![Page 1: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/1.jpg)
COMPUTER COMMUNICATION NETWORKS
(15EC64)
![Page 2: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/2.jpg)
26.2
Chapter 26
Remote Logging,
Electronic Mail,
and File Transfer
![Page 3: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/3.jpg)
26.3
26-1 REMOTE LOGGING
It would be impossible to write a specific client/server
program for each demand. The better solution is a
general-purpose client/server program that lets a user
access any application program on a remote computer.
TELNET
Topics discussed in this section:
![Page 4: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/4.jpg)
26.4
TELNET is a general-purpose
client/server application program.
Note
![Page 5: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/5.jpg)
26.5
Figure 26.1 Local and remote log-in
![Page 6: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/6.jpg)
26.6
Figure 26.2 Concept of NVT
![Page 7: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/7.jpg)
26.7
Table 26.1 Some NVT control characters
![Page 8: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/8.jpg)
26.8
Figure 26.3 An example of embedding
![Page 9: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/9.jpg)
26.9
Table 26.2 Options
![Page 10: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/10.jpg)
26.10
Table 26.3 NVT character set for option negotiation
![Page 11: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/11.jpg)
26.11
Figure 26.4 shows an example of option negotiation. In
this example, the client wants the server to echo each
character sent to the server. The echo option is enabled by
the server because it is the server that sends the
characters back to the user terminal. Therefore, the client
should request from the server the enabling of the option
using DO. The request consists of three characters: IAC,
DO, and ECHO. The server accepts the request and
enables the option. It informs the client by sending the
three-character approval: IAC, WILL, and ECHO.
Example 26.1
![Page 12: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/12.jpg)
26.12
Figure 26.4 Example 26.1: Echo option
![Page 13: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/13.jpg)
26.13
Table 26.4 Character set for suboptions
![Page 14: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/14.jpg)
26.14
Figure 26.5 shows an example of suboption negotiation.
In this example, the client wants to negotiate the type
of the terminal.
Example 26.2
![Page 15: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/15.jpg)
26.15
Figure 26.5 Example of suboption negotiation
![Page 16: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/16.jpg)
26.16
26-2 ELECTRONIC MAIL
One of the most popular Internet services is electronic
mail (e-mail). The designers of the Internet probably
never imagined the popularity of this application
program. Its architecture consists of several
components that we discuss in this chapter.
Architecture
User Agent
Message Transfer Agent: SMTP
Message Access Agent: POP and IMAP
Web-Based Mail
Topics discussed in this section:
![Page 17: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/17.jpg)
26.17
Figure 26.6 First scenario in electronic mail
![Page 18: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/18.jpg)
26.18
When the sender and the receiver of an
e-mail are on the same system,
we need only two user agents.
Note
![Page 19: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/19.jpg)
26.19
Figure 26.7 Second scenario in electronic mail
![Page 20: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/20.jpg)
26.20
When the sender and the receiver of an
e-mail are on different systems, we
need two UAs and a pair of
MTAs (client and server).
Note
![Page 21: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/21.jpg)
26.21
Figure 26.8 Third scenario in electronic mail
![Page 22: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/22.jpg)
26.22
When the sender is connected to the
mail server via a LAN or a WAN,
we need two UAs and two pairs
of MTAs (client and server).
Note
![Page 23: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/23.jpg)
26.23
Figure 26.9 Fourth scenario in electronic mail
![Page 24: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/24.jpg)
26.24
Figure 26.10 Push versus pull in electronic email
![Page 25: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/25.jpg)
26.25
When both sender and receiver are
connected to the mail server via
a LAN or a WAN, we need two
UAs, two pairs of MTAs
and a pair of MAAs.
This is the most common situation
today.
Note
![Page 26: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/26.jpg)
26.26
Figure 26.11 Services of user agent
![Page 27: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/27.jpg)
26.27
Some examples of command-driven
user agents are mail, pine,
and elm.
Note
![Page 28: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/28.jpg)
26.28
Some examples of GUI-based user
agents are Eudora, Outlook, and
Netscape.
Note
![Page 29: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/29.jpg)
26.29
Figure 26.12 Format of an e-mail
![Page 30: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/30.jpg)
26.30
Figure 26.13 E-mail address
![Page 31: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/31.jpg)
26.31
Figure 26.14 MIME
![Page 32: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/32.jpg)
26.32
Figure 26.15 MIME header
![Page 33: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/33.jpg)
26.33
Table 26.5 Data types and subtypes in MIME
![Page 34: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/34.jpg)
26.34
Table 26.6 Content-transfer-encoding
![Page 35: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/35.jpg)
26.35
Figure 26.16 SMTP range
![Page 36: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/36.jpg)
26.36
Figure 26.17 Commands and responses
![Page 37: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/37.jpg)
26.37
Figure 26.18 Command format
![Page 38: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/38.jpg)
26.38
Table 26.7 Commands
![Page 39: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/39.jpg)
26.39
Table 26.8 Responses
![Page 40: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/40.jpg)
26.40
Table 26.8 Responses (continued)
![Page 41: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/41.jpg)
26.41
Let us see how we can directly use SMTP to send an
e-mail and simulate the commands and responses we
described in this section. We use TELNET to log into port
25 (the well-known port for SMTP). We then use the
commands directly to send an e-mail. In this example,
[email protected] is sending an e-mail to himself.
The first few lines show TELNET trying to connect to the
Adelphia mail server. After connection, we can type the
SMTP commands and then receive the responses, as
shown on the next slide. Note that we have added, for
clarification, some comment lines, designated by the “=”
signs. These lines are not part of the e-mail procedure.
Example 26.3
![Page 42: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/42.jpg)
26.42
Example 26.3 (continued)
$ telnet mail.adelphia.net 25
Trying 68.168.78.100 . . .
Connected to mail.adelphia.net (68.168.78.100).
![Page 43: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/43.jpg)
26.43
Example 26.3 (continued)
![Page 44: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/44.jpg)
26.44
Example 26.3 (continued)
![Page 45: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/45.jpg)
26.45
Figure 26.19 POP3 and IMAP4
![Page 46: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/46.jpg)
26.46
Figure 26.20 The exchange of commands and responses in POP3
![Page 47: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/47.jpg)
26.47
26-3 FILE TRANSFER
Transferring files from one computer to another is one
of the most common tasks expected from a networking
or internetworking environment. As a matter of fact,
the greatest volume of data exchange in the Internet
today is due to file transfer.
File Transfer Protocol (FTP)
Anonymous FTP
Topics discussed in this section:
![Page 48: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/48.jpg)
26.48
FTP uses the services of TCP. It needs
two TCP connections.
The well-known port 21 is used for the
control connection and the well-known
port 20 for the data connection.
Note
![Page 49: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/49.jpg)
26.49
Figure 26.21 FTP
![Page 50: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/50.jpg)
26.50
Figure 26.22 Using the control connection
![Page 51: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/51.jpg)
26.51
Figure 26.23 Using the data connection
![Page 52: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/52.jpg)
26.52
The following shows an actual FTP session for retrieving
a list of items in a directory. The colored lines show the
responses from the server control connection; the black
lines show the commands sent by the client. The lines in
white with a black background show data transfer.
1. After the control connection is created, the FTP server
sends the 220 response.
2. The client sends its name.
3. The server responds with 331.
Example 26.4
![Page 53: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/53.jpg)
26.53
4. The client sends the password (not shown).
5. The server responds with 230 (user log-in is OK).
6. The client sends the list command (ls reports) to find
the list of files on the directory named report.
7. Now the server responds with 150 and opens the data
connection.
8. The server then sends the list of the files or directories
on the data connection.
Example 26.4 (continued)
9. The client sends a QUIT command.
10. The server responds with 221.
![Page 54: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/54.jpg)
26.54
Example 26.4 (continued)
![Page 55: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/55.jpg)
26.55
We show an example of anonymous FTP. We assume that
some public data are available at internic.net.
Example 26.5
We show an example of anonymous FTP. We assume that
some public data are available at internic.net.
continued on next slide
![Page 56: COMPUTER COMMUNICATION NETWORKS · 26.2 Chapter 26 Remote Logging, Electronic Mail, and File Transfer . 26.3 26-1 REMOTE LOGGING It would be impossible to write a specific client/server](https://reader034.vdocuments.us/reader034/viewer/2022052423/5f0d00ca7e708231d43831ec/html5/thumbnails/56.jpg)
26.56
Example 26.5 (continued)