Вы находитесь на странице: 1из 19

APPLICATION PROTOCOLS

FILE TRANSFER PROTOCOL


EMAIL SYSTEM
File Transfer Protocol(FTP) Application

The transfer of files among computers connected on the internet.


Provides the ability to download and /or upload files between
connected computers.
The application comprises of two components
FTP server
FTP client.
The protocol requires the client to login to the FTP server.
On successful login, the client can browse through the list of files
and directories available under the login account.
It can request to transfer a file from the server machine to
the client machine or transfer a file from client's machine
to server's machine .

The protocol only specifies the mode of interaction


between the FTP server and clients, running on two
computers.

3/12/2017 by vijetha v bhat 3


The client offers functionality to look at the files in the remote
account as well as local account and copy text and binary files
from the remote account to the local account and vice versa.

The file transfer application operates through two connections, as


control connections to be established prior to attempting any file
transfers.
On making the control connection the FTP server requests
authorization information in the form of a user name
password.
The authorization information determines whether the files can be
accessed by the FTP user.
Subject to access permissions, users can transfer files in either
direction through "Get" or "Put" command.

3/12/2017 by vijetha v bhat 4


Electronic Mail

Electronic Mail is an internet application that offers the ability to exchange messages
among users on remote computers.
The e-mail application is built upon the TCP stream .
It offers the reliable and instant delivery of messages in a users mailbox.
An e-mail system is concerned
with the ability to compose messages
move messages from the originators site to the recipients site
report the delivery status to originators
browse messages by the recipients and finally the dispose off messages.

A typical architecture of the e-mail system consists of two components to accomplish


the functionality-a user interface program and the message transfer server.

3/12/2017 by vijetha v bhat 5


The user interface, also often called mail reader, is a program that
offers users an interface to compose a new message, read a
message, reply to senders and delete or file the message.

The user interface program (mail reader) provides three of the five
functions, i.e. composing, browsing, and disposition.

Message Transfer Agent (MTA) programs accomplish the function


of transferring the message to the destination.

These programs communicate with each other using a standard


protocol.

3/12/2017 by vijetha v bhat 6


These programs communicate with each other using
a standard protocol.
A user agent composes a message and informs the
message transfer agent of its delivery, by placing it in
the appropriate queue.
The composed message contains the destination
mailbox address.
The message transfer agent connects to the other
message transfer agent running on the machine
specified in the destination address of the composed
message and delivers it through the standard
message transfer protocol.

3/12/2017 by vijetha v bhat 7


WORLD WIDE WEB SERVER

The concept of the World Wide Web (WWW) was developed at


CERN with the objective of enabling document sharing among
scientists.

A prototype system offering the ability to inter link multimedia


documents, distributed over the network through the concept of
hyperlinks, was developed at CERN.

The developed system offered a intuitive and logical interface that


makes it easier to browse textual, graphical, audio and video
information integrated on the same screen.

3/12/2017 by vijetha v bhat 8


Original architecture proposed by Tim Berner-Lee
It consists of documents stored and managed on server machines and
client processes running on distant or even the machine.

The server software receives requests from the client processes and
replies to them by delivering appropriate documents.

In the proposed system the client and server processes run on


machines connected on the network.

The architecture consisted of two building blocks, the server and the
client process, communicating on the same network.

3/12/2017 by vijetha v bhat 9


What is HTTP?
Hypertext text transfer protocol is a set of rules that world
wide web clients and servers use to communicate over the
network.

It is a connection less protocol,


browsers and servers do not establish a permanent
connection.

A client opens a connection and submits a request message


to a server.

3/12/2017 by vijetha v bhat 10


The server on receiving a message, process and
responds to it and closes the connection.
It is also a stateless protocol, implying that the server
does not maintain any information on the state of the
process.
The client usually a web browser, submits a request
to a web server.
The server reads the incoming protocol packet,
processes it and sends the response

3/12/2017 by vijetha v bhat 11


The content type is built as part of the protocol's
response packet.
The browser has to be aware of the type of multimedia
content delivered to it as a response.
The content types used in the protocol are a subset of the
standard MIME types.
Browser connects to the server machine, specified by
domain name/IP address, at the specified or standard
port.
The session consists of two phases,
the first phase - the client's request submission
second phase - the servers response.

3/12/2017 by vijetha v bhat 12


3/12/2017 by vijetha v bhat 13
Step 1: HTTP packets can be transmitted only after the client
has established a connection with the server.
In this step the browser parses the URL for identifying the
domain name.
It uses the services of Domain Name Server (DNS) to resolve
the name into an IP address.
Using the services offered by the TCP layer, it opens a
connection to the IP address, at a standard web or URL
specified port.
On the successful opening of a connection, the browser starts
the HTTP session.

3/12/2017 by vijetha v bhat 14


STEP 2: The browser submits HTTP packets containing
the request command, to the connected server.
The common HTTP request commands are "get",
"post", and "head".
The request in HTTP is made up of three components
the command method
resource identifier
the protocol version number.
An example of the "GET" command is as follows:

GET /index.html http/l.0

3/12/2017 by vijetha v bhat 15


STEP 3: In this step the browser submits the header information to
the server.
The information includes the browser identity, its capability to
handle various types of and the referring URL.
The header information follows a standard format of header and
the value pair, separated by the colon (:) sign.

The header information is read and processed by the server and is


made available at the server end as environment variables.

For example, referer information is available as the HTTP-


Referer environment variable, accept as HTTP-Accept, and so on.
In case of 'post method' the browser as part of the header
information also submits the form-data, content-type and content-
length.
3/12/2017 by vijetha v bhat 16
STEP 4:
On receiving the client request and header information, the
server processes the request and sends the response to the
client.
If the request was processes and can be delivered, the
server sends and OK response.
Some common errors that it may send as responses include
forbidden document, Not found , internal server error,
or unauthorized access.
The format of the response sent by the server includes the
response code and the protocol version.
The protocol version informs the client about the kind of
syntax used in responses.

3/12/2017 by vijetha v bhat 17


Step 5:

Prior to sending the requested data, the server sends information


about the data, such as the type of content and length of content
as well as information about the server itself, as part of the
response phase.

The response headers sent by servers are also used, at times, for
accomplishing authentication and setting up cookies.

The response header information follows the same syntax as


request headers.

3/12/2017 by vijetha v bhat 18


End of presentation

3/12/2017 by vijetha v bhat 19

Вам также может понравиться