SlideShare a Scribd company logo
1 of 29
Chapter 26 SMTP and FTP
26.1  Electronic Mail Sending/Receiving Mail Addresses User Agent MIME Mail Transfer Agent Mail Access Protocols
Figure 26.1   Format of an email
Figure 26.2   Email address
Figure 26.3   User agent
Some examples of command-driven user agents are mail, pine, and elm. Note :
Some examples of GUI-based user agents are Eudora, Outlook, and Netscape. Note :
Figure 26.4   MIME
Figure 26.5   MIME header
Table 26.1 Data types and subtypes in MIME   General binary data (8-bit bytes) Octet-Stream Adobe PostScript PostScript Application Single-channel encoding of voice at 8 KHz Basic Audio Video is in MPEG format MPEG Video Video is in GIF format GIF Image is in JPEG JPEG Image Body is a reference to another message Ext. Body Partial RFC822 Alternative Digest Parallel Mixed Plain Subtype Body is a fragment of a bigger message Body is an encapsulated message Message Parts are different versions of the same message Similar to mixed, but the default is message/RFC822 Same as above, but no order Body contains ordered parts of different data types Multiport Unformatted text Text Description Type
Table 26.2  Content-transfer encoding Non-ASCII characters are encoded as an equal sign followed by an ASCII code 6-bit blocks of data are encoded into 8-bit ASCII characters Non-ASCII characters with unlimited-length lines Non-ASCII characters and short lines ASCII characters and short lines Description Base64 Binary 8bit  7bit  Type Category
Figure 26. 6   Base64
Table 26.3  Base64 encoding table 2 1 0 z y x w v u t s Code 63 62 61 60 59 58 57 56 55 Value / + 9 8 7 6 5 4 3 Code 43 42 41 40 39 38 37 36 35 34 33 Value r q p o n m l k j i h Code 54 53 52 51 50 49 48 47 46 45 44 Value V U T S R Q P O N M L Code 32 31 30 29 28 27 26 25 24 23 22 Value g f e d c b a Z Y X W Code 21 20 19 18 17 16 15 14 13 12 11 Value K J I H G F E D C B A Code 9 10 6 7 8 3 4 5 2 1 0 Value
Figure 26.7   Quoted-printable
Figure 26.8   MTA client and server
Figure 26.9   Commands and responses
Figure 26.10   Email delivery
Figure 26.11   POP3
26.2  File Transfer  Connections Communication File Transfer User Interface Anonymous
FTP uses the services of TCP. It needs two TCP connections. The well-known port 21 is used for the control connection, and the well-known port 20 is used for the data connection. Note :
Figure 26.12   FTP
Figure 26.13   Using the control connection
Figure 26.14   Using the data connection
Figure 26.15   File transfer
Example 1 ,[object Object],[object Object],[object Object],[object Object]
Figure 26.16   Example 1
Table 26.4  List of FTP commands in UNIX !, $, account, append, ascii, bell, binary, bye, case, cd, cdup, close, cr, delete, debug, dir, discount, form, get, glob, hash, help, lcd, ls, macdef, mdelete, mdir, mget, mkdir, mls, mode, mput, nmap, ntrans, open, prompt, proxy, sendport, put, pwd, quit, quote, recv, remotehelp, rename, reset, rmdir, runique, send, status, struct, sunique, tenex, trace, type, user, verbose,? Commands
Example 2 We show some of the user interface commands that accomplish the same task as in Example 1. The user input is shown in boldface. As shown below, some of the commands are provided automatically by the interface. The user receives a prompt and provides only the arguments. $  ftp challenger.atc.fhda.edu Connected to challenger.atc.fhda.edu 220 Server ready Name:  forouzan Password:  xxxxxxx ftp >  ls /usr/user/report 200 OK 150 Opening ASCII mode ........... ........... 226 transfer complete ftp >  close 221 Goodbye ftp >  quit
Example 3 We show an example of using anonymous FTP. We connect to internic.net, where we assume there are some public data available. $  ftp internic.net Connected to internic.net 220 Server ready Name:  anonymous 331 Guest login OK, send "guest" as password Password:  guest ftp >  pwd 257 '/' is current directory ftp >  ls 200 OK 150 Opening ASCII mode bin ... ftp >  close 221 Goodbye ftp >  quit

More Related Content

What's hot (20)

Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IP
 
Chapter 30 - Cry
Chapter 30 - CryChapter 30 - Cry
Chapter 30 - Cry
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Ch19
Ch19Ch19
Ch19
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Flow control & error control
Flow control & error controlFlow control & error control
Flow control & error control
 
Chapter 3: Data & Signals
Chapter 3: Data & SignalsChapter 3: Data & Signals
Chapter 3: Data & Signals
 
Data link layer
Data link layerData link layer
Data link layer
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
 
Chapter 31
Chapter 31Chapter 31
Chapter 31
 
9 multiple access
9 multiple access9 multiple access
9 multiple access
 
Data link layer
Data link layer Data link layer
Data link layer
 
Ip addressing classful
Ip addressing classfulIp addressing classful
Ip addressing classful
 
Flow control and error control
Flow control and error controlFlow control and error control
Flow control and error control
 
Chapter 8: Switching
Chapter 8: SwitchingChapter 8: Switching
Chapter 8: Switching
 
Routing
RoutingRouting
Routing
 
Global state routing
Global state routingGlobal state routing
Global state routing
 

Viewers also liked (20)

Email - Electronic Mail
Email - Electronic MailEmail - Electronic Mail
Email - Electronic Mail
 
CFIMAP & CFPOP
CFIMAP & CFPOPCFIMAP & CFPOP
CFIMAP & CFPOP
 
Ch 20
Ch 20Ch 20
Ch 20
 
Ch 31
Ch 31Ch 31
Ch 31
 
Ch 27
Ch 27Ch 27
Ch 27
 
Ch 28
Ch 28Ch 28
Ch 28
 
Ch 29
Ch 29Ch 29
Ch 29
 
Ch 24
Ch 24Ch 24
Ch 24
 
Ch 16
Ch 16Ch 16
Ch 16
 
Ch 07
Ch 07Ch 07
Ch 07
 
Ch 12
Ch 12Ch 12
Ch 12
 
Ch 23
Ch 23Ch 23
Ch 23
 
Ch 18
Ch 18Ch 18
Ch 18
 
Ch14
Ch14Ch14
Ch14
 
Ch 30
Ch 30Ch 30
Ch 30
 
Ch 14
Ch 14Ch 14
Ch 14
 
Ch 25
Ch 25Ch 25
Ch 25
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Ch 02
Ch 02Ch 02
Ch 02
 
Ch 13
Ch 13Ch 13
Ch 13
 

Similar to Ch 26

26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_TransferAhmar Hashmi
 
transfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imaptransfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imapAKSHIT KOHLI
 
Network_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.pptNetwork_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.pptBlackHat41
 
Introduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerIntroduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerVNIT-ACM Student Chapter
 
Chap 02
Chap 02Chap 02
Chap 02IGNOU
 
Protocol Ppt[1]
Protocol Ppt[1]Protocol Ppt[1]
Protocol Ppt[1]anil933
 
2.(3)OSI and TCP layer.ppt
2.(3)OSI and TCP layer.ppt2.(3)OSI and TCP layer.ppt
2.(3)OSI and TCP layer.pptprashant554034
 
OSI open system interconnection LAYERS.pdf
OSI open system interconnection LAYERS.pdfOSI open system interconnection LAYERS.pdf
OSI open system interconnection LAYERS.pdfgadisaAdamu
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfabdnazar2003
 
DomainNamingServer and its objectives.ppt
DomainNamingServer and its objectives.pptDomainNamingServer and its objectives.ppt
DomainNamingServer and its objectives.pptcollegecode4u
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.pptBlaqray1998
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.pptBlaqray1998
 
Meeting 11. electronic mail: smtp
Meeting 11. electronic mail: smtpMeeting 11. electronic mail: smtp
Meeting 11. electronic mail: smtpSyaiful Ahdan
 

Similar to Ch 26 (20)

Chapter 26
Chapter 26Chapter 26
Chapter 26
 
26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer
 
transfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imaptransfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imap
 
ch02.ppt
ch02.pptch02.ppt
ch02.ppt
 
Network_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.pptNetwork_Model. In the field of Computer Networking.ppt
Network_Model. In the field of Computer Networking.ppt
 
Introduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link LayerIntroduction to the OSI 7 layer model and Data Link Layer
Introduction to the OSI 7 layer model and Data Link Layer
 
Chap 02
Chap 02Chap 02
Chap 02
 
Protocol Ppt[1]
Protocol Ppt[1]Protocol Ppt[1]
Protocol Ppt[1]
 
2.(3)OSI and TCP layer.ppt
2.(3)OSI and TCP layer.ppt2.(3)OSI and TCP layer.ppt
2.(3)OSI and TCP layer.ppt
 
Lec2_CH02.PPT
Lec2_CH02.PPTLec2_CH02.PPT
Lec2_CH02.PPT
 
OSI open system interconnection LAYERS.pdf
OSI open system interconnection LAYERS.pdfOSI open system interconnection LAYERS.pdf
OSI open system interconnection LAYERS.pdf
 
Ch02.ppt
Ch02.pptCh02.ppt
Ch02.ppt
 
CCNA Day 1
CCNA Day 1CCNA Day 1
CCNA Day 1
 
Computer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdfComputer Networks/Computer Engineering.pdf
Computer Networks/Computer Engineering.pdf
 
Ftp
FtpFtp
Ftp
 
DomainNamingServer and its objectives.ppt
DomainNamingServer and its objectives.pptDomainNamingServer and its objectives.ppt
DomainNamingServer and its objectives.ppt
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.ppt
 
Chapter_3_Networking.ppt
Chapter_3_Networking.pptChapter_3_Networking.ppt
Chapter_3_Networking.ppt
 
Meeting 11. electronic mail: smtp
Meeting 11. electronic mail: smtpMeeting 11. electronic mail: smtp
Meeting 11. electronic mail: smtp
 
OSI MODEL
OSI MODELOSI MODEL
OSI MODEL
 

More from soumya ranjan mohanty (14)

Ch 22
Ch 22Ch 22
Ch 22
 
Ch 21
Ch 21Ch 21
Ch 21
 
Ch 17
Ch 17Ch 17
Ch 17
 
Ch 19
Ch 19Ch 19
Ch 19
 
Ch 15
Ch 15Ch 15
Ch 15
 
Ch 10
Ch 10Ch 10
Ch 10
 
Ch 11
Ch 11Ch 11
Ch 11
 
Ch 09
Ch 09Ch 09
Ch 09
 
Ch 08
Ch 08Ch 08
Ch 08
 
Ch 06
Ch 06Ch 06
Ch 06
 
Ch 05
Ch 05Ch 05
Ch 05
 
Ch 04
Ch 04Ch 04
Ch 04
 
Ch 03
Ch 03Ch 03
Ch 03
 
Ch 1
Ch 1Ch 1
Ch 1
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Ch 26

  • 1. Chapter 26 SMTP and FTP
  • 2. 26.1 Electronic Mail Sending/Receiving Mail Addresses User Agent MIME Mail Transfer Agent Mail Access Protocols
  • 3. Figure 26.1 Format of an email
  • 4. Figure 26.2 Email address
  • 5. Figure 26.3 User agent
  • 6. Some examples of command-driven user agents are mail, pine, and elm. Note :
  • 7. Some examples of GUI-based user agents are Eudora, Outlook, and Netscape. Note :
  • 8. Figure 26.4 MIME
  • 9. Figure 26.5 MIME header
  • 10. Table 26.1 Data types and subtypes in MIME General binary data (8-bit bytes) Octet-Stream Adobe PostScript PostScript Application Single-channel encoding of voice at 8 KHz Basic Audio Video is in MPEG format MPEG Video Video is in GIF format GIF Image is in JPEG JPEG Image Body is a reference to another message Ext. Body Partial RFC822 Alternative Digest Parallel Mixed Plain Subtype Body is a fragment of a bigger message Body is an encapsulated message Message Parts are different versions of the same message Similar to mixed, but the default is message/RFC822 Same as above, but no order Body contains ordered parts of different data types Multiport Unformatted text Text Description Type
  • 11. Table 26.2 Content-transfer encoding Non-ASCII characters are encoded as an equal sign followed by an ASCII code 6-bit blocks of data are encoded into 8-bit ASCII characters Non-ASCII characters with unlimited-length lines Non-ASCII characters and short lines ASCII characters and short lines Description Base64 Binary 8bit 7bit Type Category
  • 12. Figure 26. 6 Base64
  • 13. Table 26.3 Base64 encoding table 2 1 0 z y x w v u t s Code 63 62 61 60 59 58 57 56 55 Value / + 9 8 7 6 5 4 3 Code 43 42 41 40 39 38 37 36 35 34 33 Value r q p o n m l k j i h Code 54 53 52 51 50 49 48 47 46 45 44 Value V U T S R Q P O N M L Code 32 31 30 29 28 27 26 25 24 23 22 Value g f e d c b a Z Y X W Code 21 20 19 18 17 16 15 14 13 12 11 Value K J I H G F E D C B A Code 9 10 6 7 8 3 4 5 2 1 0 Value
  • 14. Figure 26.7 Quoted-printable
  • 15. Figure 26.8 MTA client and server
  • 16. Figure 26.9 Commands and responses
  • 17. Figure 26.10 Email delivery
  • 18. Figure 26.11 POP3
  • 19. 26.2 File Transfer Connections Communication File Transfer User Interface Anonymous
  • 20. FTP uses the services of TCP. It needs two TCP connections. The well-known port 21 is used for the control connection, and the well-known port 20 is used for the data connection. Note :
  • 22. Figure 26.13 Using the control connection
  • 23. Figure 26.14 Using the data connection
  • 24. Figure 26.15 File transfer
  • 25.
  • 26. Figure 26.16 Example 1
  • 27. Table 26.4 List of FTP commands in UNIX !, $, account, append, ascii, bell, binary, bye, case, cd, cdup, close, cr, delete, debug, dir, discount, form, get, glob, hash, help, lcd, ls, macdef, mdelete, mdir, mget, mkdir, mls, mode, mput, nmap, ntrans, open, prompt, proxy, sendport, put, pwd, quit, quote, recv, remotehelp, rename, reset, rmdir, runique, send, status, struct, sunique, tenex, trace, type, user, verbose,? Commands
  • 28. Example 2 We show some of the user interface commands that accomplish the same task as in Example 1. The user input is shown in boldface. As shown below, some of the commands are provided automatically by the interface. The user receives a prompt and provides only the arguments. $ ftp challenger.atc.fhda.edu Connected to challenger.atc.fhda.edu 220 Server ready Name: forouzan Password: xxxxxxx ftp > ls /usr/user/report 200 OK 150 Opening ASCII mode ........... ........... 226 transfer complete ftp > close 221 Goodbye ftp > quit
  • 29. Example 3 We show an example of using anonymous FTP. We connect to internic.net, where we assume there are some public data available. $ ftp internic.net Connected to internic.net 220 Server ready Name: anonymous 331 Guest login OK, send "guest" as password Password: guest ftp > pwd 257 '/' is current directory ftp > ls 200 OK 150 Opening ASCII mode bin ... ftp > close 221 Goodbye ftp > quit