SlideShare a Scribd company logo
Computer Networks
Application Layer
Date:
Department of Computer Engineering
Jain Group of Institution, Bangalore
Presented By:
Rubal Sagwal
Assistant Professor
Department of Computer Engineering
1ADAD
Contents
• DHCP
• HTTP
• HTTPS
• FTP
• TFTP
• SFTP
• Talnet
• Email
ADAD 2
Application Layer
DHCP – DNS – HTTP – HTTPS – FTP – TFTP – SFTP
ADAD 3
DHCP (Dynamic Host Configuration Protocol)
• Mapping Physical to Logical Address – sometimes host
knows its physical address, but needs to know its logical
address.
• Cases –
• Sometimes host moves from one physical network to another
network.
• Host wants a temporary IP address.
• Why DHCP – because other address resolution protocols are
static in nature.
• DHCP provide static and dynamic address allocation that can
be manual or automatic.
ADAD 4
Contd..
DHCP
• Static Address Allocation: Any client can request a
static address from a DHCP server.
• A DHCP server has a database that statically binds the
physical addresses to IP addresses.
• Dynamic Address Allocation: needed – when a host
moves from network to network or connected and
disconnected from a network.
• DHCP has a second database – which has pool of available IP
addresses.
• Second DB make it dynamic.
• When a DHCP client requests a temporary IP address, the
DHCP server goes to the pool of available (unused) IP
addresses and assigns an IP address for a limited period of
time.
ADAD 5
Contd..
DHCP
• Dynamic Address Allocation:
• When a DHCP client sends a request to DHCP server –
the server first checks its static database.
• If an entry with the requested physical address exist in
the static data base – the permeant IP address of the
client is returned.
• If entry doesn’t exist in the static database – the server
select an IP address from the available pool – assign the
address to the client – adds to dynamic table.
ADAD 6
HTTP
HTTPS
ADAD 7
Hyper Text Transfer Protocol
• Http used – to access data on world wide web.
• WWW -> collection of web sites -> collection of web
pages -> HTML pages -> Data <- accessed by browser <-
client.
• Http function with – FTP and SMTP.
• Similar to ftp – transfer files and uses the services of
TCP.
• Http messages are not designed to read by human –
read and interpreted by the Http server and client.
• Port number over TCP – well known port 80.
ADAD 8
Contd…
Http Transaction
ADAD 9
Request
Response
Request and Response message
Request and Status Line of Http
ADAD 10
1. Request Type:
Contd…
Request and Status Line of Http
2. URL
3. Version: Version of Http.
4. Status Code:
ADAD 11
Contd…
Request and Status Line of Http
ADAD 12
Contd…
Request and Status Line of Http
5. Header:
1. General header – general info like date etc.
2. Request header – client configuration.
3. Response header – server’s configuration.
4. Entity header – info about the body of the document.
Request message can contain only general, request
and entity header.
Response message can contain general, response
and entity header.
ADAD 13
Contd…
Request and Status Line of Http – General Header
ADAD 14
Contd…
Request and Status Line of Http – Request Header
ADAD 15
Contd…
Request and Status Line of Http – Response Header
ADAD 16
6. Body: contain the document to be sent.
HTTPS
• Hyper Text Transfer Protocol Secure (HTTPS) is the
secure version of HTTP – the protocol over which
data is sent between your browser and the website
that you are connected to.
• The 'S' at the end of HTTPS stands for 'Secure’.
• It means all communications between your
browser and the website are encrypted.
• HTTPS is often used to protect highly confidential
online transactions like online banking and online
shopping order forms.
ADAD 17
HTTPS
ADAD 18
How does HTTPS
• HTTPS pages typically use one of two secure
protocols to encrypt communications - SSL (Secure
Sockets Layer) or TLS (Transport Layer Security).
• Both the TLS and SSL protocols use what is known
as an 'asymmetric' Public Key Infrastructure (PKI)
system.
• An asymmetric system uses two 'keys' to encrypt
communications, a 'public' key and a 'private' key.
• Anything encrypted with the public key can only be
decrypted by the private key and vice-versa.
ADAD 19
How does HTTPS
• When you request a HTTPS connection to a webpage, the
website will initially send its SSL certificate to your browser.
• This certificate contains the public key needed to begin the
secure session.
• Based on this initial exchange, your browser and the
website then initiate the 'SSL handshake’.
• The SSL handshake involves the generation of shared secrets
to establish a uniquely secure connection between yourself
and the website.
• When a trusted SSL Digital Certificate is used during
a HTTPS connection, users will see a padlock icon in the
browser address bar. When an Extended Validation
Certificate is installed on a web site, the address bar will
turn green.
ADAD 20
File Transfer Protocol
TFTP – SFTP
ADAD 21
File Transfer Protocol
• File Transfer – from one computer to another –
most common task.
• FTP – standard mechanism provided by TCP/IP for
copying a file from one host to another.
• Why FTP –
• Two systems may have different ways to represent text
and data.
• Two systems may have different directory structures.
• Different formats, etc.
ADAD 22
Contd…
FTP
• FTP uses well-known TCP ports :
• Well-known port 20 – data connection.
• Well-known port 21 – control connection.
ADAD 23
Contd…
FTP
• Control Connection – remains connected during the
entire interactive FTP session.
• Data Connection – opened and then closed for
each file transferred.
• While the control connection is open – the data
connection can be opened and closed multiple
times.
ADAD 24
Contd…
FTP – Communication over Control Connection
ADAD 25
• Uses 7- bit ASCII character set.
• Communication is achieved through Command and
Response.
• Each line is terminated with a two-character end-
of-line token.
Contd…
FTP – Communication over Data Connection
ADAD 26
• A file is copied form the server to the client –
retrieving a file – done under the supervision of
the RETR command.
• A file is copied form the client to the server –
storing a file – done under the supervision of the
STOR command.
• A list of directory or file name is to be sent from the
server to the client – done under the supervision of
the LIST command.
Contd…
FTP – Communication over Data Connection
ADAD 27
• The client must define the type of the file to be
transferred, the structure of the data and the
transmission mode.
Contd…
FTP – Communication over Data Connection
ADAD 28
• File Type: ASCII file, EBCDIC file or image file.
• Data Structure:
• File Structure – file is continuous stream of bytes.
• Record Structure – file is divided into records.
• Page Structure – file is divided into pages.
• Transmission mode:
• Stream mode – default mode – continuous stream of
mode.
• Block Mode – in blocks.
• Compressed Mode – if a file is big, then we can
compress.
Trivial File Transfer Protocol (TFTP)
• Trivial File Transfer Protocol (TFTP) is a simple protocol
used for transferring files.
• It uses the User Datagram Protocol (UDP) to transport
data from one end to another.
• TFTP is mostly used to read and write files/mail to or
from a remote server.
• Trivial File Transfer Protocol is very simple in design and
has limited features as compared to File Transfer
Protocol (FTP).
• TFTP provides no authentication and security while
transferring files.
• Data transfer through TFTP is usually initiated through
port 69.
ADAD 29
Secure File Transfer Protocol (SFTP)
• Secure File Transfer Protocol (SFTP) – secure
version of File Transfer Protocol (FTP).
• Facilitates data access and data transfer over a
Secure Shell (SSH) data stream.
• It is part of the SSH Protocol. This term is also
known as SSH File Transfer Protocol.
• SFTP was designed by the Internet Engineering Task
Force (IETF) as an extended version of SSH 2.0,
allowing file transfer over SSH and use with
Transport Layer Security (TLS) and VPN
applications.
ADAD 30
Secure File Transfer Protocol (SFTP)
• Both the commands and data are encrypted in order to
prevent passwords and other sensitive information
from being transferred over the network.
• The functionality of SFTP is similar to that of FTP.
• However, SFTP uses SSH to transfer files.
• SFTP requires that the client user must be
authenticated by the server and the data transfer must
take place over a secure channel (SSH).
• It allows a wide range of operations to be performed on
remote files, acting somewhat like a remote file system
protocol.
• SFTP allows operations such as resuming from halted
transfers, directory listings and remote file removal.
ADAD 31
TELNET
ADAD 32
TELNET
• Abbreviation for – Terminal network.
• TCP/IP suite protocol – proposed by ISO.
• Why Telnet – for remote logging.
• Remote Logging – accessing any application at local
site from remote location.
• Client/ server Application Program.
• Enable the establishment of a connection to a
remote system in such a way that the local terminal
appears to be terminal at remote system.
ADAD 33
TELNET – key terms
1. Time sharing – a large computer supports multiple
users.
• Interaction between a computer and a server – through
a terminal – combination of keyboard, monitor and
mouse etc.
2. Logging – as we know timesharing environment.
• Users are the part of the system with some right to
access resources.
• Each authorized user has an identification and a
password.
• User identification – define identity of a user that it is a
part of the system.
ADAD 34
TELNET – key terms
• User logging – with user ID and Password.
• At system – Password checking – to prevent an
unauthorized access.
• Local log-in – user types at terminal or at a workstation
running a terminal emulator – terminal passes character
to the Operating system.
• Remote log-in – need client and server program.
ADAD 35
TELNET – Local Logging
ADAD 36
TELNET – Remote Logging
ADAD 37
TELNET – Mode of Operation
ADAD 38
1. Default mode – Echoing is done by the client.
• User type a character – the client echoes the character
on the screen but does not send it until a whole line is
completed.
2. Character mode – each character typed sent by
the client – to the server.
• Echoing done by server.
• Transmission delayed – because of server echoing.
3. Line Mode – line editing (echoing, character
erasing, line erasing) done by client.
• The client then send the whole line to the server.

More Related Content

What's hot (20)

PPTX
Why we need ipv6...
Adii Shah
 
PDF
Distance Vector Multicast Routing Protocol (DVMRP) : Presentation
Subhajit Sahu
 
PPTX
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
Kruti Niranjan
 
PPT
Application layer protocols
JUW Jinnah University for Women
 
PPT
Application Layer
ushabarad142
 
PPTX
IPV6 ADDRESS
Jothi Lakshmi
 
PPTX
User datagram protocol (udp)
Ramola Dhande
 
PPTX
Dhcp
Tapan Khilar
 
PDF
Difference between OSI Layer & TCP/IP Layer
Netwax Lab
 
PPT
Internet control message protocol
asimnawaz54
 
PDF
TFTP - Trivial File Transfer Protocol
Peter R. Egli
 
PPT
Ports & sockets
myrajendra
 
PPT
Computer Networks - DNS
DHIVYADEVAKI
 
PPTX
FTP & TFTP
NetProtocol Xpert
 
PPTX
Tcp/ip model
Kumar Alok
 
PPTX
Address resolution protocol (ARP)
NetProtocol Xpert
 
PPTX
FTP Client and Server | Computer Science
Transweb Global Inc
 
Why we need ipv6...
Adii Shah
 
Distance Vector Multicast Routing Protocol (DVMRP) : Presentation
Subhajit Sahu
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
Kruti Niranjan
 
Application layer protocols
JUW Jinnah University for Women
 
Application Layer
ushabarad142
 
IPV6 ADDRESS
Jothi Lakshmi
 
User datagram protocol (udp)
Ramola Dhande
 
Difference between OSI Layer & TCP/IP Layer
Netwax Lab
 
Internet control message protocol
asimnawaz54
 
TFTP - Trivial File Transfer Protocol
Peter R. Egli
 
Ports & sockets
myrajendra
 
Computer Networks - DNS
DHIVYADEVAKI
 
FTP & TFTP
NetProtocol Xpert
 
Tcp/ip model
Kumar Alok
 
Address resolution protocol (ARP)
NetProtocol Xpert
 
FTP Client and Server | Computer Science
Transweb Global Inc
 

Similar to Application Layer and Protocols (20)

PPTX
APPLICATION LAYER PROTOCOLS .pptx
ArnavPlayz
 
PPTX
Basic to advance protocols
Varinder Singh Walia
 
PPTX
Ports and services
Ilan Mindel
 
PPTX
Web Dev Research
nathomas82
 
PDF
CREST CCT Exam Prep Notes
NathanAn
 
PDF
6 networking
richarddxd
 
PPTX
File Transfer Protocol
Vinh Nguyen
 
DOCX
Chapter 3
Mina Riyahi
 
PDF
Meeting 6 : ftp
Syaiful Ahdan
 
PPTX
Remote Login and File Transfer Protocols
Himanshu Pathak
 
PDF
Ch 2: TCP/IP Concepts Review
Sam Bowne
 
PPTX
network protocol | Networking by Nitasha Chaturvedi
nitashach22
 
PPT
Ftp.75 to 76
myrajendra
 
PPTX
IOT2.pptx is internet of things presentation
kaaraapatil
 
PPT
Computer Networks
Shylesh BC
 
PPTX
File tranfer protocol
KunalThorat9
 
PPT
Vulnerabilities in IP Protocols
babak danyal
 
PPTX
OSI model and TCP/IP model
Rubal Sagwal
 
DOCX
Ports and protocols
Kailash Kumar
 
APPLICATION LAYER PROTOCOLS .pptx
ArnavPlayz
 
Basic to advance protocols
Varinder Singh Walia
 
Ports and services
Ilan Mindel
 
Web Dev Research
nathomas82
 
CREST CCT Exam Prep Notes
NathanAn
 
6 networking
richarddxd
 
File Transfer Protocol
Vinh Nguyen
 
Chapter 3
Mina Riyahi
 
Meeting 6 : ftp
Syaiful Ahdan
 
Remote Login and File Transfer Protocols
Himanshu Pathak
 
Ch 2: TCP/IP Concepts Review
Sam Bowne
 
network protocol | Networking by Nitasha Chaturvedi
nitashach22
 
Ftp.75 to 76
myrajendra
 
IOT2.pptx is internet of things presentation
kaaraapatil
 
Computer Networks
Shylesh BC
 
File tranfer protocol
KunalThorat9
 
Vulnerabilities in IP Protocols
babak danyal
 
OSI model and TCP/IP model
Rubal Sagwal
 
Ports and protocols
Kailash Kumar
 
Ad

More from Rubal Sagwal (20)

PPTX
Introduction to Information Security
Rubal Sagwal
 
PPTX
Cloud and Virtualization Security
Rubal Sagwal
 
PPTX
Cloud and Virtualization (Using Virtualization to form Clouds)
Rubal Sagwal
 
PPTX
ER Modeling and Introduction to RDBMS
Rubal Sagwal
 
PPTX
Database Models, Client-Server Architecture, Distributed Database and Classif...
Rubal Sagwal
 
PPTX
Overview of Data Base Systems Concepts and Architecture
Rubal Sagwal
 
PPTX
Practical Implementation of Virtual Machine
Rubal Sagwal
 
PPTX
Principles of Virtualization - Introduction to Virtualization Software
Rubal Sagwal
 
PPTX
Accessing virtualized published applications
Rubal Sagwal
 
PPTX
Prepare and Manage Remote Applications through Virtualization
Rubal Sagwal
 
PPTX
Managing Virtual Hard Disk and Virtual Machine Resources
Rubal Sagwal
 
PPTX
Configure and Manage Virtualization on different Platforms
Rubal Sagwal
 
PPTX
Virtualization Uses - Server Consolidation
Rubal Sagwal
 
PPTX
Principles of virtualization
Rubal Sagwal
 
PPTX
Troubleshooting Network and Network Utilities
Rubal Sagwal
 
PPTX
Basics of Network Layer and Transport Layer
Rubal Sagwal
 
PPTX
Wireless Technologies and Standards
Rubal Sagwal
 
PPTX
Ethernet, Point-to-Point Protocol, ARP
Rubal Sagwal
 
PPTX
Basics of Computer Network Device
Rubal Sagwal
 
PPTX
Network Topology and Transmission Media
Rubal Sagwal
 
Introduction to Information Security
Rubal Sagwal
 
Cloud and Virtualization Security
Rubal Sagwal
 
Cloud and Virtualization (Using Virtualization to form Clouds)
Rubal Sagwal
 
ER Modeling and Introduction to RDBMS
Rubal Sagwal
 
Database Models, Client-Server Architecture, Distributed Database and Classif...
Rubal Sagwal
 
Overview of Data Base Systems Concepts and Architecture
Rubal Sagwal
 
Practical Implementation of Virtual Machine
Rubal Sagwal
 
Principles of Virtualization - Introduction to Virtualization Software
Rubal Sagwal
 
Accessing virtualized published applications
Rubal Sagwal
 
Prepare and Manage Remote Applications through Virtualization
Rubal Sagwal
 
Managing Virtual Hard Disk and Virtual Machine Resources
Rubal Sagwal
 
Configure and Manage Virtualization on different Platforms
Rubal Sagwal
 
Virtualization Uses - Server Consolidation
Rubal Sagwal
 
Principles of virtualization
Rubal Sagwal
 
Troubleshooting Network and Network Utilities
Rubal Sagwal
 
Basics of Network Layer and Transport Layer
Rubal Sagwal
 
Wireless Technologies and Standards
Rubal Sagwal
 
Ethernet, Point-to-Point Protocol, ARP
Rubal Sagwal
 
Basics of Computer Network Device
Rubal Sagwal
 
Network Topology and Transmission Media
Rubal Sagwal
 
Ad

Recently uploaded (20)

PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
The Rise of AI and IoT in Mobile App Tech.pdf
IMG Global Infotech
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PPTX
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
PDF
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
PDF
Go Concurrency Real-World Patterns, Pitfalls, and Playground Battles.pdf
Emily Achieng
 
PDF
Staying Human in a Machine- Accelerated World
Catalin Jora
 
PDF
Future-Proof or Fall Behind? 10 Tech Trends You Can’t Afford to Ignore in 2025
DIGITALCONFEX
 
PPTX
Seamless Tech Experiences Showcasing Cross-Platform App Design.pptx
presentifyai
 
PDF
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
PPT
Ericsson LTE presentation SEMINAR 2010.ppt
npat3
 
PDF
Transcript: Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
PDF
UPDF - AI PDF Editor & Converter Key Features
DealFuel
 
PDF
AI Agents in the Cloud: The Rise of Agentic Cloud Architecture
Lilly Gracia
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PDF
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
PDF
Automating Feature Enrichment and Station Creation in Natural Gas Utility Net...
Safe Software
 
PDF
Kit-Works Team Study_20250627_한달만에만든사내서비스키링(양다윗).pdf
Wonjun Hwang
 
PPTX
Designing_the_Future_AI_Driven_Product_Experiences_Across_Devices.pptx
presentifyai
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
The Rise of AI and IoT in Mobile App Tech.pdf
IMG Global Infotech
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
Go Concurrency Real-World Patterns, Pitfalls, and Playground Battles.pdf
Emily Achieng
 
Staying Human in a Machine- Accelerated World
Catalin Jora
 
Future-Proof or Fall Behind? 10 Tech Trends You Can’t Afford to Ignore in 2025
DIGITALCONFEX
 
Seamless Tech Experiences Showcasing Cross-Platform App Design.pptx
presentifyai
 
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
Ericsson LTE presentation SEMINAR 2010.ppt
npat3
 
Transcript: Book industry state of the nation 2025 - Tech Forum 2025
BookNet Canada
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
UPDF - AI PDF Editor & Converter Key Features
DealFuel
 
AI Agents in the Cloud: The Rise of Agentic Cloud Architecture
Lilly Gracia
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
“NPU IP Hardware Shaped Through Software and Use-case Analysis,” a Presentati...
Edge AI and Vision Alliance
 
Automating Feature Enrichment and Station Creation in Natural Gas Utility Net...
Safe Software
 
Kit-Works Team Study_20250627_한달만에만든사내서비스키링(양다윗).pdf
Wonjun Hwang
 
Designing_the_Future_AI_Driven_Product_Experiences_Across_Devices.pptx
presentifyai
 

Application Layer and Protocols

  • 1. Computer Networks Application Layer Date: Department of Computer Engineering Jain Group of Institution, Bangalore Presented By: Rubal Sagwal Assistant Professor Department of Computer Engineering 1ADAD
  • 2. Contents • DHCP • HTTP • HTTPS • FTP • TFTP • SFTP • Talnet • Email ADAD 2
  • 3. Application Layer DHCP – DNS – HTTP – HTTPS – FTP – TFTP – SFTP ADAD 3
  • 4. DHCP (Dynamic Host Configuration Protocol) • Mapping Physical to Logical Address – sometimes host knows its physical address, but needs to know its logical address. • Cases – • Sometimes host moves from one physical network to another network. • Host wants a temporary IP address. • Why DHCP – because other address resolution protocols are static in nature. • DHCP provide static and dynamic address allocation that can be manual or automatic. ADAD 4
  • 5. Contd.. DHCP • Static Address Allocation: Any client can request a static address from a DHCP server. • A DHCP server has a database that statically binds the physical addresses to IP addresses. • Dynamic Address Allocation: needed – when a host moves from network to network or connected and disconnected from a network. • DHCP has a second database – which has pool of available IP addresses. • Second DB make it dynamic. • When a DHCP client requests a temporary IP address, the DHCP server goes to the pool of available (unused) IP addresses and assigns an IP address for a limited period of time. ADAD 5
  • 6. Contd.. DHCP • Dynamic Address Allocation: • When a DHCP client sends a request to DHCP server – the server first checks its static database. • If an entry with the requested physical address exist in the static data base – the permeant IP address of the client is returned. • If entry doesn’t exist in the static database – the server select an IP address from the available pool – assign the address to the client – adds to dynamic table. ADAD 6
  • 8. Hyper Text Transfer Protocol • Http used – to access data on world wide web. • WWW -> collection of web sites -> collection of web pages -> HTML pages -> Data <- accessed by browser <- client. • Http function with – FTP and SMTP. • Similar to ftp – transfer files and uses the services of TCP. • Http messages are not designed to read by human – read and interpreted by the Http server and client. • Port number over TCP – well known port 80. ADAD 8
  • 10. Request and Status Line of Http ADAD 10 1. Request Type:
  • 11. Contd… Request and Status Line of Http 2. URL 3. Version: Version of Http. 4. Status Code: ADAD 11
  • 12. Contd… Request and Status Line of Http ADAD 12
  • 13. Contd… Request and Status Line of Http 5. Header: 1. General header – general info like date etc. 2. Request header – client configuration. 3. Response header – server’s configuration. 4. Entity header – info about the body of the document. Request message can contain only general, request and entity header. Response message can contain general, response and entity header. ADAD 13
  • 14. Contd… Request and Status Line of Http – General Header ADAD 14
  • 15. Contd… Request and Status Line of Http – Request Header ADAD 15
  • 16. Contd… Request and Status Line of Http – Response Header ADAD 16 6. Body: contain the document to be sent.
  • 17. HTTPS • Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP – the protocol over which data is sent between your browser and the website that you are connected to. • The 'S' at the end of HTTPS stands for 'Secure’. • It means all communications between your browser and the website are encrypted. • HTTPS is often used to protect highly confidential online transactions like online banking and online shopping order forms. ADAD 17
  • 19. How does HTTPS • HTTPS pages typically use one of two secure protocols to encrypt communications - SSL (Secure Sockets Layer) or TLS (Transport Layer Security). • Both the TLS and SSL protocols use what is known as an 'asymmetric' Public Key Infrastructure (PKI) system. • An asymmetric system uses two 'keys' to encrypt communications, a 'public' key and a 'private' key. • Anything encrypted with the public key can only be decrypted by the private key and vice-versa. ADAD 19
  • 20. How does HTTPS • When you request a HTTPS connection to a webpage, the website will initially send its SSL certificate to your browser. • This certificate contains the public key needed to begin the secure session. • Based on this initial exchange, your browser and the website then initiate the 'SSL handshake’. • The SSL handshake involves the generation of shared secrets to establish a uniquely secure connection between yourself and the website. • When a trusted SSL Digital Certificate is used during a HTTPS connection, users will see a padlock icon in the browser address bar. When an Extended Validation Certificate is installed on a web site, the address bar will turn green. ADAD 20
  • 21. File Transfer Protocol TFTP – SFTP ADAD 21
  • 22. File Transfer Protocol • File Transfer – from one computer to another – most common task. • FTP – standard mechanism provided by TCP/IP for copying a file from one host to another. • Why FTP – • Two systems may have different ways to represent text and data. • Two systems may have different directory structures. • Different formats, etc. ADAD 22
  • 23. Contd… FTP • FTP uses well-known TCP ports : • Well-known port 20 – data connection. • Well-known port 21 – control connection. ADAD 23
  • 24. Contd… FTP • Control Connection – remains connected during the entire interactive FTP session. • Data Connection – opened and then closed for each file transferred. • While the control connection is open – the data connection can be opened and closed multiple times. ADAD 24
  • 25. Contd… FTP – Communication over Control Connection ADAD 25 • Uses 7- bit ASCII character set. • Communication is achieved through Command and Response. • Each line is terminated with a two-character end- of-line token.
  • 26. Contd… FTP – Communication over Data Connection ADAD 26 • A file is copied form the server to the client – retrieving a file – done under the supervision of the RETR command. • A file is copied form the client to the server – storing a file – done under the supervision of the STOR command. • A list of directory or file name is to be sent from the server to the client – done under the supervision of the LIST command.
  • 27. Contd… FTP – Communication over Data Connection ADAD 27 • The client must define the type of the file to be transferred, the structure of the data and the transmission mode.
  • 28. Contd… FTP – Communication over Data Connection ADAD 28 • File Type: ASCII file, EBCDIC file or image file. • Data Structure: • File Structure – file is continuous stream of bytes. • Record Structure – file is divided into records. • Page Structure – file is divided into pages. • Transmission mode: • Stream mode – default mode – continuous stream of mode. • Block Mode – in blocks. • Compressed Mode – if a file is big, then we can compress.
  • 29. Trivial File Transfer Protocol (TFTP) • Trivial File Transfer Protocol (TFTP) is a simple protocol used for transferring files. • It uses the User Datagram Protocol (UDP) to transport data from one end to another. • TFTP is mostly used to read and write files/mail to or from a remote server. • Trivial File Transfer Protocol is very simple in design and has limited features as compared to File Transfer Protocol (FTP). • TFTP provides no authentication and security while transferring files. • Data transfer through TFTP is usually initiated through port 69. ADAD 29
  • 30. Secure File Transfer Protocol (SFTP) • Secure File Transfer Protocol (SFTP) – secure version of File Transfer Protocol (FTP). • Facilitates data access and data transfer over a Secure Shell (SSH) data stream. • It is part of the SSH Protocol. This term is also known as SSH File Transfer Protocol. • SFTP was designed by the Internet Engineering Task Force (IETF) as an extended version of SSH 2.0, allowing file transfer over SSH and use with Transport Layer Security (TLS) and VPN applications. ADAD 30
  • 31. Secure File Transfer Protocol (SFTP) • Both the commands and data are encrypted in order to prevent passwords and other sensitive information from being transferred over the network. • The functionality of SFTP is similar to that of FTP. • However, SFTP uses SSH to transfer files. • SFTP requires that the client user must be authenticated by the server and the data transfer must take place over a secure channel (SSH). • It allows a wide range of operations to be performed on remote files, acting somewhat like a remote file system protocol. • SFTP allows operations such as resuming from halted transfers, directory listings and remote file removal. ADAD 31
  • 33. TELNET • Abbreviation for – Terminal network. • TCP/IP suite protocol – proposed by ISO. • Why Telnet – for remote logging. • Remote Logging – accessing any application at local site from remote location. • Client/ server Application Program. • Enable the establishment of a connection to a remote system in such a way that the local terminal appears to be terminal at remote system. ADAD 33
  • 34. TELNET – key terms 1. Time sharing – a large computer supports multiple users. • Interaction between a computer and a server – through a terminal – combination of keyboard, monitor and mouse etc. 2. Logging – as we know timesharing environment. • Users are the part of the system with some right to access resources. • Each authorized user has an identification and a password. • User identification – define identity of a user that it is a part of the system. ADAD 34
  • 35. TELNET – key terms • User logging – with user ID and Password. • At system – Password checking – to prevent an unauthorized access. • Local log-in – user types at terminal or at a workstation running a terminal emulator – terminal passes character to the Operating system. • Remote log-in – need client and server program. ADAD 35
  • 36. TELNET – Local Logging ADAD 36
  • 37. TELNET – Remote Logging ADAD 37
  • 38. TELNET – Mode of Operation ADAD 38 1. Default mode – Echoing is done by the client. • User type a character – the client echoes the character on the screen but does not send it until a whole line is completed. 2. Character mode – each character typed sent by the client – to the server. • Echoing done by server. • Transmission delayed – because of server echoing. 3. Line Mode – line editing (echoing, character erasing, line erasing) done by client. • The client then send the whole line to the server.