SlideShare a Scribd company logo
WHAT IS A PROTOCOL?
A protocol defines a common set of
rules used by network computers to
share data and communicate.
Two computers must use a common
protocol to be able to communicate
with each other.
In the same way, two or more
TYPES OF PROTOCOL.
• HTTP(Hyper Text
Transfer Protocol)
• HTTPS(Hyper Text
Transfer Protocol
Secure)
• FTP(File Transfer
Protocol)
• SMTP(Simple Mail
Transfer Protocol)
• TELNET
THERE ARE
MANY TYPES
OF
PROTOCOL
BUT THE
COMMONLY
USED ONE
ARE:
Basic requirements for protocols.
• Data formats for data exchange.
• Address formats for data
exchange.
• Address mapping.
• Routing.
• Detection of transmission errors.
• Direction of information flow .
Hyper Text Transfer Protocol.(HTTP)
The Hypertext Transfer Protocol (HTTP) is
an application protocol for distributed,
collaborative, hypermedia information
systems.
HTTP is the foundation of data
communication for the World Wide Web.
Hypertext is structured text that uses
logical links (hyperlinks)
between nodes containing text.
HISTORY OF HTTP.
 The term hypertext was coined by Ted
Nelson in 1965 in the Xanadu Project, which
was in turn inspired by Vanneva Bush's
vision (1930s) of the microfilm-based
information retrieval and management
"memex" system described in his essay As
We May Think (1945).
The first documented version of HTTP
was HTTP V0.9 (1991).
RFC 1945 officially introduced and
An HTTP session is a sequence of
network request-response
transactions.
An HTTP client initiates a request by
establishing a Transmission Control
Protocol (TCP) connection to a
particular port on a server (typically
port 80, occasionally port 8080).
An HTTP server listening on that port
Access to HTTP or HTTP Authentication.
 HTTP provides multiple authentication
schemes such as Basic access
authentication and Digest access
authentication which operate via a challenge-
response mechanism whereby the server
identifies and issues a challenge before
serving the requested content.
 HTTP provides a general framework for
access control and authentication, via an
extensible set of challenge-response
authentication schemes, which can be used
Request Methods in HTTP.
Some of the common request
methods in HTTP are:
 GET
 HEAD
 POST
 PUT
 DELETE
 TRACE
 CONNECT
 PATCH, ETC…
Hypertext Transfer Protocol Secure. (HTTPS).
 HTTPS is
a protocol for secure communication over a
computer network which is widely used on
the Internet.
 HTTPS consists of communication
over Hypertext Transfer Protocol (HTTP)
within a connection encrypted by Transport
Layer Security or its predecessor, Secure
Sockets Layer.
History of HTTPS.
 Netscape Communications created
HTTPS in 1994 for its Netscape
Navigator web browser.
 Originally,HTTPS was used with
the SSL protocol. As SSL evolved
into Transport Layer
Security (TLS), the current version
What is the Difference between HTTP & HTTPS.
 HTTP is not encrypted and is vulnerable to
man-in-the-middle and eavesdropping
attacks, which can let attackers gain access
to website accounts and sensitive
information, and modify webpages to
inject malware or advertisements.
 HTTPS is designed to withstand such
attacks and is considered secure against
them (with the exception of older,
Limitations of HTTPS.
SSL/TLS comes in two options, simple and
mutual. The mutual version is more secure,
but requires the user to install a
personal client certificate into their web
browser in order to authenticate
themselves.
Whatever strategy is used (simple or
mutual), the level of protection strongly
depends on the correctness of
File Transfer Protocol (FTP).
 The File Transfer Protocol (FTP) is a
standard network protocol used to
transfer computer files between a
client and server on a computer
network.
 FTP is built on a client-server model
architecture and uses separate
control and data connections between
the client and the server.
History of FTP.
The original specification for the File
Transfer Protocol was written
by Abhay Bhushan and published
as RFC 114 on 16 April 1971. Until
1980, FTP ran on NCP, the predecessor
of TCP/IP.
The protocol was later replaced by a
Security in FTP.
FTP was not designed to be a secure protocol, and
has many security weaknesses.
In May 1999, the authors of RFC 2577 listed a
vulnerability to the following problems:
• Brute force attack
• FTP bounce attack
• Packet capture
• Port stealing
• Spoofing attack
• Username protection
Commands in FTP(some).
Command RFC Description
ABOR Abort an active file transfer.
ACCT Account information.
ADAT RFC 2228 Authentication/Security Data
ALLO
Allocate sufficient disk space to receive a
file.
APPE Append.
AUTH RFC 2228 Authentication/Security Mechanism
CCC RFC 2228 Clear Command Channel
CDUP Change to Parent Directory.
CONF RFC 2228 Confidentiality Protection Command
Simple Mail Transfer Protocol(SMTP).
 Simple Mail Transfer Protocol (SMTP)
is an Internet standard for electronic
mail (email) transmission.
 First defined by RFC 821 in 1982, it
was last updated in 2008 with
the Extended SMTP additions by RFC
5321 —which is the protocol in
History of SMTP.
 Various forms of one-to-one electronic
messaging were used in the 1960s. People
communicated with one another using
systems developed for
specific mainframe computers.
 As more computers were interconnected,
especially in the US Government's
ARPANET, standards were developed to
allow users of different systems to email
one another.
How is the mail processed in SMTP? (model).
Email is submitted by a mail client
(MUA, mail user agent) to a mail server
(MSA, mail submission agent) using
SMTP on TCP port 587.
Most mailbox providers still allow
submission on traditional port 25.
From there, the MSA delivers the mail
to its mail transfer agent (MTA, mail
transfer agent).
Commands in SMTP.
MAIL command, to establish the
return address
RCPT command, to establish a
recipient of this message
DATA to signal the beginning of
TELNET
• Telnet is an application layer protocol
used on the Internet or local area
networks to provide a bidirectional
interactive text-oriented
communication facility using a
virtual terminal connection.
• The term telnet is also used to refer to
the software that implements the client
part of the protocol.
History of TELNET.
Telnet is a client-server protocol, based on
a reliable connection-oriented transport.
Typically, this protocol is used to establish
a connection to Transmission Control
Protocol(TCP) port number 23, where a
Telnet server application is listening.
Telnet is best understood in the context of a
user with a simple terminal using the local
Telnet program (known as the client
program) to run a logon session on a
Security in TELNET.
Telnet, by default, does
not encrypt any data sent over the
connection (including passwords).
 So it is often feasible to eavesdrop on
the communications and use the
password later for malicious
purposes; anybody who has access to
a router, switch, hub or gateway locate
d on the network between the two
hosts.
List of various Protocols.
WIFI/WIMAX Protocols
Bluetooth protocol
Fibre Channel network protocols
Yahoo! Messenger, underlying protocol used
by the Yahoo messenger
RTPS protocol, an interoperability protocol
SSH Secure Shell
Fit project
Fit project

More Related Content

What's hot

Internet protocols
Internet protocolsInternet protocols
Internet protocols
Reilen
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
Reilen
 
Ssh
SshSsh
Ssh
gh02
 

What's hot (17)

Protocol
ProtocolProtocol
Protocol
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
 
TELNET and SSH by MUSTAFA SAKHAI
TELNET and SSH by MUSTAFA SAKHAITELNET and SSH by MUSTAFA SAKHAI
TELNET and SSH by MUSTAFA SAKHAI
 
Ports
PortsPorts
Ports
 
A Presentation on Servers & Splunk
A Presentation on Servers & SplunkA Presentation on Servers & Splunk
A Presentation on Servers & Splunk
 
Networking based ppt
Networking based pptNetworking based ppt
Networking based ppt
 
20 Common Ports and their purposes
20 Common Ports and their purposes 20 Common Ports and their purposes
20 Common Ports and their purposes
 
The Network Protocol Stack Revisited
The Network Protocol Stack RevisitedThe Network Protocol Stack Revisited
The Network Protocol Stack Revisited
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
Internet protocols
Internet protocolsInternet protocols
Internet protocols
 
Tunneling vpn security and implementation
Tunneling vpn security and implementationTunneling vpn security and implementation
Tunneling vpn security and implementation
 
Ports and services
Ports and servicesPorts and services
Ports and services
 
Assignment on data network
Assignment on data networkAssignment on data network
Assignment on data network
 
Ssh
SshSsh
Ssh
 
Telnet presentation
Telnet presentationTelnet presentation
Telnet presentation
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 
Transport Layer Security
Transport Layer Security Transport Layer Security
Transport Layer Security
 

Viewers also liked

Nicholas Hills Final Paper - HWCA
Nicholas Hills Final Paper - HWCANicholas Hills Final Paper - HWCA
Nicholas Hills Final Paper - HWCA
Nicholas Hills
 
Don’t Rain on my Service Management Parade
Don’t Rain on my Service Management ParadeDon’t Rain on my Service Management Parade
Don’t Rain on my Service Management Parade
Earl Begley
 
Bernadette Maguire: Balancing the Skills - The vital nature of Speaking
Bernadette Maguire: Balancing the Skills - The vital nature of SpeakingBernadette Maguire: Balancing the Skills - The vital nature of Speaking
Bernadette Maguire: Balancing the Skills - The vital nature of Speaking
eaquals
 
Euskal Autonomia Erkidegoko Geodibertsitatearen Estrategia 2020
Euskal Autonomia Erkidegoko Geodibertsitatearen Estrategia 2020 Euskal Autonomia Erkidegoko Geodibertsitatearen Estrategia 2020
Euskal Autonomia Erkidegoko Geodibertsitatearen Estrategia 2020
Irekia - EJGV
 

Viewers also liked (20)

Historia de los computadores.
Historia de los computadores.Historia de los computadores.
Historia de los computadores.
 
Varivax
VarivaxVarivax
Varivax
 
Madrid Gay Friendly City
Madrid Gay Friendly CityMadrid Gay Friendly City
Madrid Gay Friendly City
 
Integrated ACO selected for the NAACOS Innovation Showcase
Integrated ACO selected for the NAACOS Innovation ShowcaseIntegrated ACO selected for the NAACOS Innovation Showcase
Integrated ACO selected for the NAACOS Innovation Showcase
 
Nicholas Hills Final Paper - HWCA
Nicholas Hills Final Paper - HWCANicholas Hills Final Paper - HWCA
Nicholas Hills Final Paper - HWCA
 
z/VSE Update and Outlook
z/VSE Update and Outlookz/VSE Update and Outlook
z/VSE Update and Outlook
 
Crowdfunding Vortrag (WearFair 2013, Linz)
Crowdfunding Vortrag (WearFair 2013, Linz)Crowdfunding Vortrag (WearFair 2013, Linz)
Crowdfunding Vortrag (WearFair 2013, Linz)
 
Don’t Rain on my Service Management Parade
Don’t Rain on my Service Management ParadeDon’t Rain on my Service Management Parade
Don’t Rain on my Service Management Parade
 
Investigación etnográfica danza de luces
Investigación etnográfica danza de lucesInvestigación etnográfica danza de luces
Investigación etnográfica danza de luces
 
Bernadette Maguire: Balancing the Skills - The vital nature of Speaking
Bernadette Maguire: Balancing the Skills - The vital nature of SpeakingBernadette Maguire: Balancing the Skills - The vital nature of Speaking
Bernadette Maguire: Balancing the Skills - The vital nature of Speaking
 
Fabrica velas decoragloba
Fabrica velas decoraglobaFabrica velas decoragloba
Fabrica velas decoragloba
 
Rodrigo carvajal gt28
Rodrigo carvajal gt28Rodrigo carvajal gt28
Rodrigo carvajal gt28
 
Praezise C-Nut-Zylindersensoren
Praezise C-Nut-ZylindersensorenPraezise C-Nut-Zylindersensoren
Praezise C-Nut-Zylindersensoren
 
Velocidad de planeo
Velocidad de planeoVelocidad de planeo
Velocidad de planeo
 
L06 Using Design Patterns
L06 Using Design PatternsL06 Using Design Patterns
L06 Using Design Patterns
 
Memoria 2011 2012
Memoria 2011 2012Memoria 2011 2012
Memoria 2011 2012
 
Euskal Autonomia Erkidegoko Geodibertsitatearen Estrategia 2020
Euskal Autonomia Erkidegoko Geodibertsitatearen Estrategia 2020 Euskal Autonomia Erkidegoko Geodibertsitatearen Estrategia 2020
Euskal Autonomia Erkidegoko Geodibertsitatearen Estrategia 2020
 
95091605 ejemplo-de-diseno-de-pavimento-flexible
95091605 ejemplo-de-diseno-de-pavimento-flexible95091605 ejemplo-de-diseno-de-pavimento-flexible
95091605 ejemplo-de-diseno-de-pavimento-flexible
 
Negocio bisxantone prosefi
Negocio bisxantone prosefi Negocio bisxantone prosefi
Negocio bisxantone prosefi
 
Cultura organizacional conferencia
Cultura organizacional conferenciaCultura organizacional conferencia
Cultura organizacional conferencia
 

Similar to Fit project

Discuss the purpose of subnetting. What does CIDR stand for and me
Discuss the purpose of subnetting. What does CIDR stand for and meDiscuss the purpose of subnetting. What does CIDR stand for and me
Discuss the purpose of subnetting. What does CIDR stand for and me
huttenangela
 

Similar to Fit project (20)

Web protocol.pptx
Web protocol.pptxWeb protocol.pptx
Web protocol.pptx
 
An Introduction to HTTP
An Introduction to HTTPAn Introduction to HTTP
An Introduction to HTTP
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
Networking infrastructure
Networking infrastructureNetworking infrastructure
Networking infrastructure
 
Internet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptxInternet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptx
 
Http VS. Https
Http VS. HttpsHttp VS. Https
Http VS. Https
 
Application Layer
Application LayerApplication Layer
Application Layer
 
PROTOCOLS AND ITS TYPES.docx
PROTOCOLS AND ITS TYPES.docxPROTOCOLS AND ITS TYPES.docx
PROTOCOLS AND ITS TYPES.docx
 
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their  DEFNITIONS BY NAVEEN.pptxTypes of Protocals and their  DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
 
NETWORK PROTOCOL
NETWORK PROTOCOLNETWORK PROTOCOL
NETWORK PROTOCOL
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
Application layer and protocols of application layer
Application layer and protocols of application layerApplication layer and protocols of application layer
Application layer and protocols of application layer
 
Protocols
ProtocolsProtocols
Protocols
 
APPLICATION LAYER PROTOCOLS .pptx
APPLICATION LAYER PROTOCOLS         .pptxAPPLICATION LAYER PROTOCOLS         .pptx
APPLICATION LAYER PROTOCOLS .pptx
 
Assignment on data network
Assignment on data networkAssignment on data network
Assignment on data network
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Discuss the purpose of subnetting. What does CIDR stand for and me
Discuss the purpose of subnetting. What does CIDR stand for and meDiscuss the purpose of subnetting. What does CIDR stand for and me
Discuss the purpose of subnetting. What does CIDR stand for and me
 
application layer
application layerapplication layer
application layer
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 

Recently uploaded

audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
lolsDocherty
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
aagad
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
abhinandnam9997
 

Recently uploaded (13)

The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
Case study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptxCase study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptx
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdf
 
The Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI StudioThe Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI Studio
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 

Fit project

  • 1.
  • 2. WHAT IS A PROTOCOL? A protocol defines a common set of rules used by network computers to share data and communicate. Two computers must use a common protocol to be able to communicate with each other. In the same way, two or more
  • 3. TYPES OF PROTOCOL. • HTTP(Hyper Text Transfer Protocol) • HTTPS(Hyper Text Transfer Protocol Secure) • FTP(File Transfer Protocol) • SMTP(Simple Mail Transfer Protocol) • TELNET THERE ARE MANY TYPES OF PROTOCOL BUT THE COMMONLY USED ONE ARE:
  • 4. Basic requirements for protocols. • Data formats for data exchange. • Address formats for data exchange. • Address mapping. • Routing. • Detection of transmission errors. • Direction of information flow .
  • 5. Hyper Text Transfer Protocol.(HTTP) The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text.
  • 6. HISTORY OF HTTP.  The term hypertext was coined by Ted Nelson in 1965 in the Xanadu Project, which was in turn inspired by Vanneva Bush's vision (1930s) of the microfilm-based information retrieval and management "memex" system described in his essay As We May Think (1945). The first documented version of HTTP was HTTP V0.9 (1991). RFC 1945 officially introduced and
  • 7. An HTTP session is a sequence of network request-response transactions. An HTTP client initiates a request by establishing a Transmission Control Protocol (TCP) connection to a particular port on a server (typically port 80, occasionally port 8080). An HTTP server listening on that port
  • 8. Access to HTTP or HTTP Authentication.  HTTP provides multiple authentication schemes such as Basic access authentication and Digest access authentication which operate via a challenge- response mechanism whereby the server identifies and issues a challenge before serving the requested content.  HTTP provides a general framework for access control and authentication, via an extensible set of challenge-response authentication schemes, which can be used
  • 9. Request Methods in HTTP. Some of the common request methods in HTTP are:  GET  HEAD  POST  PUT  DELETE  TRACE  CONNECT  PATCH, ETC…
  • 10. Hypertext Transfer Protocol Secure. (HTTPS).  HTTPS is a protocol for secure communication over a computer network which is widely used on the Internet.  HTTPS consists of communication over Hypertext Transfer Protocol (HTTP) within a connection encrypted by Transport Layer Security or its predecessor, Secure Sockets Layer.
  • 11. History of HTTPS.  Netscape Communications created HTTPS in 1994 for its Netscape Navigator web browser.  Originally,HTTPS was used with the SSL protocol. As SSL evolved into Transport Layer Security (TLS), the current version
  • 12. What is the Difference between HTTP & HTTPS.  HTTP is not encrypted and is vulnerable to man-in-the-middle and eavesdropping attacks, which can let attackers gain access to website accounts and sensitive information, and modify webpages to inject malware or advertisements.  HTTPS is designed to withstand such attacks and is considered secure against them (with the exception of older,
  • 13. Limitations of HTTPS. SSL/TLS comes in two options, simple and mutual. The mutual version is more secure, but requires the user to install a personal client certificate into their web browser in order to authenticate themselves. Whatever strategy is used (simple or mutual), the level of protection strongly depends on the correctness of
  • 14. File Transfer Protocol (FTP).  The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network.  FTP is built on a client-server model architecture and uses separate control and data connections between the client and the server.
  • 15. History of FTP. The original specification for the File Transfer Protocol was written by Abhay Bhushan and published as RFC 114 on 16 April 1971. Until 1980, FTP ran on NCP, the predecessor of TCP/IP. The protocol was later replaced by a
  • 16. Security in FTP. FTP was not designed to be a secure protocol, and has many security weaknesses. In May 1999, the authors of RFC 2577 listed a vulnerability to the following problems: • Brute force attack • FTP bounce attack • Packet capture • Port stealing • Spoofing attack • Username protection
  • 17. Commands in FTP(some). Command RFC Description ABOR Abort an active file transfer. ACCT Account information. ADAT RFC 2228 Authentication/Security Data ALLO Allocate sufficient disk space to receive a file. APPE Append. AUTH RFC 2228 Authentication/Security Mechanism CCC RFC 2228 Clear Command Channel CDUP Change to Parent Directory. CONF RFC 2228 Confidentiality Protection Command
  • 18. Simple Mail Transfer Protocol(SMTP).  Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission.  First defined by RFC 821 in 1982, it was last updated in 2008 with the Extended SMTP additions by RFC 5321 —which is the protocol in
  • 19. History of SMTP.  Various forms of one-to-one electronic messaging were used in the 1960s. People communicated with one another using systems developed for specific mainframe computers.  As more computers were interconnected, especially in the US Government's ARPANET, standards were developed to allow users of different systems to email one another.
  • 20. How is the mail processed in SMTP? (model). Email is submitted by a mail client (MUA, mail user agent) to a mail server (MSA, mail submission agent) using SMTP on TCP port 587. Most mailbox providers still allow submission on traditional port 25. From there, the MSA delivers the mail to its mail transfer agent (MTA, mail transfer agent).
  • 21. Commands in SMTP. MAIL command, to establish the return address RCPT command, to establish a recipient of this message DATA to signal the beginning of
  • 22. TELNET • Telnet is an application layer protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. • The term telnet is also used to refer to the software that implements the client part of the protocol.
  • 23. History of TELNET. Telnet is a client-server protocol, based on a reliable connection-oriented transport. Typically, this protocol is used to establish a connection to Transmission Control Protocol(TCP) port number 23, where a Telnet server application is listening. Telnet is best understood in the context of a user with a simple terminal using the local Telnet program (known as the client program) to run a logon session on a
  • 24. Security in TELNET. Telnet, by default, does not encrypt any data sent over the connection (including passwords).  So it is often feasible to eavesdrop on the communications and use the password later for malicious purposes; anybody who has access to a router, switch, hub or gateway locate d on the network between the two hosts.
  • 25. List of various Protocols. WIFI/WIMAX Protocols Bluetooth protocol Fibre Channel network protocols Yahoo! Messenger, underlying protocol used by the Yahoo messenger RTPS protocol, an interoperability protocol SSH Secure Shell

Editor's Notes

  1. T