Академический Документы
Профессиональный Документы
Культура Документы
PART 3a
Transmitting and receiving in
communication systems -
Communication protocols
Communication protocols -
application level protocols
• http
• smtp
• SSL
HTTP - Hypertext transfer protocol
• Application level and layer 6 of OSI model
• GET command + URL – request html file, image files, audio files
video files etc. Web server transmits document to browser
• HTTP POST sends data from the browser to the web server eg
input forms
FTP
• FTP (File Transfer Protocol) is the simplest and most secure way to
exchange files over the Internet.
• When downloading a file from the Internet you're actually
transferring the file to your computer from another computer over
the Internet
• Example FTP site address: ftp://ftp.FTPplanet.com
• Most often, a computer with an FTP address is dedicated to receive
an FTP connection. Just as a computer that is setup to host Web
pages is referred to as a Web server or Website, a computer
dedicated to receiving an FTP connection is referred to as an FTP
server or FTP site.
• When using a Web browser for an FTP connection, FTP uploads are
difficult, or sometimes impossible, and downloads are not
protected (not recommended for uploading or downloading large
files).
Email Protocols – SMTP (Simple Mail
Transfer Protocol)
• Sends e-mail
• Email client software issues SMTP commands
that include the recipients address and the
content of the email
Email Protocols –POP (Post Office Protocol )
• Is the standard in which e-mail is received and held
for you by your Internet server.
• With POP3, your mail is saved for you in a single
mailbox on the server.
• When you read your mail, all of it is immediately
downloaded to your computer and, except when
previously arranged, no longer maintained on the
server.
Email Protocols – IMAP (Internet
Message Access Protocol)
• is a standard protocol in which e-mail is received and
held for you by your Internet server.
• You (or your e-mail client) can view just the heading
and the sender of the letter and then decide
whether to download the mail.
• You can also create and manipulate multiple folders
or mailboxes on the server, delete messages, or
search for certain parts or an entire note.
• IMAP requires continual access to the server during
the time that you are working with your mail.
SSL (Secure Sockets Layer)
• The Secure Sockets Layer (SSL) is a commonly-used protocol for
managing the security of a message transmission on the Internet.
• SSL has recently been succeeded by Transport Layer Security (TLS),
which is based on SSL. SSL uses a program layer located between
the Internet's Hypertext Transfer Protocol (HTTP) and Transport
Control Protocol (TCP) layers.
• The "sockets" part of the term refers to the sockets method of
passing data back and forth between a client and a server program
in a network or between program layers in the same computer.
• SSL uses the public-and-private key encryption system from RSA,
which also includes the use of a digital certificate.
• TLS and SSL are an integral part of most Web browsers (clients) and
Web servers.
• If a Web site is on a server that supports SSL, SSL can be enabled
and specific Web pages can be identified as requiring SSL access.
TLS (Transport Layer Security)
• Is a protocol that ensures privacy between communicating
applications and their users on the Internet.
• When a server and client communicate, TLS ensures that no third
party may eavesdrop or tamper with any message.
• TLS is the successor to the Secure Sockets Layer (SSL). TLS is
composed of two layers: the TLS Record Protocol and the TLS
Handshake Protocol.
• The TLS Record Protocol provides connection security with some
encryption method such as the Data Encryption Standard (DES).
• The TLS Record Protocol can also be used without encryption. The
TLS Handshake Protocol allows the server and client to authenticate
each other and to negotiate an encryption algorithm and
cryptographic keys before data is exchanged.
Sockets
• Sockets is a method for communication
between a client program and a server
program in a network.
• A socket is defined as "the endpoint in a
connection."
• Sockets are created and used with a set of
programming requests or "function calls"
sometimes
Digital Certificate
• A digital certificate is an electronic "credit card" that
establishes your credentials when doing business or
other transactions on the Web.
• Using special software, you obtain a message hash (mathematical summary) of the
contract.
• You then use a private key that you have previously obtained from a public-private
key authority to encrypt the hash.
• The encrypted hash becomes your digital signature of the message. (Note that it
will be different each time you send a message.)
• At the other end, your lawyer receives the message. To make sure it's intact and
from you, your lawyer makes a hash of the received message.
• Your lawyer then uses your public key to decrypt the message hash or summary.