Internet Technologies Internet Protocols and Services

Size: px
Start display at page:

Download "Internet Technologies Internet Protocols and Services"

Transcription

1 QAFQAZ UNIVERSITY Computer Engineering Department Internet Technologies Internet Protocols and Services Dr. Abzetdin ADAMOV Chair of Computer Engineering Department

2 HTTP Protocol Hyper Text Transfer Protocol is one of the most frequently using application layer network protocol designed for data communication in World Wide Web. HTTP protocol has been developed by Internet Engineering Task Force (IETF) and the World Wide Web Consortium (W3C), as a result was published as RFC 2616 in HTTP defines a simple request-response language A web client establishes a connection with a web server by using HTTP HTTP defines how to correctly phrase the request and how the response should look like Note: HTTP does not define how the network connection is made or managed, nor how the information is actually transmitted; it is done by the lower-level protocols such as TCP/IP

3 Uniform Resource Locator HTTP client uses Uniform Resource Identifiers (URIs) in their request in order to specify an address of the document to retrieve. URI is described in RFC 3986 and URL (Uniform Resource Locator) which is better known version of URI updated by IETF (RFC 1738). Figure shows the syntax and components of URL standard. The URL is the syntax of specifying the location of resource as well as the mechanism for retrieving it. Actually, Hyper Text Transfer Protocol, Uniform Resource Locator and Hyper Text Markup Language in conjunction form the World Wide Web.

4 HTTP request-response communication One time HTTP request-response communication between client and server is called HTTP session. The typical HTTP session diagram is shown in Figure. Any HTTP session is initiated by user agent s (browser) request. It establishes TCP connection to a particular port of a server. Generally, a Web-server listens 80 th port waiting for client s request. After processing the request, the Web-server sends back a status code, description about requested resource and instructions (in the form of headers), resource itself, an error message (in the case of wrong request)

5 HTTP request HTTP request consist of following 4 components: 1. Request Line: It includes request method (indicates the purpose of client request), resource path and name (URI), and HTTP version supported by user agent, for example GET /index.html HTTP/1.1. At the table 3.1 to you can see the list and purposes of the most important methods. 2. Request Header Fields: enables client to send additional information about requested resource as well to introduce itself to server (all header fields except host are optional). At the table 3.2 presents the list of Request Header Fields and their purposes. 3. An empty line to indicate the end of header field 4. Message body supposed to be sent to a server

6 An example of HTTP request GET /index.php HTTP/1.1 Host: qu.edu.az Connection: keep-alive Referer: User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/ (KHTML, like Gecko) Chrome/ Safari/ Accept: text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-us,en;q=0.8 Accept-Charset: ISO ,utf-8;q=0.7,*;q=0.3 Cache-Control: no-cache

7 HTTP request methods Method GET POST HEAD PUT DELETE CONNECT Description Request the specified resource from server; may be used to retrieve the information only Send information to be stored on the server. Generally is used to submit Web form data to be processed on server Works like GET request, but returns only meta-information about the resource not the content of the resource Send a new copy of an existing resource to the server. Permanently delete the specified resource from server. Reserved for TCP/IP tunneling to facilitate SSL implementation (e.g. HTTPS)

8 HTTP request header fields Header Fields Description Host Specifies the host and port resource requested from Accept User agent uses this field to specify certain media types (MIME) it can accept as response User-Agent Provide descriptive information about user agent performed request and operating system on which user agent works Accept- Encoding Uses to restrict the content-encoding types that are acceptable as a response Accept- Language Specifies preferred human languages of user agent which made request Accept-Charset Specifies preferable charsets for the content comes as response Cookie Specifies the name and value of cookie previously sent by the server with Set-Cookie header Allows user agent to inform server about address (URI) from which Referer request address (URI) was taken (may be used for statistics, optimization, etc.) Connection Specifies the kind of connection preferred by user agent Cache-Control Enables user agent to allow or forbid caching of response content

9 HTTP response 1. Status Line: starts with HTTP protocol version followed by status code and its associated reason phrase. The status code is intended to inform client agent about the status of response before the client starts interpretation of response (look at the tables 3.3 and 3.4). 2. Response Header Fields: allow the server to send instructions for client agent, additional information about server as well as descriptive and instructive information about resource requested by the URI. 3. Information: body of the resource

10 HTTP response Status Code HTTP response Status Codes classification Class Purpose Description 1xx 2xx Informational Success Server uses this codes to inform client about the state of request accomplishing Informs about successful acceptance and accomplishment of the request 3xx Redirection Request should be redirected to another location (URI) 4xx 5xx Client-side Error Server-side Error Request cannot be accomplished due to syntax error in the request Request cannot be accomplished due to some server-side problems

11 HTTP response Status Code Code Reason Phrase Description 200 Document follows The request succeeded. The information requested follows. 301 Moved Permanently The document has moved to a new URL 302 Moved Temporarily The document has moved temporarily to a new URL 304 Not Modified 404 Not Found 401 Unauthorized 402 Payment Required 403 Forbidden Access is forbidden The document has not been modified since the date specified in a GET request with if-modified-since. The information could not be found or permission was denied. This error is returned if the requested URL does not exist or was misspelled The information is restricted; please retry with proper authentication. The information requires paying a fee; please retry with proper payment (not used often) 500 Server Error The server experienced an error

12 HTTP response header fields Header Fields Server Date Content-Length Content-Type Content-Language Content-Encoded Last-Modified Connection Expires Allow Location Refresh Transfer-Encoding Set-Cookie WWW-Authenticate Description Server presents its software working and operating system this software based on. Actual date and time of server response Indicates how many bytes are going to be sent as response The MIME type of content which forms response Specify the language of content Indicates the type of encoding, for example, gzip Specify the last date/time when document was changed last time Specify desired option for communication after response Date/time after which cached document will consider stale Indicate request methods supported by server Specify the resource new location (URI) in the of redirection (302 status code) Indicates how soon client agent should apply for update (request) of resource. This field may also be used for redirection after particular amount of time Indicate the transformation applied to the message in order to transform from server to client agent Creates a cookie related with resource Used to specify authentication scheme when resource requires authentication (401 status code) to be accessed

13 Example of HTTP server response Successful (status code 200) server response: HTTP/ OK Date: Sat, 21 May :43:55 GMT Server: Apache/ (Unix) mod_ssl/ OpenSSL/0.9.8a PHP/5.3.3 Expires: Mon, 26 Jul :00:00 GMT Cache-Control: no-cache, must-revalidate Last-Modified: Mon, 16 May :14:11 GMT Set-Cookie: lang_id=2; expires=sat, 28-May :43:55 GM Connection: close Transfer-Encoding: chunked Content-Type: text/html; charset=utf-8 Failure (status code 404) server response: HTTP/ Not Found Date: Sat, 21 May :55:10 GMT Server: Apache/ (Unix) mod_ssl/ OpenSSL/0.9.8a PHP/5.3.3 Content-Length: 0 Connection: close Content-Type: text/html; charset=utf-8

14 MIME Standard MIME (Multipurpose Internet Mail Extensions) or Content-Type is a standard was designed to indicate file or information formats to use in SMTP protocols, but actually it is used by other protocols like HTTP. Various formats were defined in RFC 2046.

15 HTTP session management Each moment Web-server can serve hundreds client requests, what is more, all of them request different resources. How does server manage to send right response to particular request. The typical session management scenario consists of following interactions: 1. User agent sends an HTTP request; 2. Web-server sends back an HTTP response that includes instruction (Set- Cookie header) to create cookie; 3. User agent send an HTTP request that includes cookies (Cookie header) received from server; 4. Web-server sends back an HTTP response; 5. Steps 3 and 4 may be repeated until the cookie is expired.

16 HTTP session management (cont) HTTP session management by cookie:

17 Electronic Mail The address standard is described in RFC 5322 (section 3.4.1). According to standard an address is a string of ASCII characters separated into two parts: the part before called local-part " or username, and the part symbol called domain name, which is the destination of the . In the same way as the postal mailbox cluster may have one or many mailboxes with same address, each domain may contain one or even millions -boxes (like Gmail, Hotmail, Yahoo, etc.).

18 Using Progress by Years Electronic mail or is the method of delivering the digital message to one or more recipients in electronic environment. is one of the most popular services of Internet increases the ability of people to communicate even if they are not geographically local.

19 General Structure As other Internet services the system based on Internet standards and some dedicated protocols. There are a lot of different protocols implemented by different servers, however, some of them are common for all servers and clients: Basic format standard RFC 5322 Multipurpose Internet Mail Extensions (MIME) standard Simple Message Transfer Protocol (SMTP) Post Office Protocol (POP3) or Internet Message Access Protocol (IMAP)

20 The Internet Massage ( ) Format The first Internet message standard was described by RFC 733 in 1977, which was renewed by RFC 822 in 1982 had been using for almost twenty years. The newest standard is described in RFC 5322 was published in According to the last standard the Internet message (or ) consists of an envelope and content (for further more information see RFC 5321).

21 Header From: Date: Message-ID: In-Reply-To: To: Cc: Bcc: Subject: Content Type: Received: References: Keywords: Reply-To: Return-Path: Delivered-To: Sender: Internet Message Header Fields Description The name and address of the message originator The local date and time when the message was written or sent Machine readable unique identifier generated by mail server; designated to prevent multiple delivery, and to use as reference in In-Reply-To Used for reply messages only, and contain Message-ID of the original message(s), creating relational tree of messages address(es) of the primary recipient(s) address(es) of the secondary recipient(s). Generally, used to indicate recipients whose don t have immediate relation to the matter, however should be informed Same as Cc, but hidden from recipients. SMTP removes this header field before delivering of the message Textual human readable summary of message MIME type of the message content, designed for agent to display message properly Contain information about all mail servers that were involved in the message delivery Like In-Reply-To uses Message-ID(s), but designed to identify a thread of correspondence Keywords specified by sender address should be used when recipient replies to message This header indicates the address of message s sender. The value of this header has to be same as From address of the SMTP Envelope The address of recipient Actual sender of the message (generally, used address listed in the From)

22 Received Header and Spam The one of the most important headers Received: is deserved to be reviewed in more detailed way. This header significantly simplifies the fight against spam and spammers. When we receive unsolicited bulk , our agent program normally shows only the standard To:, From:, Subject:, and Date: headers, as for any other . At the same time, the From: address may appear to be from someone we well know, or from some organization whose name we respect or trust. In reality these spoofed messages do not originate from the address that appears in the From: header. To see the real address message was sent from, it is necessary to control Received: filed, which tells us the route the message took when it was sent to us

23 Received Header and Spam Delivered-To: Return-Path: <SRS0=M78ycc=RT=p3slh174.shr.phx3.secureserver.net= Received: Received: by with SMTP id w5cs344529vcx; Sun, 17 Oct :24: (PDT) Received: from bosmailscan05.eigbox.net ([ ]) by bosmailout03.eigbox.net with esmtp (Exim) id 1P7SHj-0007rH-Qy for Sun, 17 Oct :24: Received: from p3slh174.shr.phx3.secureserver.net (localhost.localdomain [ ]) by p3slh174.shr.phx3.secureserver.net ( / ) with ESMTP id o9hcof7n for Sun, 17 Oct :24: Received: (from by p3slh174.shr.phx3.secureserver.net ( / /Submit) id o9hcoevk030054; Sun, 17 Oct :24: Date: Sun, 17 Oct :24: Message-Id: To: Subject: xxxxxxxxxxxxxxxxx!!!!! From:

24 Physical Architecture and Protocols General architecture of system and protocols:

25 How delivery works? The delivery is a whole process of massage transfer from the source to the destination. Let see the process step by step: 1. Using agent the sender is submitted for smith@b.com. 2. The SMTP service of the mail server received sender s message resolves the domain b.com. To do so the mail server using DNS service (see DNS resolving ) asks the NS server of b.com for the MX record. The MX record specifies the mail server, which is destined to gets all s with domain name b.com. The name of such a male server is in our example is mail.b.com. 3. is routed to the receiver s mail server mail.b.com. 4. The SMTP service of mail.b.com places the into recipient s mailbox smith in the mail store. 5. The recipient checks for for user smith@b.com using the POP3 service of his agent. To be able to access to mailbox user has to pass authentication process of the POP3 service. 6. If the authentication module accepts eligibility of the user, the is downloaded to the user s agent.

26 How delivery works? Detailed structure of delivery:

27 SMTP, Simple Mail Transfer Protocol SMTP protocol was defined in 1982 by RFC 821 and renewed later many times. The last update was made in 2008 by RFC Advantages of SMTP: SMTP is very popular because it is supported by all platforms and most of vendors SMTP is simple, so it has low implementation and administration costs SMTP uses persistent connection, so it tries to resend failure messages many times Disadvantages of SMTP: SMTP does not support binary data SMTP does not support sender authentication SMTP does not have any embedded encryption mechanism

28 SMTP protocol commands Command HELO EHLO MAIL From RCPT To DATA QUIT VRFY Subject: Cc: Reply-To: Description This command starts the SMTP conversation. This command comes before the domain name of the sender Has same meaning as HELO, but is used in extended SMTP (ESMTP) protocol. The command initiates new mail transaction session. May have From argument with the sender s original address, which is used as From: field of an SMPT envelope. This command identifies the recipient s address, which is used as To: field of an SMPT envelope. Command has to be repeated with different arguments in order send message to multiple recipients. This command signifies that the message body is following. The message body s end is terminated by a "." on a line by itself. This command releases a TCP/IP connection SMTP. To start another mail transaction session use command MAIL before using of QUIT command. This command is used by source SMTP server to request the destination SMTP about existence of a given username. Some servers disable this feature for security purposes. These header lines can be included into the content of the command DATA. They are not the SMTP commands in their own right. They should be separated from a message body by an empty line.

29 POP3, Post Office Protocol (ver. 3) Command USER PASS STAT LIST LAST RETR TOP DELE RSET NOOP APOP QUIT UIDL Description Specifies valid username who has account in the POP3 server. This command follows immediately after USER command, and specifies password for user authentication in the POP3 server. Returns the number of messages and total size of mailbox. Lists message number and size of each message. If a message number is specified, returns the size of the specified message. Returns the message number of the last message not marked as read or deleted. Removed according to RFC 1725 Returns the full text of the specified message, and marks that message as read. Returns the specified number of lines from the specified mesasge number. Marks the specified message for deletion. Resets any messages which have been marked as read or deleted to the standard unread state. Returns a simple acknowledgement, without performing any function. Allows for a secure method of POP3 authentication, in which a cleartext password does not have to be sent. Instead, the client creates an MD5 encrypted string from the password, process id, and timestamp, and sends it to the POP3 server. Ends the POP3 session Returns "unique-id listing" consisting of characters in the range 0x21 to 0x7E. Server never reuses unique-id until the entity using the unique-id exists.

30 SMTP/POP3 Emulation by Telnet C:\> telnet smtp.mail.ru smtp15.mail.ru ESMTP ready helo Invalid argument helo ff 250 smtp15.mail.ru auth login Authentication succeeded mail 501 sender address must match authenticated user 421 smtp15.mail.ru: SMTP command timeout - closing connection

31 SMTP/POP3 Emulation by Telnet telnet pop.mail.ru 110 user username_here pass password_here list retr number dele number quit

HTTP Protocol. Bartosz Walter <Bartek.Walter@man.poznan.pl>

HTTP Protocol. Bartosz Walter <Bartek.Walter@man.poznan.pl> HTTP Protocol Bartosz Walter Agenda Basics Methods Headers Response Codes Cookies Authentication Advanced Features of HTTP 1.1 Internationalization HTTP Basics defined in

More information

HTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology

HTTP. Internet Engineering. Fall 2015. Bahador Bakhshi CE & IT Department, Amirkabir University of Technology HTTP Internet Engineering Fall 2015 Bahador Bakhshi CE & IT Department, Amirkabir University of Technology Questions Q1) How do web server and client browser talk to each other? Q1.1) What is the common

More information

Application-layer Protocols and Internet Services

Application-layer Protocols and Internet Services Application-layer Protocols and Internet Services Computer Networks Lecture 8 http://goo.gl/pze5o8 Terminal Emulation 2 Purpose of Telnet Service Supports remote terminal connected via network connection

More information

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP Abstract Message Format. The Client/Server model is used:

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP Abstract Message Format. The Client/Server model is used: Evolution of the WWW Communication in the WWW World Wide Web (WWW) Access to linked documents, which are distributed over several computers in the History of the WWW Origin 1989 in the nuclear research

More information

Network Technologies

Network Technologies Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:

More information

The Hyper-Text Transfer Protocol (HTTP)

The Hyper-Text Transfer Protocol (HTTP) The Hyper-Text Transfer Protocol (HTTP) Antonio Carzaniga Faculty of Informatics University of Lugano October 4, 2011 2005 2007 Antonio Carzaniga 1 HTTP message formats Outline HTTP methods Status codes

More information

reference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002)

reference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002) 1 cse879-03 2010-03-29 17:23 Kyung-Goo Doh Chapter 3. Web Application Technologies reference: HTTP: The Definitive Guide by David Gourley and Brian Totty (O Reilly, 2002) 1. The HTTP Protocol. HTTP = HyperText

More information

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP - Message Format. The Client/Server model is used:

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP - Message Format. The Client/Server model is used: Evolution of the WWW Communication in the WWW World Wide Web (WWW) Access to linked documents, which are distributed over several computers in the History of the WWW Origin 1989 in the nuclear research

More information

1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment?

1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? Questions 1. When will an IP process drop a datagram? 2. When will an IP process fragment a datagram? 3. When will a TCP process drop a segment? 4. When will a TCP process resend a segment? CP476 Internet

More information

Hypertext for Hyper Techs

Hypertext for Hyper Techs Hypertext for Hyper Techs An Introduction to HTTP for SecPros Bio Josh Little, GSEC ~14 years in IT. Support, Server/Storage Admin, Webmaster, Web App Dev, Networking, VoIP, Projects, Security. Currently

More information

By Bardia, Patit, and Rozheh

By Bardia, Patit, and Rozheh HTTP By Bardia, Patit, and Rozheh HTTP - Introduction - Hyper Text Transfer Protocol -uses the TCP/IP technology -has had the most impact on the World Wide Web (WWW) - specs in RFC 2616 (RFC2616) HTTP

More information

The Application Layer. CS158a Chris Pollett May 9, 2007.

The Application Layer. CS158a Chris Pollett May 9, 2007. The Application Layer CS158a Chris Pollett May 9, 2007. Outline DNS E-mail More on HTTP The Domain Name System (DNS) To refer to a process on the internet we need to give an IP address and a port. These

More information

Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview

Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview Web and HTTP Protocolo HTTP Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio file, Web page consists of base HTML-file which includes several referenced objects Each

More information

Simple Mail Transfer Protocol

Simple Mail Transfer Protocol Page 1 of 6 Home : Network Programming Simple Mail Transfer Protocol Contents What is SMTP? Basics of SMTP SMTP Commands Relaying of Messages Time Stamps and Return Path in Message Header Mail Exchangers

More information

Internet Technology 2/13/2013

Internet Technology 2/13/2013 Internet Technology 03r. Application layer protocols: email Email: Paul Krzyzanowski Rutgers University Spring 2013 1 2 Simple Mail Transfer Protocol () Defined in RFC 2821 (April 2001) Original definition

More information

Project #2. CSE 123b Communications Software. HTTP Messages. HTTP Basics. HTTP Request. HTTP Request. Spring 2002. Four parts

Project #2. CSE 123b Communications Software. HTTP Messages. HTTP Basics. HTTP Request. HTTP Request. Spring 2002. Four parts CSE 123b Communications Software Spring 2002 Lecture 11: HTTP Stefan Savage Project #2 On the Web page in the next 2 hours Due in two weeks Project reliable transport protocol on top of routing protocol

More information

Domain Name System (DNS)

Domain Name System (DNS) Application Layer Domain Name System Domain Name System (DNS) Problem Want to go to www.google.com, but don t know the IP address Solution DNS queries Name Servers to get correct IP address Essentially

More information

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process

More information

Email Management CSCU9B2 CSCU9B2 1

Email Management CSCU9B2 CSCU9B2 1 Email Management CSCU9B2 CSCU9B2 1 Contents Email clients choosing and using Email message header and content Emailing to lists of people In and out message management Mime attachments and HTML email SMTP,

More information

Application Example: WWW. Communication in the WWW. WWW, HTML, URL and HTTP. Loading of Web Pages. The Client/Server model is used in the WWW

Application Example: WWW. Communication in the WWW. WWW, HTML, URL and HTTP. Loading of Web Pages. The Client/Server model is used in the WWW Application Example WWW Communication in the WWW In the following application protocol examples for WWW and E-Mail World Wide Web (WWW) Access to linked documents, which are distributed over several computers

More information

CS615 - Aspects of System Administration

CS615 - Aspects of System Administration CS615 - Aspects of System Administration Slide 1 CS615 - Aspects of System Administration SMTP, HTTP Department of Computer Science Stevens Institute of Technology Jan Schaumann jschauma@stevens-tech.edu

More information

CS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol

CS640: Introduction to Computer Networks. Applications FTP: The File Transfer Protocol CS640: Introduction to Computer Networks Aditya Akella Lecture 4 - Application Protocols, Performance Applications FTP: The File Transfer Protocol user at host FTP FTP user client interface local file

More information

CONTENT of this CHAPTER

CONTENT of this CHAPTER CONTENT of this CHAPTER v DNS v HTTP and WWW v EMAIL v SNMP 3.2.1 WWW and HTTP: Basic Concepts With a browser you can request for remote resource (e.g. an HTML file) Web server replies to queries (e.g.

More information

Networking Applications

Networking Applications Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Electronic Mail 1 Outline Introduction SMTP MIME Mail Access

More information

Email, SNMP, Securing the Web: SSL

Email, SNMP, Securing the Web: SSL Email, SNMP, Securing the Web: SSL 4 January 2015 Lecture 12 4 Jan 2015 SE 428: Advanced Computer Networks 1 Topics for Today Email (SMTP, POP) Network Management (SNMP) ASN.1 Secure Sockets Layer 4 Jan

More information

CS43: Computer Networks Email. Kevin Webb Swarthmore College September 24, 2015

CS43: Computer Networks Email. Kevin Webb Swarthmore College September 24, 2015 CS43: Computer Networks Email Kevin Webb Swarthmore College September 24, 2015 Three major components: mail (MUA) mail transfer (MTA) simple mail transfer protocol: SMTP User Agent a.k.a. mail reader composing,

More information

Domain Name System E-mail WWW. Application Layer. Mahalingam Ramkumar Mississippi State University, MS. September 15, 2014.

Domain Name System E-mail WWW. Application Layer. Mahalingam Ramkumar Mississippi State University, MS. September 15, 2014. Application Layer Mahalingam Mississippi State University, MS September 15, 2014 Outline 1 DNS Records DNS Components 2 Message Transfer Fetching Emails 3 Applications We will focus on 3 applications DNS

More information

GET /FB/index.html HTTP/1.1 Host: lmi32.cnam.fr

GET /FB/index.html HTTP/1.1 Host: lmi32.cnam.fr GET /FB/index.html HTTP/1.1 Host: lmi32.cnam.fr HTTP/1.1 200 OK Date: Thu, 20 Oct 2005 14:42:54 GMT Server: Apache/2.0.50 (Linux/SUSE) Last-Modified: Thu, 20 Oct 2005 14:41:56 GMT ETag: "2d7b4-14b-8efd9500"

More information

Configuring Health Monitoring

Configuring Health Monitoring CHAPTER4 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features that are described in this chapter apply to both IPv6 and IPv4 unless

More information

Email Electronic Mail

Email Electronic Mail Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt 1 Lecture 10: Application Layer 2 Application Layer Where our applications are running Using services provided by

More information

The Web: some jargon. User agent for Web is called a browser: Web page: Most Web pages consist of: Server for Web is called Web server:

The Web: some jargon. User agent for Web is called a browser: Web page: Most Web pages consist of: Server for Web is called Web server: The Web: some jargon Web page: consists of objects addressed by a URL Most Web pages consist of: base HTML page, and several referenced objects. URL has two components: host name and path name: User agent

More information

Table of Contents. Open-Xchange Authentication & Session Handling. 1.Introduction...3

Table of Contents. Open-Xchange Authentication & Session Handling. 1.Introduction...3 Open-Xchange Authentication & Session Handling Table of Contents 1.Introduction...3 2.System overview/implementation...4 2.1.Overview... 4 2.1.1.Access to IMAP back end services...4 2.1.2.Basic Implementation

More information

Architecture of So-ware Systems HTTP Protocol. Mar8n Rehák

Architecture of So-ware Systems HTTP Protocol. Mar8n Rehák Architecture of So-ware Systems HTTP Protocol Mar8n Rehák HTTP Protocol Hypertext Transfer Protocol Designed to transfer hypertext informa8on over the computer networks Hypertext: Structured text with

More information

Chapter 2 Application Layer. Lecture 5 FTP, Mail. Computer Networking: A Top Down Approach

Chapter 2 Application Layer. Lecture 5 FTP, Mail. Computer Networking: A Top Down Approach Chapter 2 Application Layer Lecture 5 FTP, Mail Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Chapter 2: outline 2.1 principles

More information

FTP and email. Computer Networks. FTP: the file transfer protocol

FTP and email. Computer Networks. FTP: the file transfer protocol Computer Networks and email Based on Computer Networking, 4 th Edition by Kurose and Ross : the file transfer protocol transfer file to/from remote host client/ model client: side that initiates transfer

More information

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache. JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming

More information

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) 2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file

More information

Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław Computer Networks Lecture 7: Application layer: FTP and Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 7 1 / 23 Reminder: Internet reference model

More information

International Journal of Engineering & Technology IJET-IJENS Vol:14 No:06 44

International Journal of Engineering & Technology IJET-IJENS Vol:14 No:06 44 International Journal of Engineering & Technology IJET-IJENS Vol:14 No:06 44 Data Traffic and Security over Internet via Monitoring and Analyzing the HTTP Protocol Ezmolda Barolli, Loren Nebiaj, Gloria

More information

1 Introduction: Network Applications

1 Introduction: Network Applications 1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video

More information

19531 - Telematics. 13th Tutorial - Application Layer Protocols

19531 - Telematics. 13th Tutorial - Application Layer Protocols 19531 - Telematics 13th Tutorial - Application Layer Protocols Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 03. February, 2011 Institute of Computer Science

More information

Email. MIME is the protocol that was devised to allow non-ascii encoded content in an email and attached files to an email.

Email. MIME is the protocol that was devised to allow non-ascii encoded content in an email and attached files to an email. Email Basics: Email protocols were developed even before there was an Internet, at a time when no one was anticipating widespread use of digital graphics or even rich text format (fonts, colors, etc.),

More information

sessionx Desarrollo de Aplicaciones en Red Web Applications History (1) Content History (2) History (3)

sessionx Desarrollo de Aplicaciones en Red Web Applications History (1) Content History (2) History (3) sessionx Desarrollo de Aplicaciones en Red José Rafael Rojano Cáceres http://www.uv.mx/rrojano Web Applications 1 2 Content History (1) History Http CGI Web Tiers ARPANet Email, Ftp, IRC, news Explosive

More information

Remote login (Telnet):

Remote login (Telnet): SFWR 4C03: Computer Networks and Computer Security Feb 23-26 2004 Lecturer: Kartik Krishnan Lectures 19-21 Remote login (Telnet): Telnet permits a user to connect to an account on a remote machine. A client

More information

The Web History (I) The Web History (II)

The Web History (I) The Web History (II) Goals of Today s Lecture EE 122: The World Wide Web Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues

More information

CTIS 256 Web Technologies II. Week # 1 Serkan GENÇ

CTIS 256 Web Technologies II. Week # 1 Serkan GENÇ CTIS 256 Web Technologies II Week # 1 Serkan GENÇ Introduction Aim: to be able to develop web-based applications using PHP (programming language) and mysql(dbms). Internet is a huge network structure connecting

More information

Mail system components. Electronic Mail MRA MUA MSA MAA. David Byers

Mail system components. Electronic Mail MRA MUA MSA MAA. David Byers Electronic Mail PRINCIPLES DNS ARCHITECTURES SPAM Mail system components () () David Byers MRA davby@ida.liu.se IDA/ADIT/IISLAB Mail User Agent Reads and writes e-mail Writes e-mail to using (usually)

More information

Network Services. Email SMTP, Internet Message Format. Johann Oberleitner SS 2006

Network Services. Email SMTP, Internet Message Format. Johann Oberleitner SS 2006 Network Services Email SMTP, Internet Message Format Johann Oberleitner SS 2006 Agenda Email SMTP Internet Message Format Email Protocols SMTP Send emails POP3/IMAPv4 Read Emails Administrate mailboxes

More information

Chapter 27 Hypertext Transfer Protocol

Chapter 27 Hypertext Transfer Protocol Chapter 27 Hypertext Transfer Protocol Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 27-1 Overview Hypertext language and protocol HTTP messages Browser architecture CGI

More information

HTTP Authentication. RFC 2617 obsoletes RFC 2069

HTTP Authentication. RFC 2617 obsoletes RFC 2069 HTTP Authentication RFC 2617 obsoletes RFC 2069 Agenda Positioning Basic Access Authentication Digest Access Authentication Proxy-Authentication and Proxy- Authorization Security Considerations Internet

More information

TCP/IP Networking An Example

TCP/IP Networking An Example TCP/IP Networking An Example Introductory material. This module illustrates the interactions of the protocols of the TCP/IP protocol suite with the help of an example. The example intents to motivate the

More information

Appendix. Web Command Error Codes. Web Command Error Codes

Appendix. Web Command Error Codes. Web Command Error Codes Appendix Web Command s Error codes marked with * are received in responses from the FTP server, and then returned as the result of FTP command execution. -501 Incorrect parameter type -502 Error getting

More information

Playing with Web Application Firewalls

Playing with Web Application Firewalls Playing with Web Application Firewalls Who is Wendel? Independent penetration test analyst. Affiliated to Hackaholic team. Over 7 years in the security industry. Discovered vulnerabilities in Webmails,

More information

Protocolo FTP. FTP: Active Mode. FTP: Active Mode. FTP: Active Mode. FTP: the file transfer protocol. Separate control, data connections

Protocolo FTP. FTP: Active Mode. FTP: Active Mode. FTP: Active Mode. FTP: the file transfer protocol. Separate control, data connections : the file transfer protocol Protocolo at host interface local file system file transfer remote file system utilizes two ports: - a 'data' port (usually port 20...) - a 'command' port (port 21) SISTEMAS

More information

World Wide Web. Before WWW

World Wide Web. Before WWW World Wide Web Joao.Neves@fe.up.pt Before WWW Major search tools: Gopher and Archie Archie Search FTP archives indexes Filename based queries Gopher Friendly interface Menu driven queries João Neves 2

More information

Writing for Developers: The New Customers. Amruta Ranade

Writing for Developers: The New Customers. Amruta Ranade Writing for Developers: The New Customers Amruta Ranade 1 First, let s discuss the difference between User Docs and Developer Docs 2 Let s consider an example. Suppose we are writing the user docs for

More information

Application layer Web 2.0

Application layer Web 2.0 Information Network I Application layer Web 2.0 Youki Kadobayashi NAIST They re revolving around the web, after all Name any Internet-related buzz: Cloud computing Smartphone Social media... You ll end

More information

Electronic mail security. MHS (Message Handling System)

Electronic mail security. MHS (Message Handling System) Electronic mail security Diana Berbecaru < diana.berbecaru @ polito.it> Politecnico di Torino Dip. Automatica e Informatica MHS (Message Handling System) MS MS MUA MUA (Message Transfer ) MS (Message Store)

More information

HTTP Caching & Cache-Busting for Content Publishers

HTTP Caching & Cache-Busting for Content Publishers HTTP Caching & Cache-Busting for Content Publishers Michael J. Radwin http://public.yahoo.com/~radwin/ OSCON 2005 Thursday, August 4th, 2005 1 1 Agenda HTTP in 3 minutes Caching concepts Hit, Miss, Revalidation

More information

HTTP 1.1 Web Server and Client

HTTP 1.1 Web Server and Client HTTP 1.1 Web Server and Client Finding Feature Information HTTP 1.1 Web Server and Client Last Updated: August 17, 2011 The HTTP 1.1 Web Server and Client feature provides a consistent interface for users

More information

Lektion 2: Web als Graph / Web als System

Lektion 2: Web als Graph / Web als System Lektion 2: Web als Graph / Web als System Helmar Burkhart Informatik Universität Basel Helmar.Burkhart@... WT-2-1 Lernziele und Inhalt Web als Graph erkennen Grundelemente von sozialen Netzwerken sehen

More information

IxLoad Data Mail (SMTP, POP3, IMAP) Features

IxLoad Data Mail (SMTP, POP3, IMAP) Features IxLoad Data Mail (SMTP, POP3, IMAP) Features Aptixia IxLoad can test the performance of email delivery systems and devices by emulating various email clients, servers and associated protocols. SMTP, POP3

More information

Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)

Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT) Internet Technologies World Wide Web (WWW) Proxy Server Network Address Translator (NAT) What is WWW? System of interlinked Hypertext documents Text, Images, Videos, and other multimedia documents navigate

More information

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) 2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file

More information

Communication Systems Network Applications - Electronic Mail

Communication Systems Network Applications - Electronic Mail Scope Communication Systems Network s - Electronic Mail Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email:

More information

Outline Definition of Webserver HTTP Static is no fun Software SSL. Webserver. in a nutshell. Sebastian Hollizeck. June, the 4 th 2013

Outline Definition of Webserver HTTP Static is no fun Software SSL. Webserver. in a nutshell. Sebastian Hollizeck. June, the 4 th 2013 Definition of in a nutshell June, the 4 th 2013 Definition of Definition of Just another definition So what is it now? Example CGI php comparison log-file Definition of a formal definition Aisaprogramthat,usingthe

More information

Security-Assessment.com White Paper Leveraging XSRF with Apache Web Server Compatibility with older browser feature and Java Applet

Security-Assessment.com White Paper Leveraging XSRF with Apache Web Server Compatibility with older browser feature and Java Applet Security-Assessment.com White Paper Leveraging XSRF with Apache Web Server Compatibility with older browser feature and Java Applet Prepared by: Roberto Suggi Liverani Senior Security Consultant Security-Assessment.com

More information

Applications and Services. DNS (Domain Name System)

Applications and Services. DNS (Domain Name System) Applications and Services DNS (Domain Name Service) File Transfer Protocol (FTP) Simple Mail Transfer Protocol (SMTP) Malathi Veeraraghavan Distributed database used to: DNS (Domain Name System) map between

More information

No. Time Source Destination Protocol Info 1190 131.859385 128.238.245.34 128.119.245.12 HTTP GET /ethereal-labs/http-ethereal-file1.html HTTP/1.

No. Time Source Destination Protocol Info 1190 131.859385 128.238.245.34 128.119.245.12 HTTP GET /ethereal-labs/http-ethereal-file1.html HTTP/1. Ethereal Lab: HTTP 1. The Basic HTTP GET/response interaction 1190 131.859385 128.238.245.34 128.119.245.12 HTTP GET /ethereal-labs/http-ethereal-file1.html HTTP/1.1 GET /ethereal-labs/http-ethereal-file1.html

More information

20.12. smtplib SMTP protocol client

20.12. smtplib SMTP protocol client 20.12. smtplib SMTP protocol client The smtplib module defines an SMTP client session object that can be used to send mail to any Internet machine with an SMTP or ESMTP listener daemon. For details of

More information

Description of Microsoft Internet Information Services (IIS) 5.0 and

Description of Microsoft Internet Information Services (IIS) 5.0 and Page 1 of 10 Article ID: 318380 - Last Review: July 7, 2008 - Revision: 8.1 Description of Microsoft Internet Information Services (IIS) 5.0 and 6.0 status codes This article was previously published under

More information

Cyber Security Workshop Ethical Web Hacking

Cyber Security Workshop Ethical Web Hacking Cyber Security Workshop Ethical Web Hacking May 2015 Setting up WebGoat and Burp Suite Hacking Challenges in WebGoat Concepts in Web Technologies and Ethical Hacking 1 P a g e Downloading WebGoat and Burp

More information

DATA COMMUNICATOIN NETWORKING

DATA COMMUNICATOIN NETWORKING DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks Internet

More information

Layer 7 Load Balancing and Content Customization

Layer 7 Load Balancing and Content Customization C H A P T E R 4 Layer 7 Load Balancing and Content Customization This chapter will discuss the methods and protocols involved in accomplishing a Layer 7 load-balancing solution. The reasons for and benefits

More information

SMTP Servers. Determine if an email message should be sent to another machine and automatically send it to that machine using SMTP.

SMTP Servers. Determine if an email message should be sent to another machine and automatically send it to that machine using SMTP. SMTP Servers SMTP: Simple Mail Transfer Protocol (TCP Port 25) The Simple Mail Transfer Protocol (SMTP) is an Internet standard for transferring electronic mail between computers. UNIX systems implement

More information

URLs and HTTP. ICW Lecture 10 Tom Chothia

URLs and HTTP. ICW Lecture 10 Tom Chothia URLs and HTTP ICW Lecture 10 Tom Chothia This Lecture The two basic building blocks of the web: URLs: Uniform Resource Locators HTTP: HyperText Transfer Protocol Uniform Resource Locators Many Internet

More information

Introduction to ServerIron ADX Application Switching and Load Balancing. Module 6: Content Switching (CSW) Revision 0310

Introduction to ServerIron ADX Application Switching and Load Balancing. Module 6: Content Switching (CSW) Revision 0310 Introduction to ServerIron ADX Application Switching and Load Balancing Module 6: Content Switching (CSW) Revision 0310 Objectives Upon completion of this module the student will be able to: Define layer

More information

2014-10-07. Email security

2014-10-07. Email security Email security Simple Mail Transfer Protocol First defined in RFC821 (1982), later updated in RFC 2821 (2001) and most recently in RFC5321 (Oct 2008) Communication involves two hosts SMTP Client SMTP Server

More information

APACHE WEB SERVER. Andri Mirzal, PhD N28-439-03

APACHE WEB SERVER. Andri Mirzal, PhD N28-439-03 APACHE WEB SERVER Andri Mirzal, PhD N28-439-03 Introduction The Apache is an open source web server software program notable for playing a key role in the initial growth of the World Wide Web Typically

More information

Internet Security [1] VU 184.216. Engin Kirda engin@infosys.tuwien.ac.at

Internet Security [1] VU 184.216. Engin Kirda engin@infosys.tuwien.ac.at Internet Security [1] VU 184.216 Engin Kirda engin@infosys.tuwien.ac.at Christopher Kruegel chris@auto.tuwien.ac.at Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will

More information

WWW. World Wide Web Aka The Internet. dr. C. P. J. Koymans. Informatics Institute Universiteit van Amsterdam. November 30, 2007

WWW. World Wide Web Aka The Internet. dr. C. P. J. Koymans. Informatics Institute Universiteit van Amsterdam. November 30, 2007 WWW World Wide Web Aka The Internet dr. C. P. J. Koymans Informatics Institute Universiteit van Amsterdam November 30, 2007 dr. C. P. J. Koymans (UvA) WWW November 30, 2007 1 / 36 WWW history (1) 1968

More information

Mail agents. Introduction to Internet Mail. Message format (2) Authenticating senders

Mail agents. Introduction to Internet Mail. Message format (2) Authenticating senders Mail agents Introduction to Internet Mail Philip Hazel University of Cambridge MUA = Mail User Agent Interacts directly with the end user Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom, Mulberry,

More information

Information Extraction Art of Testing Network Peripheral Devices

Information Extraction Art of Testing Network Peripheral Devices OWASP AppSec Brazil 2010, Campinas, SP The OWASP Foundation http://www.owasp.org Information Extraction Art of Testing Network Peripheral Devices Aditya K Sood, SecNiche Security (adi_ks@secniche.org)

More information

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network. Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components

More information

THE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6

THE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6 The Proxy Server THE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6 2 1 Purpose The proxy server acts as an intermediate server that relays requests between

More information

http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm

http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm Client/Server paradigm As we know, the World Wide Web is accessed thru the use of a Web Browser, more technically known as a Web Client. 1 A Web Client makes requests of a Web Server 2, which is software

More information

Sonian Getting Started Guide October 2008

Sonian Getting Started Guide October 2008 Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using

More information

Understanding SMTP authentication and securing your IBM Lotus Domino 8 server from spam

Understanding SMTP authentication and securing your IBM Lotus Domino 8 server from spam Understanding SMTP authentication and securing your IBM Lotus Domino 8 server from spam Shrikant Jamkhandi IBM Software Group Senior Software Engineer Pune, India September 2009 Copyright International

More information

Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence

Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence Web Development Owen Sacco ICS2205/ICS2230 Web Intelligence Brief Course Overview An introduction to Web development Server-side Scripting Web Servers PHP Client-side Scripting HTML & CSS JavaScript &

More information

Data Communication I

Data Communication I Data Communication I Urban Bilstrup (E327) 090901 Urban.Bilstrup@ide.hh.se www2.hh.se/staff/urban Internet - Sweden, Northern Europe SUNET NORDUnet 2 Internet - Internet Addresses Everyone should be able

More information

Vodia PBX RESTful API (v2.0)

Vodia PBX RESTful API (v2.0) Vodia PBX RESTful API (v2.0) 2015 Vodia Networks Inc. All rights reserved. Page 1 of 30 Contents Login... 3 Get license info... 4 Get a complete list of domains... 5 Get the details of a specific domain...

More information

CloudOYE CDN USER MANUAL

CloudOYE CDN USER MANUAL CloudOYE CDN USER MANUAL Password - Based Access Logon to http://mycloud.cloudoye.com. Enter your Username & Password In case, you have forgotten your password, click Forgot your password to request a

More information

Lecture 2. Internet: who talks with whom?

Lecture 2. Internet: who talks with whom? Lecture 2. Internet: who talks with whom? An application layer view, with particular attention to the World Wide Web Basic scenario Internet Client (local PC) Server (remote host) Client wants to retrieve

More information

FTP: the file transfer protocol

FTP: the file transfer protocol File Transfer: FTP FTP: the file transfer protocol at host FTP interface FTP client local file system file transfer FTP remote file system transfer file to/from remote host client/ model client: side that

More information

CSCI-1680 SMTP Chen Avin

CSCI-1680 SMTP Chen Avin CSCI-1680 Chen Avin Based on Computer Networking: A Top Down Approach - 6th edition Electronic Three major components: s s simple transfer protocol: User Agent a.k.a. reader composing, editing, reading

More information

Internet Technologies 4-http. F. Ricci 2010/2011

Internet Technologies 4-http. F. Ricci 2010/2011 Internet Technologies 4-http F. Ricci 2010/2011 Content Hypertext Transfer Protocol Structure of a message Methods Headers Parameters and character encoding Proxy Caching HTTP 1.1: chunked transfer and

More information

All You Can Eat Realtime

All You Can Eat Realtime HTML5 WebSocket: All You Can Eat Realtime By Peter Lubbers, Kaazing May 14, 2010 1 About Peter Lubbers Director of Documentation and Training, Kaazing Co-Founder San Francisco HTML5 User Group http://www.sfhtml5.org/

More information

Internet Architecture

Internet Architecture Internet Architecture Lecture 10: How Email Work Assistant Teacher Samraa Adnan Al-Asadi 1 How Email Works Electronic mail, or email, might be the most heavily used feature of the Internet. You can use

More information

CPSC 360 - Network Programming. Email, FTP, and NAT. http://www.cs.clemson.edu/~mweigle/courses/cpsc360

CPSC 360 - Network Programming. Email, FTP, and NAT. http://www.cs.clemson.edu/~mweigle/courses/cpsc360 CPSC 360 - Network Programming E, FTP, and NAT Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu April 18, 2005 http://www.cs.clemson.edu/~mweigle/courses/cpsc360

More information