SlideShare a Scribd company logo
1 of 29
Chapter 26 SMTP and FTP
26.1  Electronic Mail Sending/Receiving Mail Addresses User Agent MIME Mail Transfer Agent Mail Access Protocols
Figure 26.1   Format of an email
Figure 26.2   Email address
Figure 26.3   User agent
Some examples of command-driven user agents are mail, pine, and elm. Note :
Some examples of GUI-based user agents are Eudora, Outlook, and Netscape. Note :
Figure 26.4   MIME
Figure 26.5   MIME header
Table 26.1 Data types and subtypes in MIME   General binary data (8-bit bytes) Octet-Stream Adobe PostScript PostScript Application Single-channel encoding of voice at 8 KHz Basic Audio Video is in MPEG format MPEG Video Video is in GIF format GIF Image is in JPEG JPEG Image Body is a reference to another message Ext. Body Partial RFC822 Alternative Digest Parallel Mixed Plain Subtype Body is a fragment of a bigger message Body is an encapsulated message Message Parts are different versions of the same message Similar to mixed, but the default is message/RFC822 Same as above, but no order Body contains ordered parts of different data types Multiport Unformatted text Text Description Type
Table 26.2  Content-transfer encoding Non-ASCII characters are encoded as an equal sign followed by an ASCII code 6-bit blocks of data are encoded into 8-bit ASCII characters Non-ASCII characters with unlimited-length lines Non-ASCII characters and short lines ASCII characters and short lines Description Base64 Binary 8bit  7bit  Type Category
Figure 26. 6   Base64
Table 26.3  Base64 encoding table 2 1 0 z y x w v u t s Code 63 62 61 60 59 58 57 56 55 Value / + 9 8 7 6 5 4 3 Code 43 42 41 40 39 38 37 36 35 34 33 Value r q p o n m l k j i h Code 54 53 52 51 50 49 48 47 46 45 44 Value V U T S R Q P O N M L Code 32 31 30 29 28 27 26 25 24 23 22 Value g f e d c b a Z Y X W Code 21 20 19 18 17 16 15 14 13 12 11 Value K J I H G F E D C B A Code 9 10 6 7 8 3 4 5 2 1 0 Value
Figure 26.7   Quoted-printable
Figure 26.8   MTA client and server
Figure 26.9   Commands and responses
Figure 26.10   Email delivery
Figure 26.11   POP3
26.2  File Transfer  Connections Communication File Transfer User Interface Anonymous
FTP uses the services of TCP. It needs two TCP connections. The well-known port 21 is used for the control connection, and the well-known port 20 is used for the data connection. Note :
Figure 26.12   FTP
Figure 26.13   Using the control connection
Figure 26.14   Using the data connection
Figure 26.15   File transfer
Example 1 ,[object Object],[object Object],[object Object],[object Object]
Figure 26.16   Example 1
Table 26.4  List of FTP commands in UNIX !, $, account, append, ascii, bell, binary, bye, case, cd, cdup, close, cr, delete, debug, dir, discount, form, get, glob, hash, help, lcd, ls, macdef, mdelete, mdir, mget, mkdir, mls, mode, mput, nmap, ntrans, open, prompt, proxy, sendport, put, pwd, quit, quote, recv, remotehelp, rename, reset, rmdir, runique, send, status, struct, sunique, tenex, trace, type, user, verbose,? Commands
Example 2 We show some of the user interface commands that accomplish the same task as in Example 1. The user input is shown in boldface. As shown below, some of the commands are provided automatically by the interface. The user receives a prompt and provides only the arguments. $  ftp challenger.atc.fhda.edu Connected to challenger.atc.fhda.edu 220 Server ready Name:  forouzan Password:  xxxxxxx ftp >  ls /usr/user/report 200 OK 150 Opening ASCII mode ........... ........... 226 transfer complete ftp >  close 221 Goodbye ftp >  quit
Example 3 We show an example of using anonymous FTP. We connect to internic.net, where we assume there are some public data available. $  ftp internic.net Connected to internic.net 220 Server ready Name:  anonymous 331 Guest login OK, send "guest" as password Password:  guest ftp >  pwd 257 '/' is current directory ftp >  ls 200 OK 150 Opening ASCII mode bin ... ftp >  close 221 Goodbye ftp >  quit

More Related Content

What's hot

What's hot (20)

Error Detection and Correction
Error Detection and CorrectionError Detection and Correction
Error Detection and Correction
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
2. data and signals
2. data and signals2. data and signals
2. data and signals
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Ch24
Ch24Ch24
Ch24
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Subnetting supernetting
Subnetting supernettingSubnetting supernetting
Subnetting supernetting
 
Ip addressing classful
Ip addressing classfulIp addressing classful
Ip addressing classful
 
icmp , igmp
icmp , igmpicmp , igmp
icmp , igmp
 
Intermediate code generation (Compiler Design)
Intermediate code generation (Compiler Design)   Intermediate code generation (Compiler Design)
Intermediate code generation (Compiler Design)
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
Chapter 27
Chapter 27Chapter 27
Chapter 27
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link Layer
 
Network layer logical addressing
Network layer logical addressingNetwork layer logical addressing
Network layer logical addressing
 
Chapter 7: Transmission Media
Chapter 7: Transmission MediaChapter 7: Transmission Media
Chapter 7: Transmission Media
 
Computer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error CorrectionComputer Networks - Error Detection & Error Correction
Computer Networks - Error Detection & Error Correction
 
Error Detection And Correction
Error Detection And CorrectionError Detection And Correction
Error Detection And Correction
 
Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)Parity check(Error Detecting Codes)
Parity check(Error Detecting Codes)
 
Point to-point protocol (ppp)
Point to-point protocol (ppp)Point to-point protocol (ppp)
Point to-point protocol (ppp)
 

Viewers also liked (20)

Email - Electronic Mail
Email - Electronic MailEmail - Electronic Mail
Email - Electronic Mail
 
CFIMAP & CFPOP
CFIMAP & CFPOPCFIMAP & CFPOP
CFIMAP & CFPOP
 
Ch 20
Ch 20Ch 20
Ch 20
 
Ch 31
Ch 31Ch 31
Ch 31
 
Ch 27
Ch 27Ch 27
Ch 27
 
Ch 28
Ch 28Ch 28
Ch 28
 
Ch 29
Ch 29Ch 29
Ch 29
 
Ch 24
Ch 24Ch 24
Ch 24
 
Ch 16
Ch 16Ch 16
Ch 16
 
Ch 07
Ch 07Ch 07
Ch 07
 
Ch 12
Ch 12Ch 12
Ch 12
 
Ch 23
Ch 23Ch 23
Ch 23
 
Ch 18
Ch 18Ch 18
Ch 18
 
Ch14
Ch14Ch14
Ch14
 
Ch 30
Ch 30Ch 30
Ch 30
 
Ch 14
Ch 14Ch 14
Ch 14
 
Ch 25
Ch 25Ch 25
Ch 25
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Ch 02
Ch 02Ch 02
Ch 02
 
Ch 13
Ch 13Ch 13
Ch 13
 

Similar to Ch 26

Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferWayne Jones Jnr
 
26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_TransferAhmar Hashmi
 
transfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imaptransfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imapAKSHIT KOHLI
 
Network_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.pptNetwork_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.pptBlackHat41
 
Introduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerIntroduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerVNIT-ACM Student Chapter
 
Chap 02
Chap 02Chap 02
Chap 02IGNOU
 
Protocol Ppt[1]
Protocol Ppt[1]Protocol Ppt[1]
Protocol Ppt[1]anil933
 
2.(3)OSI and TCP layer.ppt
2.(3)OSI and TCP layer.ppt2.(3)OSI and TCP layer.ppt
2.(3)OSI and TCP layer.pptprashant554034
 
OSI open system interconnection LAYERS.pdf
OSI open system interconnection LAYERS.pdfOSI open system interconnection LAYERS.pdf
OSI open system interconnection LAYERS.pdfgadisaAdamu
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfabdnazar2003
 
DomainNamingServer and its objectives.ppt
DomainNamingServer and its objectives.pptDomainNamingServer and its objectives.ppt
DomainNamingServer and its objectives.pptcollegecode4u
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.pptBlaqray1998
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.pptBlaqray1998
 
Meeting 11. electronic mail: smtp
Meeting 11. electronic mail: smtpMeeting 11. electronic mail: smtp
Meeting 11. electronic mail: smtpSyaiful Ahdan
 

Similar to Ch 26 (20)

Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
 
Chapter 26
Chapter 26Chapter 26
Chapter 26
 
26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer
 
transfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imaptransfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imap
 
ch02.ppt
ch02.pptch02.ppt
ch02.ppt
 
Network_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.pptNetwork_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.ppt
 
Introduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerIntroduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link Layer
 
Chap 02
Chap 02Chap 02
Chap 02
 
Protocol Ppt[1]
Protocol Ppt[1]Protocol Ppt[1]
Protocol Ppt[1]
 
2.(3)OSI and TCP layer.ppt
2.(3)OSI and TCP layer.ppt2.(3)OSI and TCP layer.ppt
2.(3)OSI and TCP layer.ppt
 
Lec2_CH02.PPT
Lec2_CH02.PPTLec2_CH02.PPT
Lec2_CH02.PPT
 
OSI open system interconnection LAYERS.pdf
OSI open system interconnection LAYERS.pdfOSI open system interconnection LAYERS.pdf
OSI open system interconnection LAYERS.pdf
 
Ch02.ppt
Ch02.pptCh02.ppt
Ch02.ppt
 
CCNA Day 1
CCNA Day 1CCNA Day 1
CCNA Day 1
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
 
Ftp
FtpFtp
Ftp
 
DomainNamingServer and its objectives.ppt
DomainNamingServer and its objectives.pptDomainNamingServer and its objectives.ppt
DomainNamingServer and its objectives.ppt
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.ppt
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.ppt
 
Meeting 11. electronic mail: smtp
Meeting 11. electronic mail: smtpMeeting 11. electronic mail: smtp
Meeting 11. electronic mail: smtp
 

More from soumya ranjan mohanty (14)

Ch 22
Ch 22Ch 22
Ch 22
 
Ch 21
Ch 21Ch 21
Ch 21
 
Ch 17
Ch 17Ch 17
Ch 17
 
Ch 19
Ch 19Ch 19
Ch 19
 
Ch 15
Ch 15Ch 15
Ch 15
 
Ch 10
Ch 10Ch 10
Ch 10
 
Ch 11
Ch 11Ch 11
Ch 11
 
Ch 09
Ch 09Ch 09
Ch 09
 
Ch 08
Ch 08Ch 08
Ch 08
 
Ch 06
Ch 06Ch 06
Ch 06
 
Ch 05
Ch 05Ch 05
Ch 05
 
Ch 04
Ch 04Ch 04
Ch 04
 
Ch 03
Ch 03Ch 03
Ch 03
 
Ch 1
Ch 1Ch 1
Ch 1
 

Recently uploaded

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Ch 26

  • 1. Chapter 26 SMTP and FTP
  • 2. 26.1 Electronic Mail Sending/Receiving Mail Addresses User Agent MIME Mail Transfer Agent Mail Access Protocols
  • 3. Figure 26.1 Format of an email
  • 4. Figure 26.2 Email address
  • 5. Figure 26.3 User agent
  • 6. Some examples of command-driven user agents are mail, pine, and elm. Note :
  • 7. Some examples of GUI-based user agents are Eudora, Outlook, and Netscape. Note :
  • 8. Figure 26.4 MIME
  • 9. Figure 26.5 MIME header
  • 10. Table 26.1 Data types and subtypes in MIME General binary data (8-bit bytes) Octet-Stream Adobe PostScript PostScript Application Single-channel encoding of voice at 8 KHz Basic Audio Video is in MPEG format MPEG Video Video is in GIF format GIF Image is in JPEG JPEG Image Body is a reference to another message Ext. Body Partial RFC822 Alternative Digest Parallel Mixed Plain Subtype Body is a fragment of a bigger message Body is an encapsulated message Message Parts are different versions of the same message Similar to mixed, but the default is message/RFC822 Same as above, but no order Body contains ordered parts of different data types Multiport Unformatted text Text Description Type
  • 11. Table 26.2 Content-transfer encoding Non-ASCII characters are encoded as an equal sign followed by an ASCII code 6-bit blocks of data are encoded into 8-bit ASCII characters Non-ASCII characters with unlimited-length lines Non-ASCII characters and short lines ASCII characters and short lines Description Base64 Binary 8bit 7bit Type Category
  • 12. Figure 26. 6 Base64
  • 13. Table 26.3 Base64 encoding table 2 1 0 z y x w v u t s Code 63 62 61 60 59 58 57 56 55 Value / + 9 8 7 6 5 4 3 Code 43 42 41 40 39 38 37 36 35 34 33 Value r q p o n m l k j i h Code 54 53 52 51 50 49 48 47 46 45 44 Value V U T S R Q P O N M L Code 32 31 30 29 28 27 26 25 24 23 22 Value g f e d c b a Z Y X W Code 21 20 19 18 17 16 15 14 13 12 11 Value K J I H G F E D C B A Code 9 10 6 7 8 3 4 5 2 1 0 Value
  • 14. Figure 26.7 Quoted-printable
  • 15. Figure 26.8 MTA client and server
  • 16. Figure 26.9 Commands and responses
  • 17. Figure 26.10 Email delivery
  • 18. Figure 26.11 POP3
  • 19. 26.2 File Transfer Connections Communication File Transfer User Interface Anonymous
  • 20. FTP uses the services of TCP. It needs two TCP connections. The well-known port 21 is used for the control connection, and the well-known port 20 is used for the data connection. Note :
  • 22. Figure 26.13 Using the control connection
  • 23. Figure 26.14 Using the data connection
  • 24. Figure 26.15 File transfer
  • 25.
  • 26. Figure 26.16 Example 1
  • 27. Table 26.4 List of FTP commands in UNIX !, $, account, append, ascii, bell, binary, bye, case, cd, cdup, close, cr, delete, debug, dir, discount, form, get, glob, hash, help, lcd, ls, macdef, mdelete, mdir, mget, mkdir, mls, mode, mput, nmap, ntrans, open, prompt, proxy, sendport, put, pwd, quit, quote, recv, remotehelp, rename, reset, rmdir, runique, send, status, struct, sunique, tenex, trace, type, user, verbose,? Commands
  • 28. Example 2 We show some of the user interface commands that accomplish the same task as in Example 1. The user input is shown in boldface. As shown below, some of the commands are provided automatically by the interface. The user receives a prompt and provides only the arguments. $ ftp challenger.atc.fhda.edu Connected to challenger.atc.fhda.edu 220 Server ready Name: forouzan Password: xxxxxxx ftp > ls /usr/user/report 200 OK 150 Opening ASCII mode ........... ........... 226 transfer complete ftp > close 221 Goodbye ftp > quit
  • 29. Example 3 We show an example of using anonymous FTP. We connect to internic.net, where we assume there are some public data available. $ ftp internic.net Connected to internic.net 220 Server ready Name: anonymous 331 Guest login OK, send "guest" as password Password: guest ftp > pwd 257 '/' is current directory ftp > ls 200 OK 150 Opening ASCII mode bin ... ftp > close 221 Goodbye ftp > quit