SlideShare une entreprise Scribd logo
1  sur  18
COMPUTER APPLICATIONS
CLASS X (Code 165)
TOPIC:
UNIT 1: Application Layer Protocols
By
HIMANSHU PATHAK
Contents
• Introduction
• Communication Protocol
• Mail Protocol
• File Transfer Protocol
• Remote Login Protocol
Introduction
• Application Layer uses protocols such as
HTTP(S) on client side applications like
browser.
• The application layer is responsible for
providing services to the user:
– Accessing the www
– Mail Services
– File Transfer and Access
– Remote Log-in
Communication Protocol: HTTP
• HTTP stands for Hyper-Text Transfer Protocol.
• HTTP is used mainly to access data on the world
wide web.
• HTTP provides standard rules for web browsers &
servers to communicate.
• An HTTP is a stateless protocol as each transaction
is executed separately without having any
knowledge of the previous transactions, which
means that once the transaction is completed
between the web browser and the server, the
connection gets lost.
Communication Protocol: HTTPS
• HTTPS stands for Hyper Text Transfer Protocol
Secure.
• It means all communications between your
browser and the website are encrypted.
• The use of HTTPS protocol is mainly required
where we need to enter the bank account
details.
• The HTTPS protocol is mainly used where we
require to enter the login credentials.
HTTP Vs. HTTPS
HTTP HTTPS
It is mainly used for those websites that
provide information like blog writing.
It is a secure protocol, so it is used for those
websites that require to transmit the bank
account details or credit card numbers.
The HTTP transmits the data over port
number 80.
The HTTPS transmits the data over port
number 443.
The page loading speed is fast.
The page loading speed is slow as compared
to HTTP because of the additional feature
that it supports, i.e., security.
It is an application layer protocol. It is a transport layer protocol.
It does not use SSL.
It uses SSL that provides the encryption of
the data.
Mail Protocol: SMTP
• SMTP stands for Simple Mail Transfer Protocol.
• SMTP is the standard mechanism for electronic
mail in the internet.
• The addressing system used by SMTP consists of
two parts: Local part & Domain part
• Local-part @ Domain-part
• The main purpose of SMTP is used to set up
communication rules between servers.
• Most email clients allow for transfers of up to 25
MB.
Mail Protocol: POP3
• The POP protocol stands for Post Office Protocol.
• POP3 is a client/server protocol in which e-mail is
received and held for you by your Internet server.
• Periodically, you (or your client e-mail receiver)
check your mail-box on the server and download
any mail, probably using POP3.
• This standard protocol is built into most popular
e-mail products, such as Eudora and Outlook
Express.
SMTP Vs. POP3
SMTP POP3
SMTP is used to send the email POP is used to receive email
SMTP acts as a MTA (Message Transfer
Agent)
POP3 is a MAA (Message Access Agent)
The port number of SMTP is 25. The port number of POP3 is 110.
File Transfer Protocol: FTP
• FTP stands for File Transfer Protocol.
• FTP is an application layer protocol which moves
files between local and remote file systems.
• FTP establishes two connections between the client
and the server:
– One connection is used for data transfer (port 20).
– And the other for control information (port 21).
• The control connection is maintained during the
entire FTP session while the data connection is
opened and then closed for each file transferred.
File Transfer Protocol: SFTP
• It stands for Secure File Transfer Protocol.
• It builds on the File Transfer Protocol (FTP) and
includes Secure Shell (SSH) security components.
• Secure Shell is a cryptographic component of
internet security.
• SSH and SFTP were designed by the Internet
Engineering Task Force (IETF) for greater web
security.
• SFTP transfers files security using SSH and encrypted
FTP commands to avoid password sniffing and
exposing sensitive information in plain text.
FTP Vs. SFTP
FTP SFTP
FTP uses 2 channels to transfer data SFTP usage 1 channel to transfer data
It usually runs on port no-21 It runs on port no-22
It does not encrypt the data before sending It encrypted data before sending
SCP
• SCP stands for Secure Copy Protocol.
• Secure copy (SCP) is a file transfer protocol,
which helps in transferring computer files
securely from a local host to a remote host.
• It works on the Secure Shell (SSH) protocol
technique.
• It doesn’t allow user to see and modify files on
the server.
SFTP Vs. SCP
SFTP SCP
SFTP is slow SCP is fast
SFTP has to ACK (acknowledge) every tiny
packet
SCP does not need to ACK (acknowledge)
SCP is built purely for file transfers. Generally
speaking, you can't generate directory
listings (to view files within a directory),
create directories, delete directories, delete
files, and so on.
SFTP, on the other hand, can readily perform
these operations on its own.
Remote Login Protocol: Telnet
• Telnet stands for Terminal Network.
• It is a type of protocol that enables one
computer to connect to local computer.
• Computer which starts connection known as
the local computer. Computer which is being
connected to i.e. which accepts the connection
known as remote computer.
• During telnet operation whatever that is
performing on the remote computer will be
displayed by local computer.
Remote Login Protocol: SSH
• The SSH protocol (also referred to as Secure
Shell) is a method for secure remote login from
one computer to another.
• It provides several alternative options for strong
authentication, and it protects the
communications security and integrity with
strong encryption.
• It is a secure alternative to the non-protected
login protocols (such as telnet) and insecure file
transfer methods (such as FTP).
Telnet Vs. SSH
TELNET SSH
Telnet uses port 23 SSH runs on port 22 by default
No privileges are provided for the user's
authentication.
SSH is a more secure protocol, so it uses
public-key encryption for authentication.
Suitable for private networks Suitable for public networks
Today we learn
• Communication protocols
• Remote login and file transfer protocols.
• In the next class, we will see Web Services in
detail.
•Thanks

Contenu connexe

Tendances

voice over internet protocol
voice over internet protocol voice over internet protocol
voice over internet protocol
jomin mathew
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
subhradeep mitra
 

Tendances (20)

Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Digital to digital
Digital to digitalDigital to digital
Digital to digital
 
voice over internet protocol
voice over internet protocol voice over internet protocol
voice over internet protocol
 
Generation of mobile networks
Generation of mobile networksGeneration of mobile networks
Generation of mobile networks
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Network Application Performance
Network Application PerformanceNetwork Application Performance
Network Application Performance
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
Transmission media (data communication)
Transmission media (data communication)Transmission media (data communication)
Transmission media (data communication)
 
Personal Area Network
Personal Area NetworkPersonal Area Network
Personal Area Network
 
Mobile communication
Mobile communicationMobile communication
Mobile communication
 
Communication protocol presentation
Communication protocol presentationCommunication protocol presentation
Communication protocol presentation
 
Mobile Generations
Mobile GenerationsMobile Generations
Mobile Generations
 
3G Technology
3G Technology 3G Technology
3G Technology
 
A comparative study of 5 g network with existing wireless communication techn...
A comparative study of 5 g network with existing wireless communication techn...A comparative study of 5 g network with existing wireless communication techn...
A comparative study of 5 g network with existing wireless communication techn...
 
Computer networks a tanenbaum - 5th editionee
Computer networks   a tanenbaum - 5th editioneeComputer networks   a tanenbaum - 5th editionee
Computer networks a tanenbaum - 5th editionee
 
Protocols
ProtocolsProtocols
Protocols
 
Audio compression
Audio compressionAudio compression
Audio compression
 
5G radio access
5G radio access5G radio access
5G radio access
 
2. data and signals
2. data and signals2. data and signals
2. data and signals
 

Similaire à Remote Login and File Transfer Protocols

Computer Networks
Computer NetworksComputer Networks
Computer Networks
Shylesh BC
 
Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...
smitha273566
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocols
Priyanka Shinde
 

Similaire à Remote Login and File Transfer Protocols (20)

APPLICATION LAYER PROTOCOLS .pptx
APPLICATION LAYER PROTOCOLS         .pptxAPPLICATION LAYER PROTOCOLS         .pptx
APPLICATION LAYER PROTOCOLS .pptx
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
filetranferprotocolseminarpresentation.pptx
filetranferprotocolseminarpresentation.pptxfiletranferprotocolseminarpresentation.pptx
filetranferprotocolseminarpresentation.pptx
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
protocols (1).pptx
protocols (1).pptxprotocols (1).pptx
protocols (1).pptx
 
Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...Web essentials clients, servers and communication – the internet – basic inte...
Web essentials clients, servers and communication – the internet – basic inte...
 
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their  DEFNITIONS BY NAVEEN.pptxTypes of Protocals and their  DEFNITIONS BY NAVEEN.pptx
Types of Protocals and their DEFNITIONS BY NAVEEN.pptx
 
Application Protocol
Application Protocol Application Protocol
Application Protocol
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Application layer and protocols of application layer
Application layer and protocols of application layerApplication layer and protocols of application layer
Application layer and protocols of application layer
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocols
 
Fit project
Fit projectFit project
Fit project
 
Basic to advance protocols
Basic to advance protocolsBasic to advance protocols
Basic to advance protocols
 
application layer
application layerapplication layer
application layer
 
Vishal patel.pptx
Vishal patel.pptxVishal patel.pptx
Vishal patel.pptx
 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
 
Introduction to telnet
Introduction to telnetIntroduction to telnet
Introduction to telnet
 
protocols and types of protocols.
protocols and types of protocols.protocols and types of protocols.
protocols and types of protocols.
 
Web protocol.pptx
Web protocol.pptxWeb protocol.pptx
Web protocol.pptx
 

Plus de Himanshu Pathak

Plus de Himanshu Pathak (18)

Introduction to E commerce
Introduction to E commerceIntroduction to E commerce
Introduction to E commerce
 
Digital property rights
Digital property rightsDigital property rights
Digital property rights
 
Intellectual property rights
Intellectual property rightsIntellectual property rights
Intellectual property rights
 
An Introduction to Cyber Ethics
An Introduction to Cyber EthicsAn Introduction to Cyber Ethics
An Introduction to Cyber Ethics
 
Cascading style sheet part 2
Cascading style sheet   part 2Cascading style sheet   part 2
Cascading style sheet part 2
 
Cascading style sheet an introduction
Cascading style sheet   an introductionCascading style sheet   an introduction
Cascading style sheet an introduction
 
Html multimedia
Html multimediaHtml multimedia
Html multimedia
 
Html forms
Html formsHtml forms
Html forms
 
Html tables
Html tablesHtml tables
Html tables
 
Html link and list tags
Html link and list tagsHtml link and list tags
Html link and list tags
 
HTML Text formatting tags
HTML Text formatting tagsHTML Text formatting tags
HTML Text formatting tags
 
Basic html tags
Basic html tagsBasic html tags
Basic html tags
 
Introduction to html
Introduction to htmlIntroduction to html
Introduction to html
 
Mobile technologies
Mobile technologiesMobile technologies
Mobile technologies
 
Web services
Web servicesWeb services
Web services
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
What is Computer?
What is Computer?What is Computer?
What is Computer?
 

Dernier

Dernier (20)

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

Remote Login and File Transfer Protocols

  • 1. COMPUTER APPLICATIONS CLASS X (Code 165) TOPIC: UNIT 1: Application Layer Protocols By HIMANSHU PATHAK
  • 2. Contents • Introduction • Communication Protocol • Mail Protocol • File Transfer Protocol • Remote Login Protocol
  • 3. Introduction • Application Layer uses protocols such as HTTP(S) on client side applications like browser. • The application layer is responsible for providing services to the user: – Accessing the www – Mail Services – File Transfer and Access – Remote Log-in
  • 4. Communication Protocol: HTTP • HTTP stands for Hyper-Text Transfer Protocol. • HTTP is used mainly to access data on the world wide web. • HTTP provides standard rules for web browsers & servers to communicate. • An HTTP is a stateless protocol as each transaction is executed separately without having any knowledge of the previous transactions, which means that once the transaction is completed between the web browser and the server, the connection gets lost.
  • 5. Communication Protocol: HTTPS • HTTPS stands for Hyper Text Transfer Protocol Secure. • It means all communications between your browser and the website are encrypted. • The use of HTTPS protocol is mainly required where we need to enter the bank account details. • The HTTPS protocol is mainly used where we require to enter the login credentials.
  • 6. HTTP Vs. HTTPS HTTP HTTPS It is mainly used for those websites that provide information like blog writing. It is a secure protocol, so it is used for those websites that require to transmit the bank account details or credit card numbers. The HTTP transmits the data over port number 80. The HTTPS transmits the data over port number 443. The page loading speed is fast. The page loading speed is slow as compared to HTTP because of the additional feature that it supports, i.e., security. It is an application layer protocol. It is a transport layer protocol. It does not use SSL. It uses SSL that provides the encryption of the data.
  • 7. Mail Protocol: SMTP • SMTP stands for Simple Mail Transfer Protocol. • SMTP is the standard mechanism for electronic mail in the internet. • The addressing system used by SMTP consists of two parts: Local part & Domain part • Local-part @ Domain-part • The main purpose of SMTP is used to set up communication rules between servers. • Most email clients allow for transfers of up to 25 MB.
  • 8. Mail Protocol: POP3 • The POP protocol stands for Post Office Protocol. • POP3 is a client/server protocol in which e-mail is received and held for you by your Internet server. • Periodically, you (or your client e-mail receiver) check your mail-box on the server and download any mail, probably using POP3. • This standard protocol is built into most popular e-mail products, such as Eudora and Outlook Express.
  • 9. SMTP Vs. POP3 SMTP POP3 SMTP is used to send the email POP is used to receive email SMTP acts as a MTA (Message Transfer Agent) POP3 is a MAA (Message Access Agent) The port number of SMTP is 25. The port number of POP3 is 110.
  • 10. File Transfer Protocol: FTP • FTP stands for File Transfer Protocol. • FTP is an application layer protocol which moves files between local and remote file systems. • FTP establishes two connections between the client and the server: – One connection is used for data transfer (port 20). – And the other for control information (port 21). • The control connection is maintained during the entire FTP session while the data connection is opened and then closed for each file transferred.
  • 11. File Transfer Protocol: SFTP • It stands for Secure File Transfer Protocol. • It builds on the File Transfer Protocol (FTP) and includes Secure Shell (SSH) security components. • Secure Shell is a cryptographic component of internet security. • SSH and SFTP were designed by the Internet Engineering Task Force (IETF) for greater web security. • SFTP transfers files security using SSH and encrypted FTP commands to avoid password sniffing and exposing sensitive information in plain text.
  • 12. FTP Vs. SFTP FTP SFTP FTP uses 2 channels to transfer data SFTP usage 1 channel to transfer data It usually runs on port no-21 It runs on port no-22 It does not encrypt the data before sending It encrypted data before sending
  • 13. SCP • SCP stands for Secure Copy Protocol. • Secure copy (SCP) is a file transfer protocol, which helps in transferring computer files securely from a local host to a remote host. • It works on the Secure Shell (SSH) protocol technique. • It doesn’t allow user to see and modify files on the server.
  • 14. SFTP Vs. SCP SFTP SCP SFTP is slow SCP is fast SFTP has to ACK (acknowledge) every tiny packet SCP does not need to ACK (acknowledge) SCP is built purely for file transfers. Generally speaking, you can't generate directory listings (to view files within a directory), create directories, delete directories, delete files, and so on. SFTP, on the other hand, can readily perform these operations on its own.
  • 15. Remote Login Protocol: Telnet • Telnet stands for Terminal Network. • It is a type of protocol that enables one computer to connect to local computer. • Computer which starts connection known as the local computer. Computer which is being connected to i.e. which accepts the connection known as remote computer. • During telnet operation whatever that is performing on the remote computer will be displayed by local computer.
  • 16. Remote Login Protocol: SSH • The SSH protocol (also referred to as Secure Shell) is a method for secure remote login from one computer to another. • It provides several alternative options for strong authentication, and it protects the communications security and integrity with strong encryption. • It is a secure alternative to the non-protected login protocols (such as telnet) and insecure file transfer methods (such as FTP).
  • 17. Telnet Vs. SSH TELNET SSH Telnet uses port 23 SSH runs on port 22 by default No privileges are provided for the user's authentication. SSH is a more secure protocol, so it uses public-key encryption for authentication. Suitable for private networks Suitable for public networks
  • 18. Today we learn • Communication protocols • Remote login and file transfer protocols. • In the next class, we will see Web Services in detail. •Thanks