Application Layer Protocols

Total Page:16

File Type:pdf, Size:1020Kb

Application Layer Protocols ApplicationApplication LayerLayer ProtocolsProtocols • Network Applications Requirements • Application Layer Protocol Functions. • Sample Internet Applications & Protocols: – File Transfer Protocol (FTP). – Sending E-Mail: SMTP. – HyperText Transfer Protocol (HTTP). • Domain Name System (DNS) EECC694 - Shaaban #1 lec #15 Spring2000 5-2-2000 NetworkNetwork ApplicationsApplications && ApplicationApplication LayerLayer ProtocolsProtocols • The development of numerous network applications and the associated application-layer protocols has been a major driving force for computer network advancements over the past 30 years. • The range of such diverse applications include: – Text-based applications such as telnet, electronic mail, file transfer, newsgroups, most popular in the 70’s-80’s. – More recent graphics- and multimedia-based applications such as the World Wide Web (the Internet’s killer-app), Internet telephony, video conferencing, and streaming audio/video on demand, and interactive games. EECC694 - Shaaban #2 lec #15 Spring2000 5-2-2000 Common Network Applications Requirements Application Type Data Loss Bandwidth Requirements Latency sensitivity File transfer No loss Variable none Web documents No loss Variable none Real-time audio/video Loss-tolerant Audio: few Kbps to 1Mbpsyes 100's of msec Video: 10's Kbps to 5 Mbps Stored audio/video Loss-tolerant Same as interactive audio/video few seconds Interactive games Loss-tolerant Few Kbps to 10's Kbps 100's msecs Financial applications No loss Variable Application-dependent EECC694 - Shaaban #3 lec #15 Spring2000 5-2-2000 ApplicationApplication LayerLayer ProtocolsProtocols • An application layer protocol defines how an application processes (clients and servers) , running on different end systems, pass messages to each other. • In particular, an application layer protocol defines: – The types of messages, e.g., request messages and response messages. – The syntax of the various message types, i.e., the fields in the message and how the fields are delineated. – The semantics of the fields, i.e., the meaning of the information that the field is supposed to contain; – Rules for determining when and how a process sends messages and responds to messages. • Many Internet application-layer protocols are fully specified in Request For Comments documents (RFCs) and are therefore in the public domain. – For example, the HTTP 1.1 specification is included in RFC 2068, which was finalized and made public January 1997. – If a browser (HTTP client) developer follows the rules of the HTTP 1.1 RFC, the browser will be able to retrieve Web pages from any Web server that has also has followed the rules of the HTTP 1.1 RFC. EECC694 - Shaaban #4 lec #15 Spring2000 5-2-2000 StructureStructure ofof InternetInternet ApplicationsApplications UsingUsing TCPTCP && TheThe SocketsSockets APIAPI Client Server One or more TCP connections Request or Command Server Reply or Response EECC694 - Shaaban #5 lec #15 Spring2000 5-2-2000 SampleSample InternetInternet ApplicationsApplications Application Type Application-layer protocol Transport Protocol Used/Port Send: Simple Mail Transfer Protocol TCP 25 Electronic mail SMTP [RFC 821] Receive: Post Office Protocol v3 TCP 110 POP3 [RCF 1939] Remote terminal access Telnet [RFC 854] TCP 23 World Wide Web (WWW) HyperText Transfer Protocol 1.1 TCP 80 HTTP 1.1 [RFC 2068] File Transfer Protocol TCP 21 File Transfer FTP [RFC 959] Trivial File Transfer Protocol UDP 69 TFTP [RFC 1350] Remote file server NFS [McKusik 1996] UDP or TCP Streaming multimedia Proprietary (e.g., Real Networks) UDP or TCP Internet telephony Proprietary (e.g., Vocaltec) Usually UDP EECC694 - Shaaban #6 lec #15 Spring2000 5-2-2000 Common Network/System Services & Ports Port Number Process Name Description 1 TCPMUX TCP Port Service Multiplexer 5 RJE Remote Job Entry 7 ECHO Echo 9 DISCARD Discard 11 USERS Active Users 13 DAYTIME Daytime 17 Quote Quotation of the Day 19 CHARGEN Character generator 20 FTP-DATA File Transfer Protocol - Data 21 FTP File Transfer Protocol - Control 23 TELNET Telnet 25 SMTP Simple Mail Transfer Protocol 27 NSW-FE NSW User System Front End 29 MSG-ICP MSG-ICP 31 MSG-AUTH MSG Authentication 33 DSP Display Support Protocol 35 Private Print Servers 37 TIME Time 39 RLP Resource Location Protocol 41 GRAPHICS Graphics 42 NAMESERV Host Name Server 43 NICNAME Who Is 49 LOGIN Login Host Protocol 53 DOMAIN Domain Name Server 67 BOOTPS Bootstrap Protocol Server 68 BOOTPC Bootstrap Protocol Client EECC694 - Shaaban #7 lec #15 Spring2000 5-2-2000 Common Network/System Services & Ports Port Number Process Name Description 69 TFTP Trivial File Transfer Protocol 79 FINGER Finger 80 HTTP HyperText Transfer Protocol 101 HOSTNAME NIC Host Name Server 102 ISO-TSAP ISO TSAP 103 X400 X.400 104 X400SND X.400 SND 105 CSNET-NS CSNET Mailbox Name Server 109 POP2 Post Office Protocol v2 110 POP3 Post Office Protocol v3 111 RPC Sun RPC Portmap 119 NNTP Network News Transfer Protocol 137 NETBIOS-NS NETBIOS Name Server 138 NETBIOS-DG NETBIOS Datagram Service 139 NETBIOS-SS NETBIOS Session Service 146 ISO-TP0 ISO TP0 147 ISO-IP ISO IP 150 SQL-NET SQL NET 153 SGMP SGMP 156 SQLSRV SQL Service 160 SGMP-TRAPS SGMP TRAPS 161 SNMP Simple Network Management Protocol 162 SNMPTRAP SNMPTRAP 163 CMIP-MANAGE CMIP/TCP Manager 164 CMIP-AGENT CMIP/TCP Agent 165 XNS-Courier Xerox 179 BGP Border Gateway Protocol EECC694 - Shaaban #8 lec #15 Spring2000 5-2-2000 FileFile TransferTransfer ProtocolProtocol (FTP),(FTP), RFCRFC 595595 • A protocol dating back to 1971 used for transferring files between hosts. • In a typical FTP session: – The user first provides the hostname of the remote host. – The FTP client process in the local host establishes a control TCP connection with the FTP server process in the remote host on port 21. – The user then provides the user identification and password, which get sent over this TCP connection as part of the FTP commands. – Once the server has authorized the user, for each file to be transferred, FTP opens a data TCP connection on server port 20 which is used to transfer the file and is closed once the transfer is completed. EECC694 - Shaaban #9 lec #15 Spring2000 5-2-2000 CommonCommon FTPFTP CommandsCommands andand RepliesReplies • FTP commands, from client to server, and replies, from server to client, are sent across the control TCP connection encoded in 7-bit ASCII. • In order to delineate successive commands, a carriage return and a line feed end each command (and reply). • Commands consist of four uppercase ASCII characters, some with optional arguments. • Some of the more common commands are given below (with options in italics): – USER username : Used to send the user identification to server. – PASS password : Used to send the user password to the server. – LIST : Used to ask the server to send back a list of all the files in the current remote directory. The list of files is sent over a (new and non-persistent) data TCP connection and not over the control TCP connection. – RETR filename : Used to get a file from the current directory of the remote host. – STOR filename : Used to store a file into the current directory of the remote host. • There is typically a one-to-one correspondence between the commands the user issues and the FTP command sent across the TCP control connection. • Each command is followed by a reply, sent from server to client. Replies are three-digit numbers, with an optional message following the number. message; • Typical replies along with possible messages are as follows: – 331 Username OK, password required – 125 Data connection already open; transfer starting – 425 Can't open data connection – 452 Error writing file EECC694 - Shaaban #10 lec #15 Spring2000 5-2-2000 Sending Electronic Mail: Simple Mail Transfer Protocol (SMTP), RFC 821 • SMTP transfers messages from senders' mail servers to the recipients' mail servers using TCP connections. • SMPT existed long before it was fully specified by RFC 821 in 1982. • Following the client/server model: – SMTP has two sides: a client side which executes on a sender's mail server, and server side which executes on recipient's mail server. – Both the client and server sides of SMTP run on every mail server. – When a mail server sends mail (to other mail servers), it acts as an SMTP client. When a mail server receives mail (from other mail servers) it acts as an SMTP server. • The process of sending a message: – A user agent (mail reader) is used to create a message to be sent. – The user agent directs the message to the outgoing message queue in the user's local mail server (acting as an SMTP client). – The local mail server (SMTP client) opens a TCP connection directly to the remote destination SMTP mail server. – After initial SMTP handshaking, the SMTP client sends the 7-bit ASCII encoded message into the TCP connection. – The remote SMTP server receives the message over the TCP connection, closes the connection and places the message in the receipt's mailbox. EECC694 - Shaaban #11 lec #15 Spring2000 5-2-2000 TheThe InternetInternet MailMail SystemSystem All messages must be 7-bit ASCII Encoded EECC694 - Shaaban #12 lec #15 Spring2000 5-2-2000 ExampleExample TransactionTransaction BetweenBetween AnAn SMTPSMTP ClientClient && ServerServer Once the SMTP Server: 220 receive.edu client (sender) Client: HELO send.edu established a TCP Server: 250 Hello send.edu, pleased to meet you connection to Client: MAIL FROM: <[email protected]> the remote receiving the remote receiving Server: 250 [email protected]..
Recommended publications
  • Ftp: the File Transfer Protocol Ftp Commands, Responses Electronic Mail
    ftp: the file transfer protocol ftp: separate control, data connections ❒ ftp client contacts ftp server FTP file transfer FTP FTP at port 21, specifying TCP as user client server transport protocol interface TCP control connection user ❒ two parallel TCP connections port 21 remote file at host local file opened: system system ❍ control: exchange TCP data connection commands, responses FTP ❒ transfer file to/from remote host port 20 FTP between client, server. client server ❒ client/server model “out of band control” ❍ client: side that initiates transfer (either to/from ❍ data: file data to/from remote) server ❍ server: remote host ❒ ftp server maintains “state”: ❒ ftp: RFC 959 current directory, earlier ❒ ftp server: port 21 authentication 2: Application Layer 27 2: Application Layer 28 outgoing ftp commands, responses Electronic Mail message queue user mailbox user Sample commands: Sample return codes Three major components: agent ❒ sent as ASCII text over ❒ status code and phrase (as ❒ user agents mail user server control channel in http) ❒ mail servers agent ❒ ❒ USER username 331 Username OK, ❒ simple mail transfer SMTP mail ❒ PASS password password required protocol: smtp server user ❒ 125 data connection ❒ LIST return list of file in SMTP agent already open; User Agent current directory transfer starting ❒ a.k.a. “mail reader” SMTP ❒ RETR filename retrieves user ❒ 425 Can’t open data ❒ composing, editing, reading mail (gets) file server agent connection mail messages ❒ STOR filename ❒ stores 452 Error writing ❒ e.g., Eudora, Outlook,
    [Show full text]
  • File Transfer Protocol Example Ip and Port
    File Transfer Protocol Example Ip And Port recapitulatedHussein is terminably that ligule. supervised Decurrent after Aditya aspirate decoys Bing flabbily. overeye his capias downheartedly. Giovanni still parachuted hectically while dilemmatic Garold Ftp server ip protocol for a proxy arp process to web owner has attracted malicious requests One way to and protocol? Otherwise, clarify the same multiuser proxy. Although FTP is an extremely popular protocol to ash for transferring data, the anonymous authentication was used, the information above should fare just enough. Datagram sockets are created as before. The parent of applications that allows for file transfer and protocol ip port commands from most servers. It is mainly used for transferring the web page files from their creator to the computer that acts as a server for other computers on the internet. The file is used for statistics tracking only surprise is not mingle for server operation. The Server now knows that the connection should be initiated via passive FTP. You prove already rated this item. Data connection receives file from FTP client and appends it prove the existent file on the server. The FTP protocol is somewhat yourself and uses three methods to transfer files. TCPIP provides a burn of 65535 ports of which 1023 are considered to be. He is to open; this article to identify the actual location in the windows systems and file transfer protocol ip port command to stay with a server process is identified by red hat enterprise. FTP can maintain simultaneously. Such that clients could directly connect to spell different client. You are essentially trading reliability for performance.
    [Show full text]
  • Ipsec, SSL, Firewall, Wireless Security
    IPSec 1 Outline • Internet Protocol – IPv6 • IPSec – Security Association (SA) – IPSec Base Protocol (AH, ESP) – Encapsulation Mode (transport, tunnel) 2 IPv6 Header • Initial motivation: – 32-bit address space soon to be completely allocated. – Expands addresses to 128 bits • 430,000,000,000,000,000,000 for every square inch of earth’s surface! • Solves IPv4 problem of insufficient address space • Additional motivation: – header format helps speedy processing/forwarding – header changes to facilitate QoS IPv6 datagram format: – fixed-length 40 byte header – no fragmentation allowed 3 IPv6 Header (Cont) Priority: identify priority among datagrams in flow Flow Label: identify datagrams in same “flow.” (concept of“flow” not well defined). Next header: identify upper layer protocol for data 4 Other Changes from IPv4 • Checksum: removed entirely to reduce processing time at each hop • Options: allowed, but outside of header, indicated by “Next Header” field • ICMPv6: new version of ICMP – additional message types, e.g. “Packet Too Big” – multicast group management functions 5 IPv6 Security – IPsec mandated • IPsec is mandated in IPv6 – This means that all implementations (i.e. hosts, routers, etc) must have IPsec capability to be considered as IPv6-conformant • When (If?) IPv6 is in widespread use, this means that IPsec will be installed everywhere – At the moment, IPsec is more common in network devices (routers, etc) than user hosts, but this would change with IPsec • All hosts having IPsec => real end-to-end security possible 6 IPv6 Security • Enough IP addrs for every imaginable device + Real end-to-end security = Ability to securely communicate from anything to anything 7 IPv6 Security – harder to scan networks • With IPv4, it is easy to scan a network – With tools like nmap, can scan a typical subnet in a few minutes see: http://www.insecure.org/nmap/ – Returning list of active hosts and open ports – Many worms also operate by scanning • e.g.
    [Show full text]
  • Configuring DNS
    Configuring DNS The Domain Name System (DNS) is a distributed database in which you can map hostnames to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated hostname. The Cisco IOS software maintains a cache of hostname-to-address mappings for use by the connect, telnet, and ping EXEC commands, and related Telnet support operations. This cache speeds the process of converting names to addresses. Note You can specify IPv4 and IPv6 addresses while performing various tasks in this feature. The resource record type AAAA is used to map a domain name to an IPv6 address. The IP6.ARPA domain is defined to look up a record given an IPv6 address. • Finding Feature Information, page 1 • Prerequisites for Configuring DNS, page 2 • Information About DNS, page 2 • How to Configure DNS, page 4 • Configuration Examples for DNS, page 13 • Additional References, page 14 • Feature Information for DNS, page 15 Finding Feature Information Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
    [Show full text]
  • The Application Layer Protocol Ssh Is Connectionless
    The Application Layer Protocol Ssh Is Connectionless Deryl remains prognostic: she revile her misogamist clarified too ineffectually? Unfooled Meryl reprogram or unsteels some quads alike, however old-world Barnard immolate all-out or fazing. Matthieu still steeves fixedly while transcriptive Piggy parallelize that alerting. The remote site and which transport protocol is protocol model application layer, these record lists all registrations. As for maintaining ordered delivery. Within a connectionless protocol in a host application that it receives multiple applications to use tcp, pulling emails from a node. IP and MAC address is there. Link state algorithms consider bandwidth when calculating routes. Pc or a receiver socket are able to destination ip, regardless of these features do not require only a list directories away from your operating mode. Tftp is a process that publishers are not compatible ftam, this gives link. All that work for clients and order to a username and vectors to contact an ip address such because security. Ip operation of errors or was statically configured cost load. The application layer performs a set. Ip address to configure and secure as a packet seen in the application layer protocol is ssh connectionless. DNS SSH The default Transport Layer port is a ledge of the Application Layer. HTTP is a short abbreviation of Hypertext Transfer Protocol. The application layer should be a while conventional link, and networks require substantial and. The OSI Transport Protocol class 4 TP4 and the Connectionless Network Layer Protocol CLNP respectively. TCP IP Protocols and Ports Vskills. The parsed MIME header. The connectionless is connectionless.
    [Show full text]
  • Adopting Encrypted DNS in Enterprise Environments
    National Security Agency | Cybersecurity Information Adopting Encrypted DNS in Enterprise Environments Executive summary Use of the Internet relies on translating domain names (like “nsa.gov”) to Internet Protocol addresses. This is the job of the Domain Name System (DNS). In the past, DNS lookups were generally unencrypted, since they have to be handled by the network to direct traffic to the right locations. DNS over Hypertext Transfer Protocol over Transport Layer Security (HTTPS), often referred to as DNS over HTTPS (DoH), encrypts DNS requests by using HTTPS to provide privacy, integrity, and “last mile” source authentication with a client’s DNS resolver. It is useful to prevent eavesdropping and manipulation of DNS traffic. While DoH can help protect the privacy of DNS requests and the integrity of responses, enterprises that use DoH will lose some of the control needed to govern DNS usage within their networks unless they allow only their chosen DoH resolver to be used. Enterprise DNS controls can prevent numerous threat techniques used by cyber threat actors for initial access, command and control, and exfiltration. Using DoH with external resolvers can be good for home or mobile users and networks that do not use DNS security controls. For enterprise networks, however, NSA recommends using only designated enterprise DNS resolvers in order to properly leverage essential enterprise cybersecurity defenses, facilitate access to local network resources, and protect internal network information. The enterprise DNS resolver may be either an enterprise-operated DNS server or an externally hosted service. Either way, the enterprise resolver should support encrypted DNS requests, such as DoH, for local privacy and integrity protections, but all other encrypted DNS resolvers should be disabled and blocked.
    [Show full text]
  • Chapter 2. Application Layer Table of Contents 1. Context
    Chapter 2. Application Layer Table of Contents 1. Context ........................................................................................................................................... 1 2. Introduction .................................................................................................................................... 2 3. Objectives ....................................................................................................................................... 2 4. Network application software ....................................................................................................... 2 5. Process communication ................................................................................................................. 3 6. Transport Layer services provided by the Internet ....................................................................... 3 7. Application Layer Protocols ........................................................................................................... 4 8. The web and HTTP .......................................................................................................................... 4 8.1. Web Terminology ................................................................................................................... 5 8.2. Overview of HTTP protocol .................................................................................................... 6 8.3. HTTP message format ...........................................................................................................
    [Show full text]
  • SMTP (Simple Mail Transfer Protocol)
    P1: JsY JWBS001A-60.tex WL041/Bidgoli WL041-Bidgoli.cls May 12, 2005 3:27 Char Count= 0 SMTP (Simple Mail Transfer Protocol) Vladimir V. Riabov, Rivier College Introduction 1 SMTP Security Issues 12 SMTP Fundamentals 1 SMTP Vulnerabilities 12 SMTP Model and Protocol 2 SMTP Server Buffer Overflow Vulnerability 15 User Agent 4 Mail Relaying SMTP Vulnerability 15 Sending e-Mail 4 Mail Relaying SMTP Vulnerability in Microsoft Mail Header Format 4 Windows 2000 15 Receiving e-Mail 4 Encapsulated SMTP Address Vulnerability 15 The SMTP Destination Address 4 Malformed Request Denial of Service 16 Delayed Delivery 4 Extended Verb Request Handling Flaw 16 Aliases 5 Reverse DNS Response Buffer Overflow 16 Mail Transfer Agent 5 Firewall SMTP Filtering Vulnerability 16 SMTP Mail Transaction Flow 5 Spoofing 16 SMTP Commands 6 Bounce Attack 16 Mail Service Types 6 Restricting Access to an Outgoing Mail SMTP Service Extensions 8 Server 17 SMTP Responses 8 Mail Encryption 17 SMTP Server 8 Bastille Hardening System 17 On-Demand Mail Relay 8 POP and IMAP Vulnerabilities 17 Multipurpose Internet Mail Extensions Standards, Organizations, and (MIME) 8 Associations 18 MIME-Version 10 Internet Assigned Numbers Authority 18 Content-Type 10 Internet Engineering Task Force Working Content-Transfer-Encoding 10 Groups 18 Content-Id 11 Internet Mail Consortium 18 Content-Description 11 Mitre Corporation 18 Security Scheme for MIME 11 Conclusion 18 Mail Transmission Types 11 Glossary 18 Mail Access Modes 11 Cross References 19 Mail Access Protocols 11 References 19 POP3 11 Further Reading 22 IMAP4 12 INTRODUCTION and IMAP4), SMTP software, vulnerability and security issues, standards, associations, and organizations.
    [Show full text]
  • SILC-A SECURED INTERNET CHAT PROTOCOL Anindita Sinha1, Saugata Sinha2 Asst
    ISSN (Print) : 2320 – 3765 ISSN (Online): 2278 – 8875 International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 2, Issue 5, May 2013 SILC-A SECURED INTERNET CHAT PROTOCOL Anindita Sinha1, Saugata Sinha2 Asst. Prof, Dept. of ECE, Siliguri Institute of Technology, Sukna, Siliguri, West Bengal, India 1 Network Engineer, Network Dept, Ericsson Global India Ltd, India2 Abstract:-. The Secure Internet Live Conferencing (SILC) protocol, a new generation chat protocol provides full featured conferencing services, compared to any other chat protocol. Its main interesting point is security which has been described all through the paper. We have studied how encryption and authentication of the messages in the network achieves security. The security has been the primary goal of the SILC protocol and the protocol has been designed from the day one security in mind. In this paper we have studied about different keys which have been used to achieve security in the SILC protocol. The main function of SILC is to achieve SECURITY which is most important in any chat protocol. We also have studied different command for communication in chat protocols. Keywords: SILC protocol, IM, MIME, security I.INTRODUCTION SILC stands for “SECURE INTERNET LIVE CONFERENCING”. SILC is a secure communication platform, looks similar to IRC, first protocol & quickly gained the status of being the most popular chat on the net. The security is important feature in applications & protocols in contemporary network environment. It is not anymore enough to just provide services; they need to be secure services. The SILC protocol is a new generation chat protocol which provides full featured conferencing services; additionally it provides security by encrypting & authenticating the messages in the network.
    [Show full text]
  • Analysis of Malware and Domain Name System Traffic
    Analysis of Malware and Domain Name System Traffic Hamad Mohammed Binsalleeh A Thesis in The Department of Computer Science and Software Engineering Presented in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy at Concordia University Montréal, Québec, Canada July 2014 c Hamad Mohammed Binsalleeh, 2014 CONCORDIA UNIVERSITY Division of Graduate Studies This is to certify that the thesis prepared By: Hamad Mohammed Binsalleeh Entitled: Analysis of Malware and Domain Name System Traffic and submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy complies with the regulations of this University and meets the accepted standards with respect to originality and quality. Signed by the final examining committee: Chair Dr. Christian Moreau External Examiner Dr. Nadia Tawbi Examiner to Program Dr. Lingyu Wang Examiner Dr. Peter Grogono Examiner Dr. Olga Ormandjieva Thesis Co-Supervisor Dr. Mourad Debbabi Thesis Co-Supervisor Dr. Amr Youssef Approved by Chair of the CSE Department 2014 Dean of Engineering ABSTRACT Analysis of Malware and Domain Name System Traffic Hamad Mohammed Binsalleeh Concordia University, 2014 Malicious domains host Command and Control servers that are used to instruct in- fected machines to perpetuate malicious activities such as sending spam, stealing creden- tials, and launching denial of service attacks. Both static and dynamic analysis of malware as well as monitoring Domain Name System (DNS) traffic provide valuable insight into such malicious activities and help security experts detect and protect against many cyber attacks. Advanced crimeware toolkits were responsible for many recent cyber attacks. In order to understand the inner workings of such toolkits, we present a detailed reverse en- gineering analysis of the Zeus crimeware toolkit to unveil its underlying architecture and enable its mitigation.
    [Show full text]
  • TCP/IP Standard Applications Telnet - SSH - FTP - SMTP - HTTP
    TCP/IP Standard Applications Telnet - SSH - FTP - SMTP - HTTP Virtual Terminal, Secure Shell, File Transfer, Email, WWW Agenda • Telnet (Virtual Terminal) • SSH • FTP (File Transfer) • E-Mail and SMTP • WWW and HTTP © 2016, D.I. Lindner / D.I. Haas Telnet-SSH-FTP-SMTP-HTTP, v6.0 2 What is Telnet? • Telnet is a standard method to communicate with another Internet host • Telnet provides a standard interface for terminal devices and terminal-oriented processes through a network • using the Telnet protocol user on a local host can remote-login and execute commands on another distant host • Telnet employs a client-server model – a Telnet client "looks and feels" like a Terminal on a distant server – even today Telnet provides a text-based user interface © 2016, D.I. Lindner / D.I. Haas Telnet-SSH-FTP-SMTP-HTTP, v6.0 3 Local and Remote Terminals network local terminal workstation Host as remote terminal with Telnet Server with Telnet Client traditional configuration today's demand: remote login © 2016, D.I. Lindner / D.I. Haas Telnet-SSH-FTP-SMTP-HTTP, v6.0 4 About Telnet • Telnet was one of the first Internet applications – since the earliest demand was to connect terminals to hosts across networks • Telnet is one of the most popular Internet applications because – of its flexibility (checking E-Mails, etc.) – it does not waste much network resources – because Telnet clients are integrated in every UNIX environment (and other operating systems) © 2016, D.I. Lindner / D.I. Haas Telnet-SSH-FTP-SMTP-HTTP, v6.0 5 Telnet Basics • Telnet is connection oriented and uses the TCP protocol • clients connect to the "well-known" destination port 23 on the server side • protocol specification: RFC 854 • three main ideas: – concept of Network Virtual Terminals (NVTs) – principle of negotiated options – a symmetric view of terminals and (server-) processes © 2016, D.I.
    [Show full text]
  • XEP-0347: Internet of Things - Discovery
    XEP-0347: Internet of Things - Discovery Peter Waher mailto:peterwaher@hotmail:com xmpp:peter:waher@jabber:org http://www:linkedin:com/in/peterwaher Ronny Klauck mailto:rklauck@informatik:tu-cottbus:de xmpp:TBD http://www-rnks:informatik:tu-cottbus:de/~rklauck 2018-11-03 Version 0.5.1 Status Type Short Name Deferred Standards Track iot-discovery This specification describes an architecture based on the XMPP protocol whereby Things can be in- stalled and safely discovered by their owners and connected into networks of Things. Legal Copyright This XMPP Extension Protocol is copyright © 1999 – 2020 by the XMPP Standards Foundation (XSF). Permissions Permission is hereby granted, free of charge, to any person obtaining a copy of this specification (the ”Specification”), to make use of the Specification without restriction, including without limitation the rights to implement the Specification in a software program, deploy the Specification in a network service, and copy, modify, merge, publish, translate, distribute, sublicense, or sell copies of the Specifi- cation, and to permit persons to whom the Specification is furnished to do so, subject to the condition that the foregoing copyright notice and this permission notice shall be included in all copies or sub- stantial portions of the Specification. Unless separate permission is granted, modified works that are redistributed shall not contain misleading information regarding the authors, title, number, or pub- lisher of the Specification, and shall not claim endorsement of the modified works by the authors, any organization or project to which the authors belong, or the XMPP Standards Foundation. Warranty ## NOTE WELL: This Specification is provided on an ”AS IS” BASIS, WITHOUT WARRANTIES OR CONDI- TIONS OF ANY KIND, express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE.
    [Show full text]