SlideShare a Scribd company logo
COMPUTER APPLICATIONS
CLASS X (Code 165)
TOPIC:
UNIT 1: Application Layer Protocols
By
HIMANSHU PATHAK
Contents
• Introduction
• Communication Protocol
• Mail Protocol
• File Transfer Protocol
• Remote Login Protocol
Introduction
• Application Layer uses protocols such as
HTTP(S) on client side applications like
browser.
• The application layer is responsible for
providing services to the user:
– Accessing the www
– Mail Services
– File Transfer and Access
– Remote Log-in
Communication Protocol: HTTP
• HTTP stands for Hyper-Text Transfer Protocol.
• HTTP is used mainly to access data on the world
wide web.
• HTTP provides standard rules for web browsers &
servers to communicate.
• An HTTP is a stateless protocol as each transaction
is executed separately without having any
knowledge of the previous transactions, which
means that once the transaction is completed
between the web browser and the server, the
connection gets lost.
Communication Protocol: HTTPS
• HTTPS stands for Hyper Text Transfer Protocol
Secure.
• It means all communications between your
browser and the website are encrypted.
• The use of HTTPS protocol is mainly required
where we need to enter the bank account
details.
• The HTTPS protocol is mainly used where we
require to enter the login credentials.
HTTP Vs. HTTPS
HTTP HTTPS
It is mainly used for those websites that
provide information like blog writing.
It is a secure protocol, so it is used for those
websites that require to transmit the bank
account details or credit card numbers.
The HTTP transmits the data over port
number 80.
The HTTPS transmits the data over port
number 443.
The page loading speed is fast.
The page loading speed is slow as compared
to HTTP because of the additional feature
that it supports, i.e., security.
It is an application layer protocol. It is a transport layer protocol.
It does not use SSL.
It uses SSL that provides the encryption of
the data.
Mail Protocol: SMTP
• SMTP stands for Simple Mail Transfer Protocol.
• SMTP is the standard mechanism for electronic
mail in the internet.
• The addressing system used by SMTP consists of
two parts: Local part & Domain part
• Local-part @ Domain-part
• The main purpose of SMTP is used to set up
communication rules between servers.
• Most email clients allow for transfers of up to 25
MB.
Mail Protocol: POP3
• The POP protocol stands for Post Office Protocol.
• POP3 is a client/server protocol in which e-mail is
received and held for you by your Internet server.
• Periodically, you (or your client e-mail receiver)
check your mail-box on the server and download
any mail, probably using POP3.
• This standard protocol is built into most popular
e-mail products, such as Eudora and Outlook
Express.
SMTP Vs. POP3
SMTP POP3
SMTP is used to send the email POP is used to receive email
SMTP acts as a MTA (Message Transfer
Agent)
POP3 is a MAA (Message Access Agent)
The port number of SMTP is 25. The port number of POP3 is 110.
File Transfer Protocol: FTP
• FTP stands for File Transfer Protocol.
• FTP is an application layer protocol which moves
files between local and remote file systems.
• FTP establishes two connections between the client
and the server:
– One connection is used for data transfer (port 20).
– And the other for control information (port 21).
• The control connection is maintained during the
entire FTP session while the data connection is
opened and then closed for each file transferred.
File Transfer Protocol: SFTP
• It stands for Secure File Transfer Protocol.
• It builds on the File Transfer Protocol (FTP) and
includes Secure Shell (SSH) security components.
• Secure Shell is a cryptographic component of
internet security.
• SSH and SFTP were designed by the Internet
Engineering Task Force (IETF) for greater web
security.
• SFTP transfers files security using SSH and encrypted
FTP commands to avoid password sniffing and
exposing sensitive information in plain text.
FTP Vs. SFTP
FTP SFTP
FTP uses 2 channels to transfer data SFTP usage 1 channel to transfer data
It usually runs on port no-21 It runs on port no-22
It does not encrypt the data before sending It encrypted data before sending
SCP
• SCP stands for Secure Copy Protocol.
• Secure copy (SCP) is a file transfer protocol,
which helps in transferring computer files
securely from a local host to a remote host.
• It works on the Secure Shell (SSH) protocol
technique.
• It doesn’t allow user to see and modify files on
the server.
SFTP Vs. SCP
SFTP SCP
SFTP is slow SCP is fast
SFTP has to ACK (acknowledge) every tiny
packet
SCP does not need to ACK (acknowledge)
SCP is built purely for file transfers. Generally
speaking, you can't generate directory
listings (to view files within a directory),
create directories, delete directories, delete
files, and so on.
SFTP, on the other hand, can readily perform
these operations on its own.
Remote Login Protocol: Telnet
• Telnet stands for Terminal Network.
• It is a type of protocol that enables one
computer to connect to local computer.
• Computer which starts connection known as
the local computer. Computer which is being
connected to i.e. which accepts the connection
known as remote computer.
• During telnet operation whatever that is
performing on the remote computer will be
displayed by local computer.
Remote Login Protocol: SSH
• The SSH protocol (also referred to as Secure
Shell) is a method for secure remote login from
one computer to another.
• It provides several alternative options for strong
authentication, and it protects the
communications security and integrity with
strong encryption.
• It is a secure alternative to the non-protected
login protocols (such as telnet) and insecure file
transfer methods (such as FTP).
Telnet Vs. SSH
TELNET SSH
Telnet uses port 23 SSH runs on port 22 by default
No privileges are provided for the user's
authentication.
SSH is a more secure protocol, so it uses
public-key encryption for authentication.
Suitable for private networks Suitable for public networks
Today we learn
• Communication protocols
• Remote login and file transfer protocols.
• In the next class, we will see Web Services in
detail.
•Thanks

More Related Content

What's hot

Isp
IspIsp
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notes
gouse_1210
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking concepts
jessandy
 
system Security
system Security system Security
system Security
Gaurav Mishra
 
Mobile generation presentation
Mobile generation presentationMobile generation presentation
Mobile generation presentation8neutron8
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentalsjpprakash
 
Open source operating systems
Open source operating systemsOpen source operating systems
Open source operating systems
Tushar B Kute
 
TELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMSTELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMS
junnubabu
 
Networking devices
Networking devicesNetworking devices
Networking devices
Mubassir Ambekar
 
IPv4
IPv4IPv4
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
TheGodfather HA
 
Network security
Network securityNetwork security
Network security
Estiak Khan
 
what is Private and publis ip address
what is Private and publis ip addresswhat is Private and publis ip address
what is Private and publis ip address
Amit Kumar , Jaipur Engineers
 
Network Types and Topologies
Network Types and TopologiesNetwork Types and Topologies
Network Types and Topologies
Christopher Brown
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
Latif Hyder Wadho
 
File transfer protocol
File transfer protocolFile transfer protocol
File transfer protocol
Vipin Rai
 
iso osi model
 iso osi model iso osi model
iso osi model
vishnu1204
 

What's hot (20)

Isp
IspIsp
Isp
 
Mobile Computing I-Unit Notes
Mobile Computing I-Unit NotesMobile Computing I-Unit Notes
Mobile Computing I-Unit Notes
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking concepts
 
system Security
system Security system Security
system Security
 
Mobile generation presentation
Mobile generation presentationMobile generation presentation
Mobile generation presentation
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
Network
NetworkNetwork
Network
 
Open source operating systems
Open source operating systemsOpen source operating systems
Open source operating systems
 
TELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMSTELECOMMUNICATIONS SYSTEMS
TELECOMMUNICATIONS SYSTEMS
 
Addressing
AddressingAddressing
Addressing
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
IPv4
IPv4IPv4
IPv4
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Network security
Network securityNetwork security
Network security
 
Mail server
Mail serverMail server
Mail server
 
what is Private and publis ip address
what is Private and publis ip addresswhat is Private and publis ip address
what is Private and publis ip address
 
Network Types and Topologies
Network Types and TopologiesNetwork Types and Topologies
Network Types and Topologies
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
 
File transfer protocol
File transfer protocolFile transfer protocol
File transfer protocol
 
iso osi model
 iso osi model iso osi model
iso osi model
 

Similar to Remote Login and File Transfer Protocols

APPLICATION LAYER PROTOCOLS .pptx
APPLICATION LAYER PROTOCOLS         .pptxAPPLICATION LAYER PROTOCOLS         .pptx
APPLICATION LAYER PROTOCOLS .pptx
ArnavPlayz
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
FabMinds
 
filetranferprotocolseminarpresentation.pptx
filetranferprotocolseminarpresentation.pptxfiletranferprotocolseminarpresentation.pptx
filetranferprotocolseminarpresentation.pptx
DSPL
 
Application Layer
Application LayerApplication Layer
Application Layer
Sweta Kumari Barnwal
 
Computer Networks
Computer NetworksComputer Networks
Computer NetworksShylesh BC
 
protocols (1).pptx
protocols (1).pptxprotocols (1).pptx
protocols (1).pptx
ALLIPURAMLAVANYA21K9
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
Rubal Sagwal
 
Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...
smitha273566
 
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their  DEFNITIONS BY NAVEEN.pptxTypes of Protocals and their  DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
NaveenreddyMeegada
 
Application Protocol
Application Protocol Application Protocol
Application Protocol
Chandnigupta80
 
internet protocol
internet protocolinternet protocol
internet protocol
rajshreemuthiah
 
Application layer and protocols of application layer
Application layer and protocols of application layerApplication layer and protocols of application layer
Application layer and protocols of application layer
Tahmina Shopna
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocolsPriyanka Shinde
 
Fit project
Fit projectFit project
Fit project
ajay raghavender
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
Varinder Singh Walia
 
application layer
application layerapplication layer
application layer
BishalWosti1
 
Vishal patel.pptx
Vishal patel.pptxVishal patel.pptx
Vishal patel.pptx
Vishalkumar605125
 
Internet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptxInternet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptx
Ramesh S P Ramesh
 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
nitashach22
 
Introduction to telnet
Introduction to telnetIntroduction to telnet
Introduction to telnet
RochakSrivastava3
 

Similar to Remote Login and File Transfer Protocols (20)

APPLICATION LAYER PROTOCOLS .pptx
APPLICATION LAYER PROTOCOLS         .pptxAPPLICATION LAYER PROTOCOLS         .pptx
APPLICATION LAYER PROTOCOLS .pptx
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
filetranferprotocolseminarpresentation.pptx
filetranferprotocolseminarpresentation.pptxfiletranferprotocolseminarpresentation.pptx
filetranferprotocolseminarpresentation.pptx
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
protocols (1).pptx
protocols (1).pptxprotocols (1).pptx
protocols (1).pptx
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...
 
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their  DEFNITIONS BY NAVEEN.pptxTypes of Protocals and their  DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
 
Application Protocol
Application Protocol Application Protocol
Application Protocol
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Application layer and protocols of application layer
Application layer and protocols of application layerApplication layer and protocols of application layer
Application layer and protocols of application layer
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocols
 
Fit project
Fit projectFit project
Fit project
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
application layer
application layerapplication layer
application layer
 
Vishal patel.pptx
Vishal patel.pptxVishal patel.pptx
Vishal patel.pptx
 
Internet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptxInternet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptx
 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
 
Introduction to telnet
Introduction to telnetIntroduction to telnet
Introduction to telnet
 

More from Himanshu Pathak

Introduction to E commerce
Introduction to E commerceIntroduction to E commerce
Introduction to E commerce
Himanshu Pathak
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
Himanshu Pathak
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
Himanshu Pathak
 
An Introduction to Cyber Ethics
An Introduction to Cyber EthicsAn Introduction to Cyber Ethics
An Introduction to Cyber Ethics
Himanshu Pathak
 
Cascading style sheet part 2
Cascading style sheet   part 2Cascading style sheet   part 2
Cascading style sheet part 2
Himanshu Pathak
 
Cascading style sheet an introduction
Cascading style sheet   an introductionCascading style sheet   an introduction
Cascading style sheet an introduction
Himanshu Pathak
 
Html multimedia
Html multimediaHtml multimedia
Html multimedia
Himanshu Pathak
 
Html forms
Html formsHtml forms
Html forms
Himanshu Pathak
 
Html tables
Html tablesHtml tables
Html tables
Himanshu Pathak
 
Html link and list tags
Html link and list tagsHtml link and list tags
Html link and list tags
Himanshu Pathak
 
HTML Text formatting tags
HTML Text formatting tagsHTML Text formatting tags
HTML Text formatting tags
Himanshu Pathak
 
Basic html tags
Basic html tagsBasic html tags
Basic html tags
Himanshu Pathak
 
Introduction to html
Introduction to htmlIntroduction to html
Introduction to html
Himanshu Pathak
 
Mobile technologies
Mobile technologiesMobile technologies
Mobile technologies
Himanshu Pathak
 
Web services
Web servicesWeb services
Web services
Himanshu Pathak
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
Himanshu Pathak
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
Himanshu Pathak
 
What is Computer?
What is Computer?What is Computer?
What is Computer?
Himanshu Pathak
 

More from Himanshu Pathak (18)

Introduction to E commerce
Introduction to E commerceIntroduction to E commerce
Introduction to E commerce
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
An Introduction to Cyber Ethics
An Introduction to Cyber EthicsAn Introduction to Cyber Ethics
An Introduction to Cyber Ethics
 
Cascading style sheet part 2
Cascading style sheet   part 2Cascading style sheet   part 2
Cascading style sheet part 2
 
Cascading style sheet an introduction
Cascading style sheet   an introductionCascading style sheet   an introduction
Cascading style sheet an introduction
 
Html multimedia
Html multimediaHtml multimedia
Html multimedia
 
Html forms
Html formsHtml forms
Html forms
 
Html tables
Html tablesHtml tables
Html tables
 
Html link and list tags
Html link and list tagsHtml link and list tags
Html link and list tags
 
HTML Text formatting tags
HTML Text formatting tagsHTML Text formatting tags
HTML Text formatting tags
 
Basic html tags
Basic html tagsBasic html tags
Basic html tags
 
Introduction to html
Introduction to htmlIntroduction to html
Introduction to html
 
Mobile technologies
Mobile technologiesMobile technologies
Mobile technologies
 
Web services
Web servicesWeb services
Web services
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
What is Computer?
What is Computer?What is Computer?
What is Computer?
 

Recently uploaded

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 

Recently uploaded (20)

Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 

Remote Login and File Transfer Protocols

  • 1. COMPUTER APPLICATIONS CLASS X (Code 165) TOPIC: UNIT 1: Application Layer Protocols By HIMANSHU PATHAK
  • 2. Contents • Introduction • Communication Protocol • Mail Protocol • File Transfer Protocol • Remote Login Protocol
  • 3. Introduction • Application Layer uses protocols such as HTTP(S) on client side applications like browser. • The application layer is responsible for providing services to the user: – Accessing the www – Mail Services – File Transfer and Access – Remote Log-in
  • 4. Communication Protocol: HTTP • HTTP stands for Hyper-Text Transfer Protocol. • HTTP is used mainly to access data on the world wide web. • HTTP provides standard rules for web browsers & servers to communicate. • An HTTP is a stateless protocol as each transaction is executed separately without having any knowledge of the previous transactions, which means that once the transaction is completed between the web browser and the server, the connection gets lost.
  • 5. Communication Protocol: HTTPS • HTTPS stands for Hyper Text Transfer Protocol Secure. • It means all communications between your browser and the website are encrypted. • The use of HTTPS protocol is mainly required where we need to enter the bank account details. • The HTTPS protocol is mainly used where we require to enter the login credentials.
  • 6. HTTP Vs. HTTPS HTTP HTTPS It is mainly used for those websites that provide information like blog writing. It is a secure protocol, so it is used for those websites that require to transmit the bank account details or credit card numbers. The HTTP transmits the data over port number 80. The HTTPS transmits the data over port number 443. The page loading speed is fast. The page loading speed is slow as compared to HTTP because of the additional feature that it supports, i.e., security. It is an application layer protocol. It is a transport layer protocol. It does not use SSL. It uses SSL that provides the encryption of the data.
  • 7. Mail Protocol: SMTP • SMTP stands for Simple Mail Transfer Protocol. • SMTP is the standard mechanism for electronic mail in the internet. • The addressing system used by SMTP consists of two parts: Local part & Domain part • Local-part @ Domain-part • The main purpose of SMTP is used to set up communication rules between servers. • Most email clients allow for transfers of up to 25 MB.
  • 8. Mail Protocol: POP3 • The POP protocol stands for Post Office Protocol. • POP3 is a client/server protocol in which e-mail is received and held for you by your Internet server. • Periodically, you (or your client e-mail receiver) check your mail-box on the server and download any mail, probably using POP3. • This standard protocol is built into most popular e-mail products, such as Eudora and Outlook Express.
  • 9. SMTP Vs. POP3 SMTP POP3 SMTP is used to send the email POP is used to receive email SMTP acts as a MTA (Message Transfer Agent) POP3 is a MAA (Message Access Agent) The port number of SMTP is 25. The port number of POP3 is 110.
  • 10. File Transfer Protocol: FTP • FTP stands for File Transfer Protocol. • FTP is an application layer protocol which moves files between local and remote file systems. • FTP establishes two connections between the client and the server: – One connection is used for data transfer (port 20). – And the other for control information (port 21). • The control connection is maintained during the entire FTP session while the data connection is opened and then closed for each file transferred.
  • 11. File Transfer Protocol: SFTP • It stands for Secure File Transfer Protocol. • It builds on the File Transfer Protocol (FTP) and includes Secure Shell (SSH) security components. • Secure Shell is a cryptographic component of internet security. • SSH and SFTP were designed by the Internet Engineering Task Force (IETF) for greater web security. • SFTP transfers files security using SSH and encrypted FTP commands to avoid password sniffing and exposing sensitive information in plain text.
  • 12. FTP Vs. SFTP FTP SFTP FTP uses 2 channels to transfer data SFTP usage 1 channel to transfer data It usually runs on port no-21 It runs on port no-22 It does not encrypt the data before sending It encrypted data before sending
  • 13. SCP • SCP stands for Secure Copy Protocol. • Secure copy (SCP) is a file transfer protocol, which helps in transferring computer files securely from a local host to a remote host. • It works on the Secure Shell (SSH) protocol technique. • It doesn’t allow user to see and modify files on the server.
  • 14. SFTP Vs. SCP SFTP SCP SFTP is slow SCP is fast SFTP has to ACK (acknowledge) every tiny packet SCP does not need to ACK (acknowledge) SCP is built purely for file transfers. Generally speaking, you can't generate directory listings (to view files within a directory), create directories, delete directories, delete files, and so on. SFTP, on the other hand, can readily perform these operations on its own.
  • 15. Remote Login Protocol: Telnet • Telnet stands for Terminal Network. • It is a type of protocol that enables one computer to connect to local computer. • Computer which starts connection known as the local computer. Computer which is being connected to i.e. which accepts the connection known as remote computer. • During telnet operation whatever that is performing on the remote computer will be displayed by local computer.
  • 16. Remote Login Protocol: SSH • The SSH protocol (also referred to as Secure Shell) is a method for secure remote login from one computer to another. • It provides several alternative options for strong authentication, and it protects the communications security and integrity with strong encryption. • It is a secure alternative to the non-protected login protocols (such as telnet) and insecure file transfer methods (such as FTP).
  • 17. Telnet Vs. SSH TELNET SSH Telnet uses port 23 SSH runs on port 22 by default No privileges are provided for the user's authentication. SSH is a more secure protocol, so it uses public-key encryption for authentication. Suitable for private networks Suitable for public networks
  • 18. Today we learn • Communication protocols • Remote login and file transfer protocols. • In the next class, we will see Web Services in detail. •Thanks