APPLICATION LAYER: TELNET, EMAIL. By Nidhi Jindal



Similar documents
Chapter 26 Remote Logging, Electronic Mail, 26.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

Networking Applications

Remote Logging. Tanveer Brohi(14cs28)

Monitoring and Troubleshooting Microsoft Exchange Server 2007 (5051A) Course length: 2 days

Libra Esva. Whitepaper. Glossary. How Really Works. Security Virtual Appliance. May, It's So Simple...or Is It?

ASUS WL-5XX Series Wireless Router Internet Configuration. User s Guide

Remote login (Telnet):

Configuring Your Client: Eudora 5.x. Quick Reference

Electronic Mail

Configuring Your Client: Eudora 5.x

SME- Mail to SMS & MMS Gateway with NowSMS Quick Start Guide

How To Configure L2TP VPN Connection for MAC OS X client

CONTENTS ACTIONTEC DSL MODEM: 3. DSL Kit Contents 3 CONFIGURING YOUR COMPUTER: 5. Static IP Address Setup 5 Dynamic IP Address Setup 7

Setting up VPN Access for Remote Diagnostics Support

NETWORK SETUP GLOSSARY

Chapter 2 Preparing Your Network

VPN Overview. The path for wireless VPN users

Multi-Homing Dual WAN Firewall Router

How To Configure A Vyatta As A Ds Internet Connection Router/Gateway With A Web Server On A Dspv.Net (Dspv) On A Network With A D

Network Basics GRAPHISOFT. for connecting to a BIM Server (version 1.0)

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Broadband Phone Gateway BPG510 Technical Users Guide

Prestige 324. Prestige 324. Intelligent Broadband Sharing Gateway. Version 3.60 January 2003 Quick Start Guide

How To Remotely View Your Security Cameras Through An Ezwatch Pro Dvr/Camera Server On A Pc Or Ipod (For A Small Charge) On A Network (For An Extra $20) On Your Computer Or Ipo (For Free

CallPilot. Release 2.0. Desktop Messaging User Guide for Novell GroupWise

How to Remotely View Security Cameras Using the Internet

VOICE OVER IP USER S MANUAL

High-Speed Broadband Internet Guide

SOHO 6 Wireless Installation Procedure Windows 95/98/ME with Internet Explorer 5.x & 6.0

MacroLan Azure cloud tutorial.

Small Business Server Part 2

CS43: Computer Networks . Kevin Webb Swarthmore College September 24, 2015

Prestige 314 Read Me First

Experiment # 6 Remote Access Services

Brother Automatic Printing OPERATION MANUAL

Chapter 1 Installing the Gateway

High-Speed Broadband Internet Guide

Chapter 10 Troubleshooting

H3C SSL VPN RADIUS Authentication Configuration Example

Lecture 2. Internet: who talks with whom?

Prestige 310. Cable/xDSL Modem Sharing Router. User's Guide Supplement

Lab 2 - Basic Router Configuration

PC/POLL SYSTEMS Version 7 Polling SPS2000 Cash Register TCP/IP Communications

Using the DNP3.0 Protocol via Digi Device Servers and Terminal Servers

Chapter 5. Data Communication And Internet Technology

Chapter 2 Application Layer. Lecture 5 FTP, Mail. Computer Networking: A Top Down Approach

Digi Connect WAN Application Guide Using the Digi Connect WAN and Digi Connect VPN with a Wireless Router/Access Point

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

1. Hardware Installation

Check Your Package Contents. CD-ROM containing Manual and Warranty

Configuring Your Client: Outlook Express. Quick Reference

If you are unable to set up your Linksys Router by using one of the above options, use the steps below to manually configure your router.

BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8

Matrix Technical Support Mailer 167 NAVAN CNX200 PPTP VPN with Windows Client

FINS Gateway For OMRON PLCs

UIP1868P User Interface Guide

networking revision B

Vantage RADIUS 50. Quick Start Guide Version 1.0 3/2005

FTP and . Computer Networks. FTP: the file transfer protocol

Quick Installation Guide DSL-2640U. Wireless N 150 ADSL2+ Modem Router

iseries TCP/IP routing and workload balancing

Technical Support Information Belkin internal use only

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Broadband Router ESG-103. User s Guide

STATIC IP SET UP GUIDE VERIZON 7500 WIRELESS ROUTER/MODEM

TCP/IP and the Internet

Mail agents. Introduction to Internet Mail. Message format (2) Authenticating senders

All existing accounts will be listed. 2. Click Add and select Mail to add a new account (see Figure 2). Figure 1. Figure 2

Fundamentals of a Windows Server Infrastructure MOC 10967

Advanced Higher Computing. Computer Networks. Homework Sheets

Prestige 650R-31/33 Read Me First

Attachment E ACCESSING THE FCC NETWORK USING WINDOWS 95/98 FOR ULS FILING

Introduction to Computer Networks and Data Communications

ETHERNET WEATHER STATION CONNECTIONS Application Note 33

OUTDOOR IR NETWORK CAMERA Series

Configuring the OfficeConnect Secure Gateway for a remote L2TP over IPSec connection

Linux Network Administration

Technology/Internet Usage Workshop

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Configuring Your Client: Outlook Express

Guidelines for Using an Ethernet Printer. - Mac OS X - Rev. 1.0

Internet Broadband Router XRT-501. Quick Installation Guide

CMSI 182 Intro to Computer Science. Week 13 Tuesday B.J. Johnson Doolan :25 10:40

BASIC ANALYSIS OF TCP/IP NETWORKS

Appendix C Network Planning for Dual WAN Ports

Sage ERP Accpac Online

Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, Page 1

Westell VERSALINK GATEWAY (MODEL 327W) Quick Start Guide Rev. A May 2004

Prestige 324 Quick Start Guide. Prestige 324. Intelligent Broadband Sharing Gateway. Version V3.61(JF.0) May 2004 Quick Start Guide

Local Area Networks: Software and Support Systems

Internet Service Guide

Transcription:

APPLICATION LAYER: TELNET, EMAIL. By Nidhi Jindal

TELNET In the Internet, users may want to run application programs at a remote site & create results that can be transferred to their local site. Students may want to connect to their university computer lab from their home to access application programs like major/minor projects. One way to satisfy that demand is to create a client/server application program for each service, BUT it s not possible to write specific program for each demand. Better way, A general purpose p client/server program that lets a user access any application program on a remote computer Like Allow the user to log on to a remote computer. After logging on user can use the services available on the remote computer & transfer result back to local computer.

Introduction: TELNET Telnet is a popular general purpose client-server application program. TELNET is an abbreviation for Terminal Network. TELNET enables the establishment of a connection to a remote system in such a way that the locall terminal appears to be a terminal at the remote system. Interaction between a user and a the computer occurs through a terminal User has an identification and password. User logs into the system with a user id and password to prevent unauthorized user from accessing the resources

Client-Server Model

Local Login

Local Login When a user logs into a local time-sharing system, it is called Local Login. As a user types at a terminal, the keystrokes are accepted by the terminal driver. The terminal driver passes the characters to the O/S The O/S, in turn, interprets the combination of characters & invokes the desired application program or utility.

Remote Login

Concept of NVT

REMOTE LOGIN When a user wants to access an application program or utility located on a remote machine, he or she performs remote login. Here the TELNET client and server programs come into use. The user sends the keystrokes to the terminal driver where the local O/S accepts the characters but doesn t interpret them. The characters are sent to the TELNET client, which transforms the characters to a universal character set called network virtual it terminal characters and delivers them to the local TCP/IP The commands or text in NVT form travel through the internet and arrive at the TCP/IP at the remote machine.

REMOTE LOGIN Characters are delivered to the OS and passed to the telnet server to the corresponding characters understandable by the remote computer Characters cannot be passed directly to the operating system because the remote Os is not designed to receive the characters from a TELNET server. It can receive from terminal driver. So, a pseudo terminal server is added which acts like as if characters are coming from locall terminal. OS passes the characters to the appropriate application program.

Network Virtual Terminal (NVT) Mechanism to access remote computer is complex. Every computer and its OS accepts special combination of characters. Ex: end of file in DOS is ctrl+z and is UNIX is ctrl+ d If we want to access any remote computer in the world, we first must know to what type of computer we will be connected, and we also must install the specific terminal emulator used by that computer. TELNET solves this problem by defining a universal interface called the Network Virtual Terminal (NVT) character set. Via this interface, the client TELNET translates characters (date or command) that come from the local terminal into NVT form & delivers them to the network. The server TELNET, on the other hand, translates data & commands from NVT form into the form acceptable by the remote computer.

ELECTRONIC MAIL

Step A: Sender creates and sends an email The originating sender creates an email in their Mail User Agent (MUA) and clicks 'Send'. The MUA is the application the originating sender uses to compose and read email, such as Eudora, Outlook, etc.

Step B: Sender's MDA/MTA routes the email Sender s MTA accepts the email, then routes it to local mailboxes or forwards it if it isn't locally addressed. It forwards and enters the first of a series of "network clouds," labelled as a "Company Network" cloud. When we send an email, the email client finds the mail server using the domain name system and contacts it using the simple mail transfer protocol

Step C: Network cloud An email can encounter a network cloud within a large company or the largest network cloud in existence: the Internet. The network cloud may encompass a multitude of mail servers, DNS servers, routers. Email service providers and other companies that process a large volume of email often have their own, private network clouds. These organizations commonly have multiple mail servers, and route all email through a central gateway server (i.e., mail hub) that redistributes mail to whichever MTA is available. Email on these secondary MTAs must usually wait for the primary MTA (i.e., the designated host for that domain) to become available, at which time the secondary mail server will transfer its messages to the primary MTA.

Secondary MTA1 Sender s UA Secondary MTA2 CENTRAL GATEWAY SERVER Secondary MTAn Actual mail transfer is done through mail transfer agent

ARCHITECTURE To explain the architecture of email, we give four scenarios. We begin with the simplest situation and add complexity as we proceed. The fourth scenario is the most common in the exchange of email. The topics discussed in this section include: First Scenario Second Scenario Third Scenario Fourth Scenario

Note: When the sender and the receiver of an email are on the same system, we need only two user agents.

FIRST SCENARIO In the first scenario, the sender and the receiver of the e-mail are users (or application programs) on the same system; they are directly connected to a shared system. Theadministrator i has created one mailbox for each user where the received messages are stored. A mailbox is part of a local hard drive, a special file with permission restrictions. Only the owner of the mailbox has access to it.

First scenario When the sender and the receiver of an e-mail are on the same system, we need only two user agents

Note: When the sender and the receiver of an email are on different systems, we need two UAs and a pair of MTAs (client and server).

SECOND SCENARIO In the second scenario, the sender and the receiver of the e-mail are users on two different systems. The message needs to be sent over the Internet. Here we need user agents (VAs) and message transfer agents (MTAs)

Second scenario

Note: When the sender is connected to the mail server via a LAN or a WAN, we need two UAs and two pairs of MTAs (client and server).

Third scenario

THIRD SCENARIO InthethirdscenarioBisdirectly connected to his system A is connected to the system via a point-to-point WAN, such as a dial-up modem, a DSL, or a cable modem; or is connected to a LAN in an organization that uses one mail server for handling e-mails-all users need to send their messages to this mail server. A still needs a user agent to prepare message. And needs to send the message through the LAN or WAN. Whenever A has a message to send, calls the user agent which, in tern, calls the MTA client. The MTA client establishes a connection with the MTA server on the system, which is running all the time.

Note: When both sender and receiver are connected to the mail server via a LAN or a WAN, we need two UAs, two pairs of MTAs (client and server), and a pair of MAAs (client and server). This is the most common situation today.

Fourth scenario

At the A s side When we want to send the email we create a message using user agent. When we send an email, the email client finds the mail server using the domain name system and contacts it using the simple mail transfer protocol Once the mail server has been contacted, the message is sent and the email client then proceeds to send any further pending messages At the B s side To collect mail a similar procedure is followed Using the Post Office Protocol (POP), with the email client sending an account name & password to tell the mail server who's mail to collect before collecting waiting messages, which h are then collected one at a time.

Format of an email

E mail Address

USER AGENT The user agent (UA) provides service to the user to make the process of sending and receiving a message easier. The topics discussed in this section include: Services Provided by a User Agent User Agent Types Sending Mail Receiving Mail Addresses Mailing List MIME

User agent

Note: Some examples of command-driven user agents are mail, pine, and elm f Pine :Program for Internet News and E-mail they provide License to mail server organizations. Elm : Electronic mail. its basically written in C language.

Note: Some examples of GUI-based user agents are Eudora, Outlook, and Netscape.

Application TELNET is used in remote login and remote computing Email is used for formal and informal communication.

Assignment What is the use of Virtual Terminal in Remote computing? Write the functions of MUA and MTA.