INTERNET EXAM1
INTERNET EXAM1
download, and access files over a network. There are different types of FTP servers based on their
functionality and deployment. Here are some common types:
Public FTP Server: Public FTP servers are open to the public and allow anonymous access, meaning users
can connect and access files without providing login credentials. These servers are often used to distribute
software, documents, and other publicly available files.
Private FTP Server: Private FTP servers require user authentication before granting access. Users need to
provide valid login credentials (username and password) to connect and access files. Private FTP servers are
commonly used for internal file sharing within an organization or for restricted access to specific users.
Secure FTP Server (SFTP): SFTP is not an FTP server type per se, but rather a secure extension of FTP. It uses
encryption and secure shell (SSH) to protect data during transmission. SFTP provides a more secure
alternative to traditional FTP, which transmits data in plain text.
FTP over SSL/TLS (FTPS) Server: FTPS is another secure extension of FTP that adds SSL/TLS encryption for
data protection. FTPS servers require SSL/TLS certificates for authentication and encryption.
An FTP client is a software application or program that allows users to connect to an FTP server and
transfer files between their local computer and the remote server. It provides a user-friendly interface for
managing file transfers, allowing users to upload files from their computer to the server and download files
from the server to their computer.
Here are four commonly used commands in FTP (File Transfer Protocol):
GET: Used to download files from the FTP server to the local machine.
PUT: Used to upload files from the local machine to the FTP server.
3. LIST: Used to view a list of files and directories on the FTP server.
4. QUIT: Used to terminate the FTP session and disconnect from the server.
There are several email protocols used for communication and transferring email messages between email
clients and servers. Each protocol serves a specific purpose and offers different features. Here are some of
the most common email protocols:
SMTP (Simple Mail Transfer Protocol): SMTP is the fundamental protocol for sending and relaying outgoing
email messages. It handles the transfer of email messages from the sender's email client to the recipient's
email server or an intermediate mail server. SMTP is responsible for delivering the email to the recipient's
mailbox.
POP3 (Post Office Protocol version 3): POP3 is an email retrieval protocol used by email clients to
download email messages from the server to the user's device. It allows users to retrieve and read their
emails but typically does not synchronize changes back to the server.
IMAP (Internet Message Access Protocol): IMAP is another email retrieval protocol that allows users to
access and manage their email messages from multiple devices while keeping them synchronized with the
server. With IMAP, emails are stored on the server, and the email client interacts with the server to access
messages, folders, and changes made on any device.
POP3S (POP3 Secure): POP3S is a secure version of POP3 that provides encrypted communication between
the email client and the mail server during email retrieval. It encrypts the username, password, and email
messages to enhance security.
The Network Virtual Terminal is a device used by Telnet to enable a local computer to communicate with a remote
machine.To make Telnet interoperate between as many systems as possible, it must accommodate the details of
heterogeneous computers aand operating systems. To accommodate heterogeneity, Telnet defines how data and
command sequences are sent across the Internet. The definition is known as the Network Virtual Terminal (NVT). The
NVT defines how data and commands are sent across the internet. The NVT is a bi-directional character device that
has a printer and a keyboard. The printer responds to incoming data and the keyboard produces outgoing data which
is sent over the Telnet connection. The NVT is viewed as a half-duplex device.
The Network Virtual Terminal implements a client-server architecture. A Telnet client transfers characters between
the user’s terminal and a remote service. On one side, it uses the local operating system functions when it interacts
with the user’s terminal. On the other side, it uses a TCP connection when it communicates with the remote service.
Telnet is a network protocol used to virtually access a computer and to provide a two-way, collaborative and text-
based communication channel between two machines. It follows a user command Transmission Control
Protocol/Internet Protocol (TCP/IP) networking protocol for creating remote sessions.
What is the Telnet client?
The Telnet client enables a TCP/IP user to sign on and use applications on a remote system by using a Telnet server
application. Telnet allows you to log on to the remote computer and use it as if you were connected directly to it.
Active and Passive OPENs
TCP/IP is based on the client/server model of operation, and TCP connection setup is based on the existence of these
roles as well. The client and server each prepare for the connection by performing an OPEN operation. However,
there are two different kinds of OPEN:
o Active OPEN: A client process using TCP takes the “active role” and initiates the connection by actually
sending a TCP message to start the connection (a SYN message).
o Passive OPEN: A server process designed to use TCP, however, takes a more “laid-back” approach. It
performs a passive OPEN by contacting TCP and saying “I am here, and I am waiting for clients that may wish
to talk to me to send me a message on the following port number”. The OPEN is called passive because aside
from indicating that the process is listening, the server process does nothing
IRC is the way of communicating in real time with people from all over the world. IRC has separate networks like IRC
servers, machines which allow users to connect to IRC.
Working of IRC
Generally, the user runs a program to connect to a server on one of the IPC nets.
The server relays information to and forms other servers on the same net.
Once connected to an IRC server on an IRC network, you will usually join one or more channels and converse with
others there.
The advantages of IRC are as follows −
IRC is decentralized − There is no signal company controlling IRC (in contrast to gchat or Facebook chat or AIM chat
etc.) Therefore, anyone can set up their own server and use it however they like.
IRC’s channel paradigm is very flexible and robust because it allows for real-time discussion with up to hundreds of
people at once.
Privacy − IRC has the concept of access levels and complex channels modes.
For example − users can be banned from channels based on their IP address.
Meeting new peoples: Persons are able to meet and communicate with new people all over the world IRC.
The disadvantages of IRC are as follows −
Informality: Hyperbole, Jokes not only may be misunderstood by some person in the chat.
Chat bytes − The chat client line length and buffer limits mean that all discussion is necessarily limited to chat-sized
bites of words.
Cyber bullying − Person within the chat may be picked on by others in the chat which may lead to depression.
Spam creates a lot of complaints against your domains and IP addresses, which can result in your mail being
blocked at major ISPs.
Spam can lead to a drop in subscriber engagement with your legitimate email.
Both subscribers and mailbox providers could block your email.
Malicious actors will likely send spam to random email addresses that are not your vetted subscribers, which usually
include a high number of spam traps.
If unauthorized content is being sent from your infrastructure and you are hitting spam traps, then you will likely be
listed on publicly available blocklists.
Spam creates a lot of complaints against your domains and IP addresses, which can result in your mail being
blocked at major ISPs.
Spam can lead to a drop in subscriber engagement with your legitimate email.
Both subscribers and mailbox providers could block your email.
Malicious actors will likely send spam to random email addresses that are not your vetted subscribers, which usually
include a high number of spam traps.
If unauthorized content is being sent from your infrastructure and you are hitting spam traps, then you will likely be
listed on publicly available blocklists.