CHAPTER 26. Questions PRACTICE SET

Similar documents
1 Introduction: Network Applications

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

FTP and . Computer Networks. FTP: the file transfer protocol

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP - Message Format. The Client/Server model is used:

Evolution of the WWW. Communication in the WWW. WWW, HTML, URL and HTTP. HTTP Abstract Message Format. The Client/Server model is used:

File Transfer Protocol (FTP) Chuan-Ming Liu Computer Science and Information Engineering National Taipei University of Technology Fall 2007, TAIWAN

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

Chapter 2 Application Layer. Lecture 5 FTP, Mail. Computer Networking: A Top Down Approach

CS43: Computer Networks . Kevin Webb Swarthmore College September 24, 2015

Remote login (Telnet):

Internet Technology 2/13/2013

, SNMP, Securing the Web: SSL

Protocolo FTP. FTP: Active Mode. FTP: Active Mode. FTP: Active Mode. FTP: the file transfer protocol. Separate control, data connections

File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi

CPSC Network Programming. , FTP, and NAT.

Network Technologies

Application Example: WWW. Communication in the WWW. WWW, HTML, URL and HTTP. Loading of Web Pages. The Client/Server model is used in the WWW

FTP protocol (File Transfer Protocol)

EXPLORER. TFT Filter CONFIGURATION

CSCI-1680 SMTP Chen Avin

DATA COMMUNICATOIN NETWORKING

1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; SMTP.

Electronic Mail

Data Communication I

Applications and Services. DNS (Domain Name System)

Application-layer Protocols and Internet Services

The Application Layer. CS158a Chris Pollett May 9, 2007.

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

FTP: the file transfer protocol

M3-R3: INTERNET AND WEB DESIGN

HTTP. Internet Engineering. Fall Bahador Bakhshi CE & IT Department, Amirkabir University of Technology

Chapter 26 Remote Logging, Electronic Mail, 26.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Advanced Higher Computing. Computer Networks. Homework Sheets

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

Revised: 14-Nov-07. Inmarsat Fleet from Stratos MPDS Firewall Service Version 1.0

Streaming Stored Audio & Video

Networking Applications

Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview

Application Firewall Configuration Examples

FTP Use. Internal NPS FTP site instructions using Internet Explorer:

File Transfer Protocol (FTP) & SSH

SSL VPN Portal Options

Computer Networking LAB 2 HTTP

Device Log Export ENGLISH

Exchange Outlook Profile/POP/IMAP/SMTP Setup Guide

Internet Technologies Internet Protocols and Services

OCS Training Workshop LAB14. Setup

P and FTP Proxy caching Using a Cisco Cache Engine 550 an

Accessing the FTP Server - User Manual

TELSTRA BUSINESS MAIL QUICK REFERENCE GUIDE

DATA COMMUNICATOIN NETWORKING

Proxies. Chapter 4. Network & Security Gildas Avoine

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

Configuration Guide. LG KP501 Cookie. Congratulations for buying LG KP501 Cookie!

Appendix. Web Command Error Codes. Web Command Error Codes

LESSON Networking Fundamentals. Understand TCP/IP

Chapter 6 Virtual Private Networking Using SSL Connections

SSL VPN Technology White Paper

Pre Sales Communications

Exchange Outlook Profile/POP/IMAP/SMTP Setup Guide

WWA FTP/SFTP CONNECTION GUIDE KNOW HOW TO CONNECT TO WWA USING FTP/SFTP

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0

Immotec Systems, Inc. SQL Server 2005 Installation Document

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions

FTP: the file transfer protocol

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Using Avaya Aura Messaging

Fundamentals of the Internet 2009/ Explain meaning the following networking terminologies:

TCP/IP and the Internet

Introduction to Computer Security Benoit Donnet Academic Year

Network Working Group Request for Comments: 840 April Official Protocols

Domain Name System (DNS)

SFTP Server User Login Instructions. Open Internet explorer and enter the following url:

Using over FleetBroadband

loss-tolerant and time sensitive loss-intolerant and time sensitive loss-intolerant and time insensitive

Configuring your client to connect to your Exchange mailbox

THE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6

Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)

Migrating helpdesk to a new server

FILE TRANSFER PROTOCOL INTRODUCTION TO FTP, THE INTERNET'S STANDARD FILE TRANSFER PROTOCOL

SQA Higher Computing Unit 3b Computer Networking

Business mail 1 MS OUTLOOK CONFIGURATION... 2

TOE2-IP FTP Server Demo Reference Design Manual Rev1.0 9-Jan-15

IP Filtering for Patton RAS Products

Advantage for Windows Copyright 2012 by The Advantage Software Company, Inc. All rights reserved. Client Portal blue Installation Guide v1.

File Transfer with Secure FTP

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Business Internet service from Bell User Guide

Chapter 5 Configuring the Remote Access Web Portal

Multi-Homing Dual WAN Firewall Router

Quick Scan Features Setup Guide. Scan to Setup. See also: System Administration Guide: Contains details about setup.

Chapter 3 Restricting Access From Your Network

Writing for Developers: The New Customers. Amruta Ranade

The Web: some jargon. User agent for Web is called a browser: Web page: Most Web pages consist of: Server for Web is called Web server:

TECHNICAL DOCUMENT. EXPLORER How to tweak Windows applications

File transfer clients manual File Delivery Services

How to Make the Client IP Address Available to the Back-end Server

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Transcription:

CHAPTER 26 PRACTICE SET Questions Q26-. Probably Alice turned off her desktop, which stopped the FTP server, when she left the office. A server process should be running all the time, waiting for clients to access it. Q26-3. In an HTTP request message, a blank line signals the end of the headers and the beginning of the body of the message, if any. Q26-5. One example can be the use of a remote control when we are watching TV. The remote control establishes a control connection with the TV set, which is separate from one-way multimedia connection. Q26-7. FTP definitely cannot use the services of UDP for control connection because the client and the server need to be connected during the whole session. Since UDP is not a connection-oriented protocol, it cannot do this task. FTP does not use the services of UDP during data transmission for another reason. A file to be transferred may be too large to fit in a single user datagram (UDP packet). In addition, UDP is not a reliable transport-layer protocol; for file transfer, reliability is an important issue. TCP is more appropriate for this purpose. Q26-9. If the control connection is severed during a session, no more control information can be exchanged between the client control process and the server control process. Since the control connection and the data connection are two separate TCP connections, the severance of the control connection has no effect on the current data connection. However, when the current data connection is terminated, no new data connection can be made until the control connection is again established. Q26-. The answer is no. Data-transfer activity is controlled by the client. If a file needs to be transferred from the client site to the server site, the client needs to store it at the server site. Q26-3. FTP allows the client to define the file format it can receive or send; the server needs to use the format acceptable to the client when sending a file and to accept the format used by the client when receiving a file.

2 Q26-5. The file (or list of directories or files, which is consider as a file) is transmitted using stream mode (default), block mode, or compressed mode. The mode is determined by the client using the MODE command. In the stream mode, no header is added to the file bytes; in the other two modes, a header is added to the beginning of the file to show information about blocking or compressing. Q26-7. The answer is no. We cannot have a data-transfer connection without a control connection. The data-transfer connection is established with one or more commands issued from a client; there should be a control connection to allow the client to issue these commands. Q26-9. It depends on how the file is stored on the server. If the file is stored as a web page, embedded in an HTML document, we need to use HTTP to download the file. On the other hand, if the file is stored on the server without having been embedded in an HTML document, then we need to download it using FTP. Q26-2. The MAIL FROM in the envelope contains the source e-mail address while the FROM in the header contains the name of the sender. Q26-23. The client changes the ASCII character to NVT characters. The server changes NVT characters to EBCDIC. Q26-25. When a host logs into a remote computer, it can use all services available on that host. Since an FTP or an HTTP server provides services, the user can use these services. As a matter of fact, the TELNET interface allows the user to define the port number of the server she wants to use. Problems P26-. The following shows a possible request and response: a. A possible request GET /usr/users/doc HTTP /. Date: Fri, 26-Nov-04 6:46:23 GMT MIME-version:.0 Accept: image/gif Accept: image/jpeg Last modified: Mon, 22-Nov-04 b. A possible response HTTP/. 200 OK Date: Fri, 26-Nov-04 6:46:26 GMT Challenger MIME-version:.0 Content-length: 4623 (Body of document)

3 P26-3. The following shows a simple situation. A portal is a special site that holds the often-visited URLs for each client. The cookie stored in the browser under the name of the portal holds the list of the sites the user normally needs to check periodically. When the user clicks on the portal web page, a request is sent with the cookie to the portal site with the list of desired web pages. The portal then fetches the current pages from the corresponding site, compiles a page, and sends it to the browser. Portal cookie Site Site 2 Client Portal Site Site 2 + cookie 2 4 P 3 P P 2 6 P 2 5 P26-5. The following shows a simple example. In part a, the request can be responded to by the proxy server. In part b, the proxy needs to send the request to the true server. When the response is received, the proxy server saves it in the cache for future use, and then sends it to the client. Client Proxy Server Internet Answer to part a Response 2 Answer to part b Add resposne to the cache 2 Response 3 Response 4 Time Time Time

4 P26-7. P26-9. HTTP provides some presentation features, using the request and response headers. For example, HTTP messages can define the format and the language of the messages exchanged, which is a kind of presentation. MIME-version:. Content-Type: Text/Plain Content-Transfer-Encoding: 7bit P26-. Since there are several programs to do the job, we post on the book web site. See extra materials for Chapter 26. P26-3. The result is "Vw/w" in ASCII as shown below: Original: 000 0000 0000 Grouped by six: 000 0000 0000 Base64: 2 48 63 48 ASCII: V w / w P26-5. The following shows the four states and the transitions from one state to another. All messages marked for delete become effective and TCP connection is terminated. Client issues QUIT command. Update Closed Transaction The client and server exchange commands and responses. Mails are retrieved. Start Authorization TCP connection is established. The client is authenticated for the server. P26-7. The following gives the meaning and usage of each command: a. The UIDL (unique ID listing) is used by the client to provide a unique identifier for the message (if used with an argument) or for all messages (if no argument is used).

5 b. The TOP command, always with two arguments, is used by the client to ask the server to return the top lines of a particular message. In this case, it means to return the top 5 lines of message. c. The USER command is used by the client to define its user identification. d. The PASS command is used by the client to define its password. P26-9. The following shows an example. We have shown only part of the transaction (when the client starts retrieving the message): RETR +OK 230 octets. DELE +OK message deleted RETR 2 OK 400 octets. DELE 2 +OK message 2 deleted // Message contents // Dot means end of mail // Message contents // Dot means end of mail P26-2. SMTP does not create a session between the client and sender in which the client can send some e-mails in a single session. The e-mails need to be sent one by one. However, POP3 allows the user to retrieve all e-mails received in the mailbox in one session. P26-23. The following shows the commands and responses. The file mode in this case needs to be C (compressed). 220 (Service ready) USER Jane 33 (User name OK. Password?) PASS xxxx 220 (User login OK) PORT 607 50 (Data connection will open shortly) STRU F 200 (OK) TYPE E 200 (OK)

6 MODE C 200 (OK) RETR /usr/users/report/huge 25 (Data connection OK) Transferring the file from the server to the client 226 (Closing data connection) Quit 22 (Server closing) P26-25. The following shows the set of commands and responses. Note that there is no data transfer connection in this; we have only a control connection. We need to give the name of the file to be renamed (/usr/users/report/file) and then the new name (/usr/top/letters/file). 220 (Service ready) USER Maria 33 (User name OK. Password?) PASS xxxx 220 (User login OK) RNFR /usr/users/report/file 200 (Command OK) RNTO /usr/top/letters/file 200 (Command OK) Quit 22 (Server closing)