NEW4
NEW4
ANNEXURE-I
ANNEXURE-II
1
ANNEXURE-I
2
5.0 Action Plan
3
ANNEXURE-II
Protocol
Protocol, in computer science, a set of rules or procedures for transmitting data between electronic
devices, such as computers. In order for computers to exchange information, there must be a
preexisting agreement as to how the information will be structured and how each side will send
and receive it. Without a protocol, a transmitting computer, for example, could be sending its data
in 8-bit packets while the receiving computer might expect the data in 16-bit packets. Protocols are
established by international or industrywide organizations. Perhaps the most important computer
protocol is OSI (Open Systems Interconnection), a set of guidelines for implementing networking
communications between computers. Among the most important sets of Internet protocols
are TCP/IP (Transmission Control Protocol/Internet Protocol), HTTPS (Secure HyperText
Transmission Protocol), SMTP (Simple Mail Transfer Protocol), and DNS (Domain
Name System).
Overview of Protocol
In Order to make communication successful between devices, some rules and procedures should
be agreed upon at the sending and receiving ends of the system. Such rules and procedures are
called as Protocols. Different types of protocols are used for different types of communication.
In above diagrams Protocols are shown as set of rules. Such that Communication between Sender
and Receiver is not possible without Protocol. Therefore protocol is must important in data
communication in computer network.
4
Key Elements of Protocol
1. Syntax: Syntax basically represents the format of the data means in which order data is
presented. It also indicates how to read the data. It simply means the way to represent
data. For Example, let us suppose a data packet has 16 bits, in which the first 4 bits are
the sender’s address, the last 4 bits are the receiver’s address and the rest is the message.
So, this is a syntax to represent data bits.
3. Timing: Timing simply means when the data is to be sent and how fast the data can be
sent. For Example, if the Sender sends the data at 100 MBPS and the receiver receives it
at 1 MBPS, then the data gets overflowed at the receiver end.
Functions of Protocol
5
Data Transfer Management: It is simply the management of the flow of data to provide
sequencing and matching.
Segmentation and Reassembly: Segmentation is the process of breaking data into smaller
blocks and adding some extra information for peer use and Reassembly means when the
upper-level protocol combines to get actual data when we remove control information sent
by the sender.
Error Control: Error Control is simply the loss of data or sometimes damage in data upon
transmission in data. It is implemented in two ways
Error Detection
Retransmission of Data
Flow Control: The process of controlling the flow of data to limit the rate of data sent by
transmitting frame. Techniques used for this method are stop and wait, etc. It is used to
basically control the problems like data loss, data overloading, etc.
1. Connectivity – Internet Protocol enables devices to communicate with each other across
the world. This means that people from different parts of the world can share
information and work together seamlessly.
3. Flexibility – Internet Protocol is a flexible protocol that allows for the creation of
customized networks. This means that organizations can create their own private networks
and control who has access to them.
4. Reliability – Internet Protocol is a reliable protocol that ensures that data is transmitted
accurately and efficiently. It also includes features that allow for the detection and
correction of errors in data transmission.
6
5. Security – Internet Protocol includes features that enable secure transmission of data
across networks. These features include encryption, which ensures that data cannot be
read by unauthorized parties.
1. Security risks – Internet Protocol is vulnerable to attacks such as hacking, phishing, and
denial of service, which can result in data breaches, loss of personal information, and
financial losses.
3. Limited scalability – Internet Protocol has limitations in the number of devices it can
connect, and as the number of devices increases, the IP addresses may run out, resulting in
connectivity issues.
4. Lack of privacy – Internet Protocol does not provide complete privacy and anonymity.
Your data is transmitted in packets that can be intercepted, traced, and monitored by
unauthorized entities, which can compromise your privacy.
TCP is a foundational protocol that operates at the transport layer of the OSI model. It guarantees
the reliable and ordered delivery of data packets between devices. TCP is widely used for
applications that require accurate and error-free data transfer, such as web browsing, email, file
transfer, and remote access. TCP is one of the basic standards that define the rules of the internet
and is included within the standards defined by the Internet Engineering Task Force (IETF). It is
one of the most commonly used protocols within digital network communications and ensures
end-to-end data delivery. TCP organizes data so that it can be transmitted between a server and a
client. It guarantees the integrity of the data being communicated over a network. Before it
10
transmits data, TCP establishes a connection between a source and its destination, which it ensures
remains live until communication begins. It then breaks large amounts of data into smaller packets,
while ensuring data integrity is in place throughout the process.
The TCP/IP model is the default method of data communication on the Internet. It was developed
by the United States Department of Defense to enable the accurate and correct transmission of data
between devices. It breaks messages into packets to avoid having to resend the entire message in
case it encounters a problem during transmission. Packets are automatically reassembled once they
reach their destination. Every packet can take a different route between the source and the
destination computer, depending on whether the original route used becomes congested or
unavailable.
TCP/IP divides communication tasks into layers that keep the process standardized, without
hardware and software providers doing the management themselves. The data packets must pass
through four layers before they are received by the destination device, then TCP/IP goes through
the layers in reverse order to put the message back into its original format.
As a connection based protocol, the TCP establishes and maintains a connection between
applications or devices until they finish exchanging data. It determines how the original message
should be broken into packets, numbers and reassembles the packets, and sends them on to other
devices on the network, such as routers, security gateways, and switches, then on to their
destination. TCP also sends and receives packets from the network layer, handles the transmission
of any dropped packets, manages flow control, and ensures all packets reach their destination.
A good example of how this works in practice is when an email is sent using SMTP from an email
server. To start the process, the TCP layer in the server divides the message into packets, numbers
them, and forwards them to the IP layer, which then transports each packet to the destination email
server. When packets arrive, they are handed back to the TCP layer to be reassembled into the
original message format and handed back to the email server, which delivers the message to a
user’s email inbox.
TCP/IP uses a three-way handshake to establish a connection between a device and a server,
which ensures multiple TCP socket connections can be transferred in both directions concurrently.
Both the device and server must synchronize and acknowledge packets before communication
begins, then they can negotiate, separate, and transfer TCP socket connections.
11
Following are the five layers of the TCP/IP model:
It is not generic in nature. So, it fails to represent any protocol stack other than the TCP/IP
suite. For example, it cannot describe the Bluetooth connection.
It does not clearly separate the concepts of services, interfaces, and protocols. So, it is not
suitable to describe new technologies in new networks.
It does not distinguish between the data link and the physical layers, which has very
different functionalities. The data link layer should concern with the transmission of
frames. On the other hand, the physical layer should lay down the physical characteristics
of transmission. A proper model should segregate the two layers.
It was originally designed and implemented for wide area networks. It is not optimized for
small networks like LAN (local area network) and PAN (personal area network).
12
2. Hypertext Transfer Protocol (HTTP)
HTTP is a protocol used for transferring web pages and other resources on the World Wide Web.
It operates at the application layer and defines how browsers and web servers communicate.
HTTPS, a secure version of HTTP, incorporates encryption to protect data integrity and user
privacy.
HTTP is a protocol for fetching resources such as HTML documents. It is the foundation of any
data exchange on the Web and it is a client-server protocol, which means requests are initiated
by the recipient, usually the Web browser. A complete document is reconstructed from the
different sub-documents fetched, for instance, text, layout description, images, videos, scripts,
and more.
Clients and servers communicate by exchanging individual messages (as opposed to a stream of
data). The messages sent by the client, usually a Web browser, are called requests and the
messages sent by the server as an answer are called responses.
Designed in the early 1990s, HTTP is an extensible protocol which has evolved over time. It is an
application layer protocol that is sent over TCP, or over a TLS-encrypted TCP connection, though
any reliable transport protocol could theoretically be used. Due to its extensibility, it is used to not
only fetch hypertext documents, but also images and videos or to post content to servers, like with
HTML form results. HTTP can also be used to fetch parts of documents to update Web pages on
demand.
Working of HTTP
13
HTTP works entirely through HTTP messages. There are two types of HTTP messages:
Request: These are messages sent by the client to the server to trigger an action
Response: These are messages sent by the server to the client in response to the request
message
We can see that exchanging these messages in a request/response cycle enables data exchange
between a client and server.
Figure 2 below illustrates the outline of a typical HTTP message. It's divided into three fields: start
line, headers, and body. However, keep in mind that the request and response messages have a few
key differences in the content that go into each of these fields that will be discussed in their
respective sections.
14
HTTP request messages
Figure 3 depicts the structure of a typical HTTP request message and the data it contains in its
fields.
Start line
As shown in Figure 3, the start line for the request messages contains the following:
HTTP method
The HTTP method is a command that tells the server what type of request the client is making.
GET
POST
PUT
PATCH
DELETE
Request target
The request target, which is most often a URL, contains the location of the resource
corresponding to the request message. For example, the request-target in a GET message would
include the URL for a file the client wants from the server.
HTTP response messages don't contain a request-target as they already contain the client's
requested resource.
Advantages of HTTP
1. Addressing
HTTP uses advanced scheme of addressing. It assigns IP address with recognizable names so that
it can be identified easily in the World Wide Web. Compared to the standard procedure of IP
address with a series of numbers, using this the public can easily engage with the internet.
2. Flexibility
Whenever there are additional capabilities needed by an application, HTTP has the capability to
download extensions or plugins and display the relevant data. These can include Flash players and
Acrobat reader.
3. Security
15
In HTTP each files is downloaded from an independent connection and then gets closed. Due to
this no more than one single element of a webpage gets transferred. Therefore, the chance of
interception during transmission is minimized here.
4. Latency
Only when the connection is established, the handshaking process will take place in HTTP. Hence,
there will be no handshaking procedure following a request. This significantly reduces latency in
the connection.
5. Accessibility
When the page is loaded for the first time, all of the HTTP pages gets stored inside the internet
caches known as the page cache. Therefore, once the page is visited again, the content is loaded
quickly.
Disadvantages of HTTP
1. Data Integrity
Since there are no any encryption methods used in HTTP, there are chances of someone altering
the content. That is the reason why HTTP is considered to be an insecure method prone to data
integrity.
2. Data Privacy
Privacy is another problem faced in a HTTP connection. If any hacker manages to intercept
the request they can view all the content present in the web page. Besides that they can also
gather confidential informations such as the username and the password.
3. Server Availability
Even if HTTP receives all the data that it needs, clients does not take measures to close the
connection. Therefore, during this time period, server will not be present.
4. Administrative Overhead
For transmitting a web page, a HTTP needs to create multiple connections. This causes
administrative overhead in the connection.
16
5. IOT Device Support
HTTP uses more number of system resources which leads to more power consumption. Since IoT
device today contain wireless sensor networks, it is not suitable to use HTTP.
The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer
of computer files from a server to a client on a computer network. FTP is built on a client–server
model architecture using separate control and data connections between the client and the server.
FTP users may authenticate themselves with a plain-text sign-in protocol, normally in the form of
a username and password, but can connect anonymously if the server is configured to allow it. For
secure transmission that protects the username and password, and encrypts the content, FTP is
often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).
The first FTP client applications were command-line programs developed before operating
systems had graphical user interfaces, and are still shipped with most Windows, Unix,
and Linux operating systems. Many dedicated FTP clients and automation utilities have since
been developed for desktops, servers, mobile devices, and hardware, and FTP has been
incorporated into productivity applications such as HTML editors and file managers.
An FTP client used to be commonly integrated in web browsers, where file servers are browsed
with the URI prefix " ftp: // ". In 2021, FTP support was dropped by Google Chrome and Firefox.
In active mode, the client starts listening for incoming data connections from the server on port
M. It sends the FTP command PORT M to inform the server on which port it is listening. The
server then initiates a data channel to the client from its port 20, the FTP server data port.
In situations where the client is behind a firewall and unable to accept incoming TCP
connections, passive mode may be used. In this mode, the client uses the control connection to
send a PASV command to the server and then receives a server IP address and server port
number from the server which the client then uses to open a data connection from an arbitrary
client port to the server IP address and server port number received.
17
Both modes were updated in September 1998 to support IPv6. Further changes were introduced to
the passive mode at that time, updating it to extended passive mode.
The server responds over the control connection with three-digit status codes in ASCII with an
optional text message. For example, "200" (or "200 OK") means that the last command was
successful. The numbers represent the code for the response and the optional text represents a
human-readable explanation or request (e.g. <Need account for storing file>).An ongoing transfer
of file data over the data connection can be aborted using an interrupt message sent over the
control connection.
FTP needs two ports (one for sending and one for receiving) because it was originally designed to
operate on top of Network Control Protocol (NCP), which was a simplex protocol that utilized
two port addresses, establishing two connections, for two-way communications. An odd and an
even port were reserved for each application layer application or protocol. The standardization of
TCP and UDP reduced the need for the use of two simplex ports for each application down to one
duplex port, but the FTP protocol was never altered to only use one port, and continued using two
for backwards compatibility.
For many companies, your file transfer needs go beyond sending a single Microsoft Word
document at a time. You might need to send hundreds of gigabytes of data all at once. FTP
easily facilitates those large transfers, and you benefit from an increased rate of file transfers,
as well.
Using FTP allows you to transfer multiple directories at one time. If you regularly transfer
files, you know how advantageous this feature can be. Instead of sending single files or even
18
single directories at a time, you can send numerous directories all at once. You’re able to
continue working while transfers are completed, and you can conduct these transfers faster.
If your file transfer is interrupted, you don’t have to worry about losing progress. With FTP,
you can resume an interrupted file transfer if your connection is lost. Pick up where you left
off without restarting the transfer from the beginning.
Are you tired of interrupting your workday to transfer a large amount of data? Maybe you
don’t have time to sit and wait as these transfers take place. With top FTP solutions, you can
schedule transfers for times with minimal impact to your workflow, like overnight or on the
weekend. Your productivity isn’t impacted, and these transfers are automated for your
convenience.
Top FTP providers make sure that data is never lost, even when unexpected events happen.
With disaster recovery, your files are regularly and automatically backed up, so if there’s a
flood, fire, or power outage, you don’t have to worry about losing data.
FTP is inherently a non-secure way to transfer data. When a file is sent using this protocol, the
data, username, and password are all shared in plain text, which means a hacker can access this
information with little to no effort. For data to be secure, you need to use an upgraded version
of FTP like FTPS or SFTP.
While you can find a vendor that offers data encryption, there are many who fall short. FTP
alone doesn’t provide any encryption, which is why transferred data is so easy to intercept.
And, when you’re looking for a FTP provider, you’ll notice that encryption isn’t always
19
offered or enforced. For businesses using sensitive data like card payment data or ePHI
(electronic protected health information), encryption isn’t just nice to have for your FTP
solution – it’s essential.
4. Compliance is an Issue
You should also be concerned with compliance when using FTP to send files. FTP on its own
or using a FTP vendor with inadequate security could leave your business at risk of
noncompliance fines. If compliance regulations like HIPAA, ITAR, PCI-DSS, SOX, or
GLBA apply to your company, you might struggle to find an FTP solution that helps you stay
compliant. A lack of encryption plays a big role in noncompliance and its imperative you find
a solution that meets your compliance needs.
Before you partner with an FTP vendor, you need to think about reporting requirements for
your company. With many FTP solutions, you’ll face an inability to track or inconsistency in
tracking what has been uploaded on the remote system. So, if files are mishandled or a data
breach occurs, you may struggle to track the source of the problem. Numerous FTP options
lack the access controls needed to ensure your employees align with file sharing best practices.
SMTP is a protocol for sending and receiving email. It enables the transfer of email messages from
a client to a server or between servers. SMTP is essential for email communication, ensuring that
messages are delivered reliably and in the correct format.
SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving email.
SMTP is used most commonly by email clients, including Gmail, Outlook, Apple Mail and Yahoo
Mail.
20
SMTP can send and receive email, but email clients typically use a program with SMTP for
sending email. Because SMTP is limited in its ability to queue messages at the receiving end, it's
usually used with either Post Office Protocol 3 (POP3) or Internet Message Access Protocol
(IMAP), which lets the user save messages in a server mailbox and download them periodically
from a server. SMTP is typically limited to and relied on to send messages from a sender to a
recipient.
Working of SMTP
An SMTP session begins when the client opens a Transmission Control Protocol connection (TCP
connection, sometimes called TCP/IP) to the SMTP server. The server responds with an opening
message, expressed with code 250. This process is often called an SMTP handshake.
The client then sends a HELO command (EHLO for ESMTP) and identifies itself. It often follows
up the command with the domain name or IP address. In non-technical words, the client says,
“Hello, my name is John the Client, I’m sending an email from gmail.com, and my IP is
192.0.2.0”. The server will respond with code 250 again.
After that, the email transfer stage will begin. Email contents will be transferred step-by-step with
MAIL FROM ([email protected]), RCPT TO ([email protected]), and DATA (‘Hey, how have
you been?’) commands. If the server accepts the transaction, the client will transfer email headers.
It’s necessary to use an end-of-line indicator (period ‘.’) once everything has been transmitted.
Types of SMTP
Originating SMTP:
Is the first system that interacts with the internet as it introduces mail.
21
Delivery SMTP:
Is the system that receives emails from the internet and delivers them to the recipients.
Relay SMTP:
Relays emails between SMTP servers or MTAs (more on transfer agent meaning below) without
modifying the message in any way.
Gateway SMTP:
Or SMTP gateway also transfers emails between different servers but, unlike SMTP relay,
it’s allowed to transform the message if needed. SMTP gateways are usually firewalls that
rewrite addresses or intermediary SMTP servers.
The server will respond with code 250 if the transaction is successful. The client will initiate the
termination of the SMTP connection with the QUIT command, and the server will close the
transmission channel with code 221.
This is, of course, a simplified example without an SMTP relay, forwarding, gateways, or error
codes. For more information on these, please refer to RFC 5321.
Advantages of SMTP
22
It is not necessary to have an online connection:
Because the whole process is carried out from the email interface available on the
computer. However, at the moment of sending said emails, it is essential to have
Internet access. In general, what it avoids is to work with the messaging editor of the
email marketing software.
Statistics are essential to assess how good a job is being done when carrying out
email marketing campaigns, and with SMTP email there are none. However, when
linked to the Mailrelay software, you will be able to obtain interesting data to
advance in this important marketing task. You will be able to observe values such as
click-through rate and open rate.
This is a great advantage for very large companies that need to have an email system
connected to the CRM. Managing the configuration of the email system on each
computer can be very tedious, but with the link to the Mailrelay SMTP system it can
be done on all computers at once and be active at all the access points you want.
Disadvantages of SMTP
Professional editing:
Specialized email marketing software, such as Mailrelay, has a very powerful email
editor that can be used by dragging and dropping to obtain a professional design. If
you do not work from your online account, you will not be able to enjoy this benefit.
It is not secure:
Although it works with a multistep protocol to activate, the SMTP is easy to hack
and make fraudulent mailings that do not correspond to the values and objectives
pursued by our business. The worst thing is that they will have access to the complete
list of our business subscribers because the system was previously enabled.
Limitations:
The number of emails that can be sent by hosting are generally more limited than the
large number offered by a good email marketing software, as is the case of Mailrelay.
Only in its free account, it supports up to 80 thousand emails available to send per
month, which is more than enough for any business.
23
5.0 Actual Resources used
1. Teamwork
2. Communication skills
3. Creativity.
24
ANNEXURE II
Evaluation Sheet for the Micro Project
Academic Year : 2023-
24
25
(Name & Signature of Faculty)
26