CH 26
CH 26
Remote Logging,
Electronic Mail,
and File Transfer
26.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
26--1 REMOTE LOGGING
26
26.2
Note
TELNET is a general-purpose
client/server
li t/ application
li ti program.
26.3
Figure 26.1 Local and remote log-in
26.4
Figure 26.2 Concept of NVT
26.5
Table 26.1 Some NVT control characters
26.6
Figure 26.3 An example of embedding
26.7
Table 26.2 Options
26.8
T bl 26.3
Table 26 3 NVT character
h set ffor option
i negotiation
i i
26.9
Example 26.1
26.10
Figure 26.4 Example 26.1: Echo option
26.11
Table 26.4 Character set for suboptions
26.12
Example 26.2
26.13
Figure 26.5 Example of suboption negotiation
26.14
26--2 ELECTRONIC MAIL
26
26.16
Note
26.17
Figure 26.7 Second scenario in electronic mail
26.18
Note
When th
Wh the sender
d and d the
th receiver
i off an
e-mail are on different systems, we
need two UAs and a pair of
MTAs s (client
(c e t aandd se
server).
e)
26.19
Figure 26.8 Third scenario in electronic mail
26.20
Note
26.21
Figure 26.9 Fourth scenario in electronic mail
26.22
Figure 26.10 Push versus pull in electronic email
26.23
Note
26.24
Figure 26.11 Services of user agent
26.25
Note
26.26
Note
26.27
Figure 26.12 Format of an e-mail
26.28
Figure 26.13 E-mail address
26.29
Figure 26.14 MIME
26.30
Figure 26.15 MIME header
26.31
Table 26.5 Data types and subtypes in MIME
26.32
Table 26.6 Content-transfer-encoding
26.33
Figure 26.16 SMTP range
26.34
Figure 26.17 Commands and responses
26.35
Figure 26.18 Command format
26.36
Table 26.7 Commands
26.37
Table 26.8 Responses
26.38
Table 26.8 Responses (continued)
26.39
Example 26.3
$ telnet mail.adelphia.net 25
Trying 68.168.78.100 . . .
Connected to mail.adelphia.net (68.168.78.100).
26.41
Example 26.3 (continued)
26.42
Example 26.3 (continued)
26.43
Figure 26.19 POP3 and IMAP4
26.44
Figure 26.20 The exchange of commands and responses in POP3
26.45
26--3 FILE TRANSFER
26
Transferring
T f i files
fil from
f one computer
t to
t another
th is
i one
of the most common tasks expected from a networking
or internetworking
i t t ki environment
environment.
i t. As
A a matter
tt off fact,
f t
the greatest volume of data exchange in the Internet
today
t d is i due
d tot file
fil transfer
ttransfer.
f .
26.46
Note
26.47
Figure 26.21 FTP
26.48
Figure 26.22 Using the control connection
26.49
Figure 26.23 Using the data connection
26.50
Example 26.4
26.51
Example 26.4 (continued)
26.52
Example 26.4 (continued)
26.53
Example 26.5
continued
i d on next slide
lid
26.54
Example 26.5 (continued)
26.55