Application Layer Protocols

Size: px
Start display at page:

Download "Application Layer Protocols"

Transcription

1 Application Layer Protocols Network Applications Requirements Application Layer Protocol Functions. Sample Internet Applications & Protocols: File Transfer Protocol (FTP). Sending SMTP. HyperText Transfer Protocol (HTTP). Domain Name System (DNS) #1 lec #15 Spring

2 Network Applications & Application Layer Protocols The development of numerous network applications and the associated application-layer protocols has been a major driving force for computer network advancements over the past 30 years. The range of such diverse applications include: Text-based applications such as telnet, electronic mail, file transfer, newsgroups, most popular in the 70 s-80 s. More recent graphics- and multimedia-based applications such as the World Wide Web (the Internet s killer-app), Internet telephony, video conferencing, and streaming audio/video on demand, and interactive games. #2 lec #15 Spring

3 Common Network Applications Requirements Application Type Data Loss Bandwidth Requirements Latency sensitivity File transfer No loss Variable none Web documents No loss Variable none Real-time audio/video Loss-tolerant Audio: few Kbps to 1Mbpsyes 100's of msec Video: 10's Kbps to 5 Mbps Stored audio/video Loss-tolerant Same as interactive audio/video few seconds Interactive games Loss-tolerant Few Kbps to 10's Kbps 100's msecs Financial applications No loss Variable Application-dependent #3 lec #15 Spring

4 Application Layer Protocols An application layer protocol defines how an application processes (clients and servers), running on different end systems, pass messages to each other. In particular, an application layer protocol defines: The types of messages, e.g., request messages and response messages. The syntax of the various message types, i.e., the fields in the message and how the fields are delineated. The semantics of the fields, i.e., the meaning of the information that the field is supposed to contain; Rules for determining when and how a process sends messages and responds to messages. Many Internet application-layer protocols are fully specified in Request For Comments documents (RFCs) and are therefore in the public domain. For example, the HTTP 1.1 specification is included in RFC 2068, which was finalized and made public January If a browser (HTTP client) developer follows the rules of the HTTP 1.1 RFC, the browser will be able to retrieve Web pages from any Web server that has also has followed the rules of the HTTP 1.1 RFC. #4 lec #15 Spring

5 Structure of Internet Applications Using TCP & The Sockets API Client Server One or more TCP connections Request or Command Server Reply or Response #5 lec #15 Spring

6 Sample Internet Applications Application Type Application-layer protocol Transport Protocol Used/Port Electronic mail SMTP [RFC 821] Send: Simple Mail Transfer Protocol TCP 25 Receive: Post Office Protocol v3 TCP 110 POP3 [RCF 1939] Remote terminal access Telnet [RFC 854] TCP 23 World Wide Web (WWW) HyperText Transfer Protocol 1.1 TCP 80 HTTP 1.1 [RFC 2068] File Transfer FTP [RFC 959] File Transfer Protocol TCP 21 Trivial File Transfer Protocol UDP 69 TFTP [RFC 1350] Remote file server NFS [McKusik 1996] UDP or TCP Streaming multimedia Proprietary (e.g., Real Networks) UDP or TCP Internet telephony Proprietary (e.g., Vocaltec) Usually UDP #6 lec #15 Spring

7 Common Network/System Services & Ports Port Number Process Name Description 1 TCPMUX TCP Port Service Multiplexer 5 RJE Remote Job Entry 7 ECHO Echo 9 DISCARD Discard 11 USERS Active Users 13 DAYTIME Daytime 17 Quote Quotation of the Day 19 CHARGEN Character generator 20 FTP-DATA File Transfer Protocol - Data 21 FTP File Transfer Protocol - Control 23 TELNET Telnet 25 SMTP Simple Mail Transfer Protocol 27 NSW-FE NSW User System Front End 29 MSG-ICP MSG-ICP 31 MSG-AUTH MSG Authentication 33 DSP Display Support Protocol 35 Private Print Servers 37 TIME Time 39 RLP Resource Location Protocol 41 GRAPHICS Graphics 42 NAMESERV Host Name Server 43 NICNAME Who Is 49 LOGIN Login Host Protocol 53 DOMAIN Domain Name Server 67 BOOTPS Bootstrap Protocol Server 68 BOOTPC Bootstrap Protocol Client #7 lec #15 Spring

8 Common Network/System Services & Ports Port Number Process Name Description 69 TFTP Trivial File Transfer Protocol 79 FINGER Finger 80 HTTP HyperText Transfer Protocol 101 HOSTNAME NIC Host Name Server 102 ISO-TSAP ISO TSAP 103 X400 X X400SND X.400 SND 105 CSNET-NS CSNET Mailbox Name Server 109 POP2 Post Office Protocol v2 110 POP3 Post Office Protocol v3 111 RPC Sun RPC Portmap 119 NNTP Network News Transfer Protocol 137 NETBIOS-NS NETBIOS Name Server 138 NETBIOS-DG NETBIOS Datagram Service 139 NETBIOS-SS NETBIOS Session Service 146 ISO-TP0 ISO TP0 147 ISO-IP ISO IP 150 SQL-NET SQL NET 153 SGMP SGMP 156 SQLSRV SQL Service 160 SGMP-TRAPS SGMP TRAPS 161 SNMP Simple Network Management Protocol 162 SNMPTRAP SNMPTRAP 163 CMIP-MANAGE CMIP/TCP Manager 164 CMIP-AGENT CMIP/TCP Agent 165 XNS-Courier Xerox 179 BGP Border Gateway Protocol #8 lec #15 Spring

9 File Transfer Protocol (FTP), RFC 595 A protocol dating back to 1971 used for transferring files between hosts. In a typical FTP session: The user first provides the hostname of the remote host. The FTP client process in the local host establishes a control TCP connection with the FTP server process in the remote host on port 21. The user then provides the user identification and password, which get sent over this TCP connection as part of the FTP commands. Once the server has authorized the user, for each file to be transferred, FTP opens a data TCP connection on server port 20 which is used to transfer the file and is closed once the transfer is completed. #9 lec #15 Spring

10 Common FTP Commands and Replies FTP commands, from client to server, and replies, from server to client, are sent across the control TCP connection encoded in 7-bit ASCII. In order to delineate successive commands, a carriage return and a line feed end each command (and reply). Commands consist of four uppercase ASCII characters, some with optional arguments. Some of the more common commands are given below (with options in italics): USER username : Used to send the user identification to server. PASS password : Used to send the user password to the server. LIST : Used to ask the server to send back a list of all the files in the current remote directory. The list of files is sent over a (new and non-persistent) data TCP connection and not over the control TCP connection. RETR filename : Used to get a file from the current directory of the remote host. STOR filename : Used to store a file into the current directory of the remote host. There is typically a one-to-one correspondence between the commands the user issues and the FTP command sent across the TCP control connection. Each command is followed by a reply, sent from server to client. Replies are three-digit numbers, with an optional message following the number. message; Typical replies along with possible messages are as follows: 331 Username OK, password required 125 Data connection already open; transfer starting 425 Can't open data connection 452 Error writing file #10 lec #15 Spring

11 Sending Electronic Mail: Simple Mail Transfer Protocol (SMTP), RFC 821 SMTP transfers messages from senders' mail servers to the recipients' mail servers using TCP connections. SMPT existed long before it was fully specified by RFC 821 in Following the client/server model: SMTP has two sides: a client side which executes on a sender's mail server, and server side which executes on recipient's mail server. Both the client and server sides of SMTP run on every mail server. When a mail server sends mail (to other mail servers), it acts as an SMTP client. When a mail server receives mail (from other mail servers) it acts as an SMTP server. The process of sending a message: A user agent (mail reader) is used to create a message to be sent. The user agent directs the message to the outgoing message queue in the user's local mail server (acting as an SMTP client). The local mail server (SMTP client) opens a TCP connection directly to the remote destination SMTP mail server. After initial SMTP handshaking, the SMTP client sends the 7-bit ASCII encoded message into the TCP connection. The remote SMTP server receives the message over the TCP connection, closes the connection and places the message in the receipt's mailbox. #11 lec #15 Spring

12 The Internet Mail System All messages must be 7-bit ASCII Encoded #12 lec #15 Spring

13 Once the SMTP client (sender) established a TCP connection to the remote receiving SMTP server, the following is sent into the connection: Example Transaction Between An SMTP Client & Server Server: 220 receive.edu Client: HELO send.edu Server: 250 Hello send.edu, pleased to meet you Client: MAIL FROM: <sender-user@send.edu> Server: 250 sender-user@send.edu... Sender ok Client: RCPT TO: <receiver-user@receive.edu> Server: 250 receiver-user@receive.edu... Recipient ok Client: DATA Server: 354 Enter mail, end with "." on a line by itself Client: First line of message in seven-bit ASCII Client: Second and last line of example message. Client:. Server : 250 Message accepted for delivery Client: QUIT Server: 221 receive.edu closing connection #13 lec #15 Spring

14 Multipurpose Internet Mail Extensions (MIME) SMTP can only handle ASCII-encoded messages, hence binary data is first encoded to ASCII in such a way that certain ASCII characters (including ".") are not used, using base64 encoding for example. If binary data is included in a message MIME headers are used to inform the receiving mail agent: Content-Transfer-Encoding: header. Alerts the receiving user agent that the message body has been ASCII encoded and the type of encoding used. Content-Type: header. Informs the receiving mail agent about the type of data included in the message. Example message header when a base64-encoded JPEG image is included in the body of the message: From: sender-user@send.edu To: receiver-user@receive.edu Subject: A picture. MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Type: image/jpeg base64 encoded data base64 encoded data #14 lec #15 Spring

15 MIME Document Types/Subtypes Examples The content type of a document is described in the MIME Content-Type: header using a standard list of document types and subtypes. A few are shown here. File text html Jpeg Wav MPEG pdf VRML MIME Type/Sub-type text/plain text/html image/jpeg audio/x-wav video/mpeg application/pdf x-world/x-vrml #15 lec #15 Spring

16 The World Wide Web (WWW): HyperText Transfer Protocol (HTTP) The WWW was practically invented at CERN by Tim Berners-Lee and associates in when initial versions of HTML, HTTP, a Web server and a crude text-based browser (Web client) were developed. Marc Andreeseen, who helped to develop the popular GUI browser Mosaic for X at The National Center for Supercomputing Applications (NCSA), released an alpha version of his browser in 1993, and in 1994 formed Mosaic Communications which later became Netscape. The Hypertext Transfer Protocol (HTTP) the Web's main application-layer protocol although current browsers can access other types of servers. As are most application-layer protocols, HTTP is implemented in two programs: a client program: Web browser and server program: Web server that talk to each other by exchanging HTTP messages. HTTP defines the structure of these messages and how the client and server exchange the messages. HTTP utilizes TCP connections to send client requests and server replies. Current HTTP version: HTTP 1.1 (RFC 2068) January 97, adds among other enhancements persistent connections to transfer several objects per connection. #16 lec #15 Spring

17 HTML Document HTTP HTML Web Servers Web Clients Web Clients Web Server e.g. jasmine.isc.rit.edu:8000 Web server running on non-standard port Components of The Web Model #17 lec #15 Spring

18 Common HTML Tags #18 lec #15 Spring

19 Uniform Resource Locators (URLs) Web browsers may utilize several high level protocols to request data from a variety of servers in addition to HTTP servers. A uniform source locator (URL) specifies the following: Protocol used. Host name, alias, or IP address. Port number (if different from the default protocol port). Path to data requested. Resource requested (usually a file name). A few types of URLs: http e.g. FTP ftp://hostname:port/path/file e.g. ftp://beast.isc.rit.edu:25 Local file file:///path/file e.g. file:///my_files/file1.txt Telnet telnet://hostname:port e.g. telnet:// jasmine.isc.rit.edu gopher gopher://hostname/path/ news news://hostname:port #19 lec #15 Spring

20 Steps of Transferring A Web Page From Server To Client Using Non-Persistent TCP Connections 1. The HTTP client initiates a TCP connection to the server 2. The HTTP client sends a HTTP request message into the TCP connection. The request message either includes the entire URL or simply the path name /~meseec/eecc694-spring2000/index.html. 3. The HTTP server receives the request message, retrieves the object /~meseec/eecc694-spring2000/index.html from its storage, encapsulates the object in a HTTP response message, and sends the response message into the TCP connection. 4. The HTTP server tells TCP to close the TCP connection. (TCP doesn't terminate the connection until the client has received the response message) 5. The HTTP client receives the response message. The message indicates that the encapsulated object is an HTML file. The client extracts the file from the response message, parses the HTML file and finds references to a number of JPEG and GIF objects. 6. The first four steps are then repeated for each of the referenced JPEG and GIF objects. #20 lec #15 Spring

21 HTTP Message Examples Typical Request Message From A Client: GET /eecc694-spring2000/index.html HTTP/1.0 Connection: close User-agent: Mozilla/4.72 [en] (Win98; I) Accept: text/html, image/gif, image/jpeg Accept-language:en (extra carriage return, line feed) Typical Response Message From A Server: HTTP/ OK Connection: close Date: Wed, 05 April :00:15 GMT Server: NCSA/1.5.2 Last-Modified: Tue, 25 April :23:24 GMT Content-Length: Content-Type: text/html data data and more data... #21 lec #15 Spring

22 HTTP Message Formats: General Format of A Request Message Messages encoded in standard ASCII text. Method: GET, POST, and HEAD. The great majority of HTTP request messages use the GET method. The GET method is used when the browser requests an object, with the object identified in the URL. POST is used when the client user fills out a form. URL: No need to include server hostname since the TCP connection is already connected to the server. Version: HTTP version number used. (e.g. HTTP/1.0 or HTTP/1.1) Entity Body: Not used in the GET method, form data included in POST method. Space Line feed Carriage Return Connection: close, to request non-persistent TCP connections. User-agent: Browser used. Accept: type of objects the browser is prepared to accept Accept-language: #22 lec #15 Spring

23 HTTP Message Formats: General Format of A Response Message Version: HTTP version number used (e.g. HTTP/1.0 or HTTP/1.1). Status code and associated phrase indicate the result of the request. Some example status codes and associated phrases include: 200 OK: Request succeeded and the information is returned in the response. 301 Moved Permanently: Requested object has been permanently moved; new URL is specified in Location: header of the response message. The client software will automatically retrieve the new URL. 400 Bad Request: A generic error code indicating that the request could not be understood by the server. 404 Not Found: The requested document does not exist 505 HTTP Version Not Supported: The request HTTP protocol version is not supported by the server. Entity Body: The requested object if the response is successful. Connection: close for non-persistent TCP connections. Date: Current GMT date Server: Server type used Last-Modified: of object Content-Length: of object Content-Type: MIME Type/sub-type of object #23 lec #15 Spring

24 Domain Name System (DNS) DNS is a hierarchical system, based on a distributed database, that uses a hierarchy of Name Servers to resolve Internet host names into the corresponding IP addresses required for packet routing by issuing a DNS query to a name server. Name servers are usually Unix machines running the Berkeley Internet Name Domain (BIND) software. On many Unix-based machines using the sockets-api, gethostbyname() is the library routine that an application calls in order to issue a DNS query. Resource record: Associated with each host on the Internet, includes IP address, domain name, domain name server, etc. When resolving a host name, DNS returns the associated resource record of the host. Internet domain names are divided into generic top-level domains (edu, com, gov, mil) which include all US domains and country domains. The DNS space is divided into non-overlapping zones. Resource records of all hosts in a sub-domain are kept as a DNS database stored at the domain name server responsible for that sub-domain or zone. #24 lec #15 Spring

25 Principal DNS Resource Record Types #25 lec #15 Spring

26 A Partial DNS Database #26 lec #15 Spring

27 Zone Division of DNS Name Space #27 lec #15 Spring

28 #28 lec #15 Spring

29 Recursive DNS Queries Example A two-level name server hierarchy is shown here as an example. In reality, several levels of name servers may be queried recursively. Hostname to be resolved A network application running on beast.isc.rit.edu issues a DNS query using gethostbyname()to resolve hostname halcyon.usc.edu Returns DNS Resource recordfor halcyon.usc.edu including IP address(s) #29 lec #15 Spring

1 Introduction: Network Applications

1 Introduction: Network Applications 1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video

More information

Network Technologies

Network Technologies Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:

More information

CPSC 360 - Network Programming. Email, FTP, and NAT. http://www.cs.clemson.edu/~mweigle/courses/cpsc360

CPSC 360 - Network Programming. Email, FTP, and NAT. http://www.cs.clemson.edu/~mweigle/courses/cpsc360 CPSC 360 - Network Programming E, FTP, and NAT Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu April 18, 2005 http://www.cs.clemson.edu/~mweigle/courses/cpsc360

More information

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP - Message Format. The Client/Server model is used:

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP - Message Format. The Client/Server model is used: Evolution of the WWW Communication in the WWW World Wide Web (WWW) Access to linked documents, which are distributed over several computers in the History of the WWW Origin 1989 in the nuclear research

More information

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP Abstract Message Format. The Client/Server model is used:

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP Abstract Message Format. The Client/Server model is used: Evolution of the WWW Communication in the WWW World Wide Web (WWW) Access to linked documents, which are distributed over several computers in the History of the WWW Origin 1989 in the nuclear research

More information

The Web: some jargon. User agent for Web is called a browser: Web page: Most Web pages consist of: Server for Web is called Web server:

The Web: some jargon. User agent for Web is called a browser: Web page: Most Web pages consist of: Server for Web is called Web server: The Web: some jargon Web page: consists of objects addressed by a URL Most Web pages consist of: base HTML page, and several referenced objects. URL has two components: host name and path name: User agent

More information

1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?

1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet

More information

FTP and email. Computer Networks. FTP: the file transfer protocol

FTP and email. Computer Networks. FTP: the file transfer protocol Computer Networks and email Based on Computer Networking, 4 th Edition by Kurose and Ross : the file transfer protocol transfer file to/from remote host client/ model client: side that initiates transfer

More information

TCP/UDP # General Name Short Description

TCP/UDP # General Name Short Description This appendix is designed to provide general information about service ports that are discovered on IP networks. Outlined are ports 1-80, along with many other common higher ports and specific ports found

More information

FTP: the file transfer protocol

FTP: the file transfer protocol FTP: the file transfer protocol at host FTP interface FTP client local file system file transfer FTP remote file system transfer file to/from remote host client/ model client: side that initiates transfer

More information

Protocolo FTP. FTP: Active Mode. FTP: Active Mode. FTP: Active Mode. FTP: the file transfer protocol. Separate control, data connections

Protocolo FTP. FTP: Active Mode. FTP: Active Mode. FTP: Active Mode. FTP: the file transfer protocol. Separate control, data connections : the file transfer protocol Protocolo at host interface local file system file transfer remote file system utilizes two ports: - a 'data' port (usually port 20...) - a 'command' port (port 21) SISTEMAS

More information

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) 2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file

More information

Chapter 2 Application Layer. Lecture 5 FTP, Mail. Computer Networking: A Top Down Approach

Chapter 2 Application Layer. Lecture 5 FTP, Mail. Computer Networking: A Top Down Approach Chapter 2 Application Layer Lecture 5 FTP, Mail Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Chapter 2: outline 2.1 principles

More information

Computer Networks. Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se

Computer Networks. Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se Computer Networks Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se Notes derived from Computer Networking: A Top Down Approach, by Jim Kurose and Keith Ross, Addison-Wesley. The slides are adapted

More information

The Application Layer. CS158a Chris Pollett May 9, 2007.

The Application Layer. CS158a Chris Pollett May 9, 2007. The Application Layer CS158a Chris Pollett May 9, 2007. Outline DNS E-mail More on HTTP The Domain Name System (DNS) To refer to a process on the internet we need to give an IP address and a port. These

More information

FTP: the file transfer protocol

FTP: the file transfer protocol File Transfer: FTP FTP: the file transfer protocol at host FTP interface FTP client local file system file transfer FTP remote file system transfer file to/from remote host client/ model client: side that

More information

Applications and Services. DNS (Domain Name System)

Applications and Services. DNS (Domain Name System) Applications and Services DNS (Domain Name Service) File Transfer Protocol (FTP) Simple Mail Transfer Protocol (SMTP) Malathi Veeraraghavan Distributed database used to: DNS (Domain Name System) map between

More information

Application Example: WWW. Communication in the WWW. WWW, HTML, URL and HTTP. Loading of Web Pages. The Client/Server model is used in the WWW

Application Example: WWW. Communication in the WWW. WWW, HTML, URL and HTTP. Loading of Web Pages. The Client/Server model is used in the WWW Application Example WWW Communication in the WWW In the following application protocol examples for WWW and E-Mail World Wide Web (WWW) Access to linked documents, which are distributed over several computers

More information

HTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology

HTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common

More information

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) 2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file

More information

Internet Technology 2/13/2013

Internet Technology 2/13/2013 Internet Technology 03r. Application layer protocols: email Email: Paul Krzyzanowski Rutgers University Spring 2013 1 2 Simple Mail Transfer Protocol () Defined in RFC 2821 (April 2001) Original definition

More information

Email Electronic Mail

Email Electronic Mail Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing

More information

Introduction to LAN/WAN. Application Layer (Part II)

Introduction to LAN/WAN. Application Layer (Part II) Introduction to LAN/WAN Application Layer (Part II) Application Layer Topics Domain Name System (DNS) (7.1) Electronic Mail (Email) (7.2) World Wide Web (WWW) (7.3) Electronic Mail (Email) Mostly used

More information

Chapter 27 Hypertext Transfer Protocol

Chapter 27 Hypertext Transfer Protocol Chapter 27 Hypertext Transfer Protocol Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 27-1 Overview Hypertext language and protocol HTTP messages Browser architecture CGI

More information

WHAT IS A WEB SERVER?

WHAT IS A WEB SERVER? 4663ch01.qxd_lb 12/2/99 12:54 PM Page 1 CHAPTER 1 WHAT IS A WEB SERVER? Never trust a computer you can t throw out a window. Steve Wozniak CHAPTER OBJECTIVES In this chapter you will learn about: Client/Server

More information

Application-layer Protocols and Internet Services

Application-layer Protocols and Internet Services Application-layer Protocols and Internet Services Computer Networks Lecture 8 http://goo.gl/pze5o8 Terminal Emulation 2 Purpose of Telnet Service Supports remote terminal connected via network connection

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt 1 Lecture 10: Application Layer 2 Application Layer Where our applications are running Using services provided by

More information

What really is a Service?

What really is a Service? Internet Services What really is a Service? On internet (network of networks), computers communicate with one another. Users of one computer can access services from another. You can use many methods to

More information

Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)

Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT) Internet Technologies World Wide Web (WWW) Proxy Server Network Address Translator (NAT) What is WWW? System of interlinked Hypertext documents Text, Images, Videos, and other multimedia documents navigate

More information

Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview

Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview Web and HTTP Protocolo HTTP Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio file, Web page consists of base HTML-file which includes several referenced objects Each

More information

Remote login (Telnet):

Remote login (Telnet): SFWR 4C03: Computer Networks and Computer Security Feb 23-26 2004 Lecturer: Kartik Krishnan Lectures 19-21 Remote login (Telnet): Telnet permits a user to connect to an account on a remote machine. A client

More information

Internet Services. Sadiq M. Sait, Ph.D

Internet Services. Sadiq M. Sait, Ph.D Internet Services Sadiq M. Sait, Ph.D sadiq@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia Internet Short Course 1-1 What really

More information

Distributed Systems. 2. Application Layer

Distributed Systems. 2. Application Layer Distributed Systems 2. Application Layer Werner Nutt 1 Network Applications: Examples E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Social

More information

The exam has 110 possible points, 10 of which are extra credit. There is a Word Bank on Page 8. Pages 7-8 can be removed from the exam.

The exam has 110 possible points, 10 of which are extra credit. There is a Word Bank on Page 8. Pages 7-8 can be removed from the exam. CS326e Spring 2014 Midterm Exam Name SOLUTIONS UTEID The exam has 110 possible points, 10 of which are extra credit. There is a Word Bank on Page 8. Pages 7-8 can be removed from the exam. 1. [4 Points]

More information

Domain Name System (DNS)

Domain Name System (DNS) Application Layer Domain Name System Domain Name System (DNS) Problem Want to go to www.google.com, but don t know the IP address Solution DNS queries Name Servers to get correct IP address Essentially

More information

Basic Network Configuration

Basic Network Configuration Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the

More information

Today s Lecture. 18-345: Introduction to Telecommunication Networks Lectures 2: Protocol Stack. Applications and Application Protocols

Today s Lecture. 18-345: Introduction to Telecommunication Networks Lectures 2: Protocol Stack. Applications and Application Protocols Today s Lecture 18-345: Introduction to Telecommunication Networks Lectures 2: Protocol Stack Peter Steenkiste Spring 2015 www.cs.cmu.edu/~prs/nets-ece Network applications Requirements Latency and bandwidth

More information

Email, SNMP, Securing the Web: SSL

Email, SNMP, Securing the Web: SSL Email, SNMP, Securing the Web: SSL 4 January 2015 Lecture 12 4 Jan 2015 SE 428: Advanced Computer Networks 1 Topics for Today Email (SMTP, POP) Network Management (SNMP) ASN.1 Secure Sockets Layer 4 Jan

More information

World Wide Web. Before WWW

World Wide Web. Before WWW World Wide Web Joao.Neves@fe.up.pt Before WWW Major search tools: Gopher and Archie Archie Search FTP archives indexes Filename based queries Gopher Friendly interface Menu driven queries João Neves 2

More information

Network Applications

Network Applications Computer Networks Network Applications Based on Computer Networking, 3 rd Edition by Kurose and Ross Network applications Sample applications E-mail Web Instant messaging Remote login P2P file sharing

More information

CONTENT of this CHAPTER

CONTENT of this CHAPTER CONTENT of this CHAPTER v DNS v HTTP and WWW v EMAIL v SNMP 3.2.1 WWW and HTTP: Basic Concepts With a browser you can request for remote resource (e.g. an HTML file) Web server replies to queries (e.g.

More information

CS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol

CS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol CS640: Introduction to Computer Networks Aditya Akella Lecture 4 - Application Protocols, Performance Applications FTP: The File Transfer Protocol user at host FTP FTP user client interface local file

More information

Data Communication I

Data Communication I Data Communication I Urban Bilstrup (E327) 090901 Urban.Bilstrup@ide.hh.se www2.hh.se/staff/urban Internet - Sweden, Northern Europe SUNET NORDUnet 2 Internet - Internet Addresses Everyone should be able

More information

Principles of Network Applications. Dr. Philip Cannata

Principles of Network Applications. Dr. Philip Cannata Principles of Network Applications Dr. Philip Cannata 1 Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers).

More information

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department

More information

Application Layer. CMPT371 12-1 Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2

Application Layer. CMPT371 12-1 Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2 CMPT371 12-1 Application Layer 1 Application Layer Required Reading: Chapter 2 of the text book. Outline of Chapter 2 Network applications HTTP, protocol for web application FTP, file transfer protocol

More information

The Application Layer: DNS

The Application Layer: DNS Recap SMTP and email The Application Layer: DNS Smith College, CSC 9 Sept 9, 0 q SMTP process (with handshaking) and message format q Role of user agent access protocols q Port Numbers (can google this)

More information

CSCI-1680 SMTP Chen Avin

CSCI-1680 SMTP Chen Avin CSCI-1680 Chen Avin Based on Computer Networking: A Top Down Approach - 6th edition Electronic Three major components: s s simple transfer protocol: User Agent a.k.a. reader composing, editing, reading

More information

Revised: 14-Nov-07. Inmarsat Fleet from Stratos MPDS Firewall Service Version 1.0

Revised: 14-Nov-07. Inmarsat Fleet from Stratos MPDS Firewall Service Version 1.0 Revised: 14-Nov-07 Inmarsat Fleet from Stratos MPDS Firewall Service Version 1.0 2 / 16 This edition of the User Manual has been updated with information available at the date of issue. This edition supersedes

More information

TCP/IP Networking An Example

TCP/IP Networking An Example TCP/IP Networking An Example Introductory material. This module illustrates the interactions of the protocols of the TCP/IP protocol suite with the help of an example. The example intents to motivate the

More information

http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm

http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm Client/Server paradigm As we know, the World Wide Web is accessed thru the use of a Web Browser, more technically known as a Web Client. 1 A Web Client makes requests of a Web Server 2, which is software

More information

The Web History (I) The Web History (II)

The Web History (I) The Web History (II) Goals of Today s Lecture EE 122: The World Wide Web Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues

More information

Digital Communication in the Modern World Application Layer cont. DNS, SMTP

Digital Communication in the Modern World Application Layer cont. DNS, SMTP Digital Communication in the Modern World Application Layer cont. DNS, http://www.cs.huji.ac.il/~com com@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top Down Approach

More information

Network Working Group Request for Comments: 840 April 1983. Official Protocols

Network Working Group Request for Comments: 840 April 1983. Official Protocols Network Working Group Request for Comments: 840 J. Postel ISI April 1983 This RFC identifies the documents specifying the official protocols used in the Internet. Annotations identify any revisions or

More information

41376 UDP performing get device status Command Workstation (CWS), Harmony, Bi-directional Driver 8021-8022 TCP/UDP

41376 UDP performing get device status Command Workstation (CWS), Harmony, Bi-directional Driver 8021-8022 TCP/UDP TCP/IP ports that might be used with Canon office equipment (in alphabetical order) 3/1/2009 Axis Print server. This port is used to identify the status the axis print server. This is performed approx

More information

Communicating Applications

Communicating Applications Communicating Applications Network Applications The raison d'être of computer networks Innovation happens in the application layer There is always a killer application Remote login -> Email -> Web -> P2P

More information

Application Layer -1- Network Tools

Application Layer -1- Network Tools EITF25 Internet: Technology and Applications Application Layer -1- Network Tools 2015, Lecture 08 Kaan Bür Previously on EITF25 Addressing above IP Ports, sockets Process-to-process delivery Transport

More information

INF3190 Application Layer DNS, Web, Mail

INF3190 Application Layer DNS, Web, Mail INF3190 Application Layer DNS, Web, Mail Carsten Griwodz Email: griff@ifi.uio.no Application layer Introduction What is it? Internet view everything above the socket interface is application layer function

More information

Internet Technologies Internet Protocols and Services

Internet Technologies Internet Protocols and Services QAFQAZ UNIVERSITY Computer Engineering Department Internet Technologies Internet Protocols and Services Dr. Abzetdin ADAMOV Chair of Computer Engineering Department aadamov@qu.edu.az http://ce.qu.edu.az/~aadamov

More information

Introduction to Web Technology. Content of the course. What is the Internet? Diana Inkpen

Introduction to Web Technology. Content of the course. What is the Internet? Diana Inkpen Introduction to Web Technology Content of the course Diana Inkpen The Internet and the WWW. Internet Connectivity. Basic Internet Services. University of Ottawa School of Information Technology and Engineering

More information

DATA COMMUNICATOIN NETWORKING

DATA COMMUNICATOIN NETWORKING DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks Internet

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Lecture 2. Internet: who talks with whom?

Lecture 2. Internet: who talks with whom? Lecture 2. Internet: who talks with whom? An application layer view, with particular attention to the World Wide Web Basic scenario Internet Client (local PC) Server (remote host) Client wants to retrieve

More information

Chakchai So-In, Ph.D.

Chakchai So-In, Ph.D. Application Layer Functionality and Protocols Chakchai So-In, Ph.D. Khon Kaen University Department of Computer Science Faculty of Science, Khon Kaen University 123 Mitaparb Rd., Naimaung, Maung, Khon

More information

Computer Networks. Examples of network applica3ons. Applica3on Layer

Computer Networks. Examples of network applica3ons. Applica3on Layer Computer Networks Applica3on Layer 1 Examples of network applica3ons e- mail web instant messaging remote login P2P file sharing mul3- user network games streaming stored video clips social networks voice

More information

Networking Applications

Networking Applications Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Electronic Mail 1 Outline Introduction SMTP MIME Mail Access

More information

1945: 1989: ! Tim Berners-Lee (CERN) writes internal proposal to develop a. 1990:! Tim BL writes a graphical browser for Next machines.

1945: 1989: ! Tim Berners-Lee (CERN) writes internal proposal to develop a. 1990:! Tim BL writes a graphical browser for Next machines. Systemprogrammering 2009 Föreläsning 9 Web Services Topics! HTTP! Serving static content! Serving dynamic content 1945: 1989: Web History! Vannevar Bush, As we may think, Atlantic Monthly, July, 1945.

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

Introduction to Computer Networks

Introduction to Computer Networks Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,

More information

P and FTP Proxy caching Using a Cisco Cache Engine 550 an

P and FTP Proxy caching Using a Cisco Cache Engine 550 an P and FTP Proxy caching Using a Cisco Cache Engine 550 an Table of Contents HTTP and FTP Proxy caching Using a Cisco Cache Engine 550 and a PIX Firewall...1 Introduction...1 Before You Begin...1 Conventions...1

More information

Domain Name System E-mail WWW. Application Layer. Mahalingam Ramkumar Mississippi State University, MS. September 15, 2014.

Domain Name System E-mail WWW. Application Layer. Mahalingam Ramkumar Mississippi State University, MS. September 15, 2014. Application Layer Mahalingam Mississippi State University, MS September 15, 2014 Outline 1 DNS Records DNS Components 2 Message Transfer Fetching Emails 3 Applications We will focus on 3 applications DNS

More information

You can do THAT with SAS Software? Using the socket access method to unite SAS with the Internet

You can do THAT with SAS Software? Using the socket access method to unite SAS with the Internet You can do THAT with SAS Software? Using the socket access method to unite SAS with the Internet David L. Ward, DZS Software Solutions, Inc., Bound Brook, NJ ABSTRACT The addition of the socket access

More information

sessionx Desarrollo de Aplicaciones en Red Web Applications History (1) Content History (2) History (3)

sessionx Desarrollo de Aplicaciones en Red Web Applications History (1) Content History (2) History (3) sessionx Desarrollo de Aplicaciones en Red José Rafael Rojano Cáceres http://www.uv.mx/rrojano Web Applications 1 2 Content History (1) History Http CGI Web Tiers ARPANet Email, Ftp, IRC, news Explosive

More information

Computer Networks & Security 2014/2015

Computer Networks & Security 2014/2015 Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!

More information

Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław Computer Networks Lecture 7: Application layer: FTP and Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 7 1 / 23 Reminder: Internet reference model

More information

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote

More information

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process

More information

M3-R3: INTERNET AND WEB DESIGN

M3-R3: INTERNET AND WEB DESIGN M3-R3: INTERNET AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF ANSWER

More information

CS43: Computer Networks Email. Kevin Webb Swarthmore College September 24, 2015

CS43: Computer Networks Email. Kevin Webb Swarthmore College September 24, 2015 CS43: Computer Networks Email Kevin Webb Swarthmore College September 24, 2015 Three major components: mail (MUA) mail transfer (MTA) simple mail transfer protocol: SMTP User Agent a.k.a. mail reader composing,

More information

Basic Operation & Management of TCP/IP Networks

Basic Operation & Management of TCP/IP Networks Basic Operation & Management of TCP/IP Networks SYSTEMS, Inc. For the MU-SPIN Coordination Office Slide 1 Presentation Contents Introduction to the Internet, Protocols and TCP/IP IP addressing, Name Resolution

More information

FILE TRANSFER PROTOCOL INTRODUCTION TO FTP, THE INTERNET'S STANDARD FILE TRANSFER PROTOCOL

FILE TRANSFER PROTOCOL INTRODUCTION TO FTP, THE INTERNET'S STANDARD FILE TRANSFER PROTOCOL FTP FILE TRANSFER PROTOCOL INTRODUCTION TO FTP, THE INTERNET'S STANDARD FILE TRANSFER PROTOCOL Peter R. Egli INDIGOO.COM 1/22 Contents 1. FTP versus TFTP 2. FTP principle of operation 3. FTP trace analysis

More information

File Transfer Protocol (FTP) & SSH

File Transfer Protocol (FTP) & SSH http://xkcd.com/949/ File Transfer Protocol (FTP) & SSH Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Some materials copyright 1996-2012 Addison-Wesley J.F Kurose and K.W.

More information

Product Standard General Interworking: Internet Server

Product Standard General Interworking: Internet Server General Interworking: Internet Server The Open Group Copyright August 1998, The Open Group All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted,

More information

File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi

File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi History of FTP The first proposed file transfer mechanisms were developed for implementation on hosts at M.I.T.

More information

Application Layer: HTTP and the Web. Srinidhi Varadarajan

Application Layer: HTTP and the Web. Srinidhi Varadarajan Application Layer: HTTP and the Web Srinidhi Varadarajan The Web: the http protocol http: hypertext transfer protocol Web s application layer protocol client/server model client: browser that requests,

More information

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet

SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet SWE 444 Internet and Web Application Development Introduction to Web Technology Dr. Ahmed Youssef Internet It is a network of networks connected and communicating using TCP/IP communication protocol 2

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and

More information

Connecting with Computer Science, 2e. Chapter 5 The Internet

Connecting with Computer Science, 2e. Chapter 5 The Internet Connecting with Computer Science, 2e Chapter 5 The Internet Objectives In this chapter you will: Learn what the Internet really is Become familiar with the architecture of the Internet Become familiar

More information

Terminology. Internet Addressing System

Terminology. Internet Addressing System Terminology A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. The defining characteristics

More information

CS3250 Distributed Systems

CS3250 Distributed Systems CS3250 Distributed Systems Lecture 4 More on Network Addresses Domain Name System DNS Human beings (apart from network administrators and hackers) rarely use IP addresses even in their human-readable dotted

More information

Basic Internet programming Formalities. Hands-on tools for internet programming

Basic Internet programming Formalities. Hands-on tools for internet programming Welcome Basic Internet programming Formalities Hands-on tools for internet programming DD1335 (gruint10) Serafim Dahl serafim@nada.kth.se DD1335 (Lecture 1) Basic Internet Programming Spring 2010 1 / 23

More information

Network Services. Email SMTP, Internet Message Format. Johann Oberleitner SS 2006

Network Services. Email SMTP, Internet Message Format. Johann Oberleitner SS 2006 Network Services Email SMTP, Internet Message Format Johann Oberleitner SS 2006 Agenda Email SMTP Internet Message Format Email Protocols SMTP Send emails POP3/IMAPv4 Read Emails Administrate mailboxes

More information

Introduction to Network Operating Systems

Introduction to Network Operating Systems As mentioned earlier, different layers of the protocol stack use different kinds of addresses. We can now see that the Transport Layer (TCP) uses port addresses to route data to the correct process, the

More information

Internet Concepts. What is a Network?

Internet Concepts. What is a Network? Internet Concepts Network, Protocol Client/server model TCP/IP Internet Addressing Development of the Global Internet Autumn 2004 Trinity College, Dublin 1 What is a Network? A group of two or more devices,

More information

Configuring a Backup Path Test Using Network Monitoring

Configuring a Backup Path Test Using Network Monitoring 6AOSCG0006-29B February 2011 Configuration Guide Configuring a Backup Path Test Using Network Monitoring This configuration guide describes how to configure a demand routing test call to test the availability

More information

Web Programming. Robert M. Dondero, Ph.D. Princeton University

Web Programming. Robert M. Dondero, Ph.D. Princeton University Web Programming Robert M. Dondero, Ph.D. Princeton University 1 Objectives You will learn: The fundamentals of web programming... The hypertext markup language (HTML) Uniform resource locators (URLs) The

More information

Internet Technologies 4-http. F. Ricci 2010/2011

Internet Technologies 4-http. F. Ricci 2010/2011 Internet Technologies 4-http F. Ricci 2010/2011 Content Hypertext Transfer Protocol Structure of a message Methods Headers Parameters and character encoding Proxy Caching HTTP 1.1: chunked transfer and

More information

Email. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Email. Daniel Zappala. CS 460 Computer Networking Brigham Young University Email Daniel Zappala CS 460 Computer Networking Brigham Young University How Email Works 3/25 Major Components user agents POP, IMAP, or HTTP to exchange mail mail transfer agents (MTAs) mailbox to hold

More information

7 Why Use Perl for CGI?

7 Why Use Perl for CGI? 7 Why Use Perl for CGI? Perl is the de facto standard for CGI programming for a number of reasons, but perhaps the most important are: Socket Support: Perl makes it easy to create programs that interface

More information