia_Resolución_2341_2007Fedegan_Animal_Ganadero_Buenas_Practicas_Colombia_Resolución_2341_2007
Fedegan_Animal_Ganadero_Buenas_Practicas_Colombia_Resolución_2341_2007
 
Protocolos nefrologia
Protocolos nefrologiaProtocolos nefrologia
Protocolos nefrologia
 
Programa symposium exernet
Programa symposium exernetPrograma symposium exernet
Programa symposium exernet
 
Clase 7 : Programas Creativos
Clase 7 : Programas CreativosClase 7 : Programas Creativos
Clase 7 : Programas Creativos
 
Dell
DellDell
Dell
 
Elena Trifonova presentation-Project 015
Elena Trifonova presentation-Project 015Elena Trifonova presentation-Project 015
Elena Trifonova presentation-Project 015
 
La mujer profesional contador público
La mujer profesional contador públicoLa mujer profesional contador público
La mujer profesional contador público
 
"I disegni e i modelli comunitari” vis a vis la tutela brevettuale
"I disegni e i modelli comunitari” vis a vis la tutela brevettuale"I disegni e i modelli comunitari” vis a vis la tutela brevettuale
"I disegni e i modelli comunitari” vis a vis la tutela brevettuale
 
Sample preparation of feeds and forage for NIR analysis
Sample preparation of feeds and forage for NIR analysisSample preparation of feeds and forage for NIR analysis
Sample preparation of feeds and forage for NIR analysis
 
"La content strategy per un engagement multicanale" - Paolo d'Ammassa, Connexia
"La content strategy per un engagement multicanale" - Paolo d'Ammassa, Connexia"La content strategy per un engagement multicanale" - Paolo d'Ammassa, Connexia
"La content strategy per un engagement multicanale" - Paolo d'Ammassa, Connexia
 

Similar to Chapter 26

26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer
Ahmar Hashmi
 
Meeting 11. electronic mail: smtp
Meeting 11. electronic mail: smtpMeeting 11. electronic mail: smtp
Meeting 11. electronic mail: smtp
Syaiful Ahdan
 
transfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imaptransfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imap
AKSHIT KOHLI
 
Electronic mail chap-20
Electronic mail chap-20Electronic mail chap-20
Electronic mail chap-20
Vaidik Trivedi
 
Unit 5 Email FTP Rks.pps.ppt_20240425_112130_0000.pptx
Unit 5 Email FTP Rks.pps.ppt_20240425_112130_0000.pptxUnit 5 Email FTP Rks.pps.ppt_20240425_112130_0000.pptx
Unit 5 Email FTP Rks.pps.ppt_20240425_112130_0000.pptx
AdityaEM08
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
Kathirvel Ayyaswamy
 
unit 3 ns.ppt
unit 3 ns.pptunit 3 ns.ppt
unit 3 ns.ppt
Kamesh486870
 
Chap 20 smtp, pop, imap
Chap 20 smtp, pop, imapChap 20 smtp, pop, imap
Chap 20 smtp, pop, imap
Noctorous Jamal
 
Design an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing SoftwareDesign an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing Software
nilabarai
 
Chap 03
Chap 03Chap 03
Chap 03
IGNOU
 
Electronic Mail
Electronic MailElectronic Mail
Electronic Mail
Owaîs Járå
 
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
RashidFaridChishti
 
Electronic mail and Domain Name System
Electronic mail and Domain Name SystemElectronic mail and Domain Name System
Electronic mail and Domain Name System
rajjo224
 
Transportlayer.ppt
Transportlayer.pptTransportlayer.ppt
Transportlayer.ppt
AayushMishra89
 
Chapeter 2
Chapeter 2Chapeter 2
Chapeter 2
Nazir Ahmed
 
Network_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.pptNetwork_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.ppt
BlackHat41
 

Similar to Chapter 26 (20)

26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer
 
Meeting 11. electronic mail: smtp
Meeting 11. electronic mail: smtpMeeting 11. electronic mail: smtp
Meeting 11. electronic mail: smtp
 
transfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imaptransfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imap
 
Ch 26
Ch 26Ch 26
Ch 26
 
Electronic mail chap-20
Electronic mail chap-20Electronic mail chap-20
Electronic mail chap-20
 
Ftp
FtpFtp
Ftp
 
Unit 5 Email FTP Rks.pps.ppt_20240425_112130_0000.pptx
Unit 5 Email FTP Rks.pps.ppt_20240425_112130_0000.pptxUnit 5 Email FTP Rks.pps.ppt_20240425_112130_0000.pptx
Unit 5 Email FTP Rks.pps.ppt_20240425_112130_0000.pptx
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
unit 3 ns.ppt
unit 3 ns.pptunit 3 ns.ppt
unit 3 ns.ppt
 
Chap 20 smtp, pop, imap
Chap 20 smtp, pop, imapChap 20 smtp, pop, imap
Chap 20 smtp, pop, imap
 
Design an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing SoftwareDesign an Implementation of A Messaging and Resource Sharing Software
Design an Implementation of A Messaging and Resource Sharing Software
 
Chap 03
Chap 03Chap 03
Chap 03
 
Ch27
Ch27Ch27
Ch27
 
Lec2_CH02.PPT
Lec2_CH02.PPTLec2_CH02.PPT
Lec2_CH02.PPT
 
Electronic Mail
Electronic MailElectronic Mail
Electronic Mail
 
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
 
Electronic mail and Domain Name System
Electronic mail and Domain Name SystemElectronic mail and Domain Name System
Electronic mail and Domain Name System
 
Transportlayer.ppt
Transportlayer.pptTransportlayer.ppt
Transportlayer.ppt
 
Chapeter 2
Chapeter 2Chapeter 2
Chapeter 2
 
Network_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.pptNetwork_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.ppt
 

More from Faisal Mehmood

Indoor Comfort Index Monitoring System using KNN algorithm
Indoor Comfort Index Monitoring System using KNN algorithmIndoor Comfort Index Monitoring System using KNN algorithm
Indoor Comfort Index Monitoring System using KNN algorithm
Faisal Mehmood
 
Raspberry pi and Google Cloud
Raspberry pi and Google CloudRaspberry pi and Google Cloud
Raspberry pi and Google Cloud
Faisal Mehmood
 
Raspberry pi and Azure
Raspberry pi and AzureRaspberry pi and Azure
Raspberry pi and Azure
Faisal Mehmood
 
Raspberry pi and AWS
Raspberry pi and AWSRaspberry pi and AWS
Raspberry pi and AWS
Faisal Mehmood
 
Raspbian Noobs
Raspbian NoobsRaspbian Noobs
Raspbian Noobs
Faisal Mehmood
 
Lecture 20 combinatorics o
Lecture 20 combinatorics oLecture 20 combinatorics o
Lecture 20 combinatorics oFaisal Mehmood
 
Lecture 36 laws of prob
Lecture 36 laws of probLecture 36 laws of prob
Lecture 36 laws of probFaisal Mehmood
 
Lecture 19 counting
Lecture 19 countingLecture 19 counting
Lecture 19 counting
Faisal Mehmood
 
Lecture 18 recursion
Lecture 18 recursionLecture 18 recursion
Lecture 18 recursion
Faisal Mehmood
 

More from Faisal Mehmood (20)

Indoor Comfort Index Monitoring System using KNN algorithm
Indoor Comfort Index Monitoring System using KNN algorithmIndoor Comfort Index Monitoring System using KNN algorithm
Indoor Comfort Index Monitoring System using KNN algorithm
 
Raspberry pi and Google Cloud
Raspberry pi and Google CloudRaspberry pi and Google Cloud
Raspberry pi and Google Cloud
 
Raspberry pi and Azure
Raspberry pi and AzureRaspberry pi and Azure
Raspberry pi and Azure
 
Raspberry pi and AWS
Raspberry pi and AWSRaspberry pi and AWS
Raspberry pi and AWS
 
Raspbian Noobs
Raspbian NoobsRaspbian Noobs
Raspbian Noobs
 
Lecture 44
Lecture 44Lecture 44
Lecture 44
 
Lecture 37 cond prob
Lecture 37 cond probLecture 37 cond prob
Lecture 37 cond prob
 
Lecture 20 combinatorics o
Lecture 20 combinatorics oLecture 20 combinatorics o
Lecture 20 combinatorics o
 
Lecture 36 laws of prob
Lecture 36 laws of probLecture 36 laws of prob
Lecture 36 laws of prob
 
Lecture 36
Lecture 36 Lecture 36
Lecture 36
 
Lecture 35 prob
Lecture 35 probLecture 35 prob
Lecture 35 prob
 
Lecture 27
Lecture 27Lecture 27
Lecture 27
 
Lecture 26
Lecture 26Lecture 26
Lecture 26
 
Lecture 25
Lecture 25Lecture 25
Lecture 25
 
Lecture 24
Lecture 24Lecture 24
Lecture 24
 
Lecture 22
Lecture 22Lecture 22
Lecture 22
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
Lecture 20
Lecture 20Lecture 20
Lecture 20
 
Lecture 19 counting
Lecture 19 countingLecture 19 counting
Lecture 19 counting
 
Lecture 18 recursion
Lecture 18 recursionLecture 18 recursion
Lecture 18 recursion
 

Recently uploaded

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 

Recently uploaded (20)

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 

Chapter 26

  • 1. Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 26-1 REMOTE LOGGING It would be impossible to write a specific client/server program for each demand. The better solution is a general-purpose client/server program that lets a user access any application program on a remote computer. TELNET Topics discussed in this section:
  • 3. TELNET is a general-purpose client/server application program. Note
  • 4. Figure 26.1 Local and remote log-in
  • 5. Figure 26.2 Concept of NVT
  • 6. Table 26.1 Some NVT control characters
  • 7. Figure 26.3 An example of embedding
  • 8. Table 26.2 Options
  • 9. Table 26.3 NVT character set for option negotiation
  • 10. Figure 26.4 shows an example of option negotiation. In this example, the client wants the server to echo each character sent to the server. The echo option is enabled by the server because it is the server that sends the characters back to the user terminal. Therefore, the client should request from the server the enabling of the option using DO. The request consists of three characters: IAC, DO, and ECHO. The server accepts the request and enables the option. It informs the client by sending the three-character approval: IAC, WILL, and ECHO. Example 26.1
  • 11. Figure 26.4 Example 26.1: Echo option
  • 12. Table 26.4 Character set for suboptions
  • 13. Figure 26.5 shows an example of suboption negotiation. In this example, the client wants to negotiate the type of the terminal. Example 26.2
  • 14. Figure 26.5 Example of suboption negotiation
  • 15. 26-2 ELECTRONIC MAIL One of the most popular Internet services is electronic mail (e-mail). The designers of the Internet probably never imagined the popularity of this application program. Its architecture consists of several components that we discuss in this chapter. Architecture User Agent Message Transfer Agent: SMTP Message Access Agent: POP and IMAP Web-Based Mail Topics discussed in this section:
  • 16. Figure 26.6 First scenario in electronic mail
  • 17. When the sender and the receiver of an e-mail are on the same system, we need only two user agents. Note
  • 18. Figure 26.7 Second scenario in electronic mail
  • 19. When the sender and the receiver of an e-mail are on different systems, we need two UAs and a pair of MTAs (client and server). Note
  • 20. Figure 26.8 Third scenario in electronic mail
  • 21. When the sender is connected to the mail server via a LAN or a WAN, we need two UAs and two pairs of MTAs (client and server). Note
  • 22. Figure 26.9 Fourth scenario in electronic mail
  • 23. Figure 26.10 Push versus pull in electronic email
  • 24. When both sender and receiver are connected to the mail server via a LAN or a WAN, we need two UAs, two pairs of MTAs and a pair of MAAs. This is the most common situation today. Note
  • 25. Figure 26.11 Services of user agent
  • 26. Some examples of command-driven user agents are mail , pine , and elm . Note
  • 27. Some examples of GUI-based user agents are Eudora , Outlook , and Netscape . Note
  • 28. Figure 26.12 Format of an e-mail
  • 29. Figure 26.13 E-mail address
  • 30. Figure 26.14 MIME
  • 31. Figure 26.15 MIME header
  • 32. Table 26.5 Data types and subtypes in MIME
  • 33. Table 26.6 Content-transfer-encoding
  • 34. Figure 26.16 SMTP range
  • 35. Figure 26.17 Commands and responses
  • 36. Figure 26.18 Command format
  • 37. Table 26.7 Commands
  • 38. Table 26.8 Responses
  • 39. Table 26.8 Responses (continued)
  • 40. Let us see how we can directly use SMTP to send an e-mail and simulate the commands and responses we described in this section. We use TELNET to log into port 25 (the well-known port for SMTP). We then use the commands directly to send an e-mail. In this example, forouzanb@adelphia.net is sending an e-mail to himself. The first few lines show TELNET trying to connect to the Adelphia mail server. After connection, we can type the SMTP commands and then receive the responses, as shown on the next slide. Note that we have added, for clarification, some comment lines, designated by the “=” signs. These lines are not part of the e-mail procedure. Example 26.3
  • 41. Example 26.3 (continued) $ telnet mail.adelphia.net 25 Trying 68.168.78.100 . . . Connected to mail.adelphia.net (68.168.78.100).
  • 44. Figure 26.19 POP3 and IMAP4
  • 45. Figure 26.20 The exchange of commands and responses in POP3
  • 46. 26-3 FILE TRANSFER Transferring files from one computer to another is one of the most common tasks expected from a networking or internetworking environment. As a matter of fact, the greatest volume of data exchange in the Internet today is due to file transfer. File Transfer Protocol (FTP) Anonymous FTP Topics discussed in this section:
  • 47. FTP uses the services of TCP. It needs two TCP connections. The well-known port 21 is used for the control connection and the well-known port 20 for the data connection. Note
  • 49. Figure 26.22 Using the control connection
  • 50. Figure 26.23 Using the data connection
  • 51. The following shows an actual FTP session for retrieving a list of items in a directory. The colored lines show the responses from the server control connection; the black lines show the commands sent by the client. The lines in white with a black background show data transfer. 1. After the control connection is created, the FTP server sends the 220 response. 2. The client sends its name. 3. The server responds with 331. Example 26.4
  • 52. 4. The client sends the password (not shown). 5 . The server responds with 230 (user log-in is OK). 6. The client sends the list command (ls reports) to find the list of files on the directory named report. 7. Now the server responds with 150 and opens the data connection. 8. The server then sends the list of the files or directories on the data connection. Example 26.4 (continued) 9. The client sends a QUIT command. 10. The server responds with 221.
  • 54. We show an example of anonymous FTP. We assume that some public data are available at internic.net. Example 26.5 We show an example of anonymous FTP. We assume that some public data are available at internic.net. continued on next slide