SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
PUSH MAIL




        By,
Hardeep Singh Bhurji
CONTENTS


WHAT IS PUSH EMAIL

PROTOCAL USED IN PUSH MAIL TECHNOLOGY

SOME POPULAR PUSH MAIL SETUPS

DIFFERENT PUSH MAIL PROVIDERS
WHAT IS A PUSH MAIL ?


Push email is a method of pushing content (email in this case) over the
internet to your targeted audience.
Technically Push Mail can be defined as a e-mail systems that provide an always-
on capability, in which new e-mail is actively transferred (pushed) as it arrives by
the mail delivery agent (MDA) (commonly called mail server) to the mail user
agent (MUA), also called the e-mail client. E-mail clients include smartphones
and, less strictly, IMAP personal computer mail applications.
Push email utilizes a mail delivery system with real-time capability to “push”
email through to the client as soon as it arrives, rather than requiring the client to
poll and collect or pull mail manually. With a push email smartphone, for example,
the client’s mailbox is constantly updated with arriving email without user
intervention. Smartphones announce new mail arrival with an alert.
WHAT IS A PUSH MAIL ?



Push email can be especially crucial to field reporters, stock market
businessmen, military personal and other professionals for whom time is
of the essence. A one-minute delay can make all the difference in breaking a
story, losing money, or making a crucial sale.
START OF PUSH MAIL


Although push e-mail had existed in wired-based systems for many years,
one of the first uses of the system with a portable, "always on" wireless
device outside of Asia was the BlackBerry service from Research In
Motion. In Japan, "push e-mail" has been standard in cell phones since
2000.

BlackBerry was the first personal digital assistant (PDA) to offer push
email and gained near-instant success as a result. Today, many devices
have incorporated push email, and its popularity continues to grow. Some
of the products that have incorporated push email include Chatteremail
for Treo, Nokia Intellisync Wireless Email, Roadsync, and Sony
Ericsson phones.
PROTOCAL USED IN PUSH MAIL
          TECHNOLOGY


The different protocols used in Push Mail technology are as follows :

   RIM’s standards for BlackBerry.
   Push-IMAP
   SyncML
   IETF Lemonade (Its an extension to IMAP and SMTP)
   Microsoft Exchange 2003 standards.
SOME POPULAR PUSH MAIL SETUPS




    Microsoft’s Direct Push

    The IMAP IDLE Push

    RIM BlackBerry Push
Microsoft’s Direct Push

 The smartphone sends an HTTP request to the Exchange server, asking
    to be notified when something changes on the server.
 This request lasts for the shorter of (a) a timeout period and (b) a
  change on the server.
 If there is a change, the Exchange server responds to the smartphone
  with details of the folders in which the changes have occurred.
 Upon receiving this response, the smartphone sends a synchronization
  request in respect of each of the folders notified by the server, and the
  server delivers the details of the changes – depending on signal strength
  / connection speed.
Microsoft’s Direct Push
Microsoft’s Direct Push


 If there is no change within the timeout period, the Exchange server
  sends an empty response to the smartphone.
 In either case, when the smartphone receives the Exchange response, it
  reissues the HTTP request – essentially, this is a looping process, and
    the issue / receive loop is often referred to as the “heartbeat”.
 Each heartbeat is 309 bytes, and, by default, a heartbeat is issued every
    15 minutes.
The IMAP IDLE Push

 IMAP system works by notifying the smartphone of any changes in the
    folders on the server when the user is actively monitoring the server.
 This only works when the mail client on the smartphone is active, and
  thus notifications stop when a user stops using the mail application or
    puts the smartphone away.
 IMAP IDLE issues a “NOOP” (“No Operation”) command to the
    IMAP server at a regular interval, usually every 15 minutes.
 By sending this command, the connection is kept active, and thus the
    user is notified of any changes.
The IMAP IDLE Push
RIM BlackBerry Push

 To receive data RIM uses a Network Operating Centre (NOC).
 Here the email is forwarded to your BlackBerry by the RIM-operated
    NOC only when there is email.
 Only the first chunk of email is sent. The data is sent via normal UDP
    packets that are encrypted at the data level.
 To find out if there is a mail or not the NOC constantly polls the inbox.
 Once there is a mail the NOC encrypts the data and sends it to the
  device immediately where ever it is located.
 In the absence of email, nothing at all happens, and your BlackBerry
    behaves much like a normal mobile phone.
RIM BlackBerry Push
DIFFERENT PUSH MAIL
     PROVIDERS

   Apple iPhone and iPod Touch
   Google Android
   Microsoft Windows Mobile and Windows Phone
   Nokia Symbian Series 60
   Nokia Messaging
   Research In Motion BlackBerry
   SEVEN Networks
   Sony Ericsson
THANKS

Weitere ähnliche Inhalte

Andere mochten auch

Comparison between grub-legacy ,lilo and grub -2
Comparison between grub-legacy ,lilo and grub -2Comparison between grub-legacy ,lilo and grub -2
Comparison between grub-legacy ,lilo and grub -2iamumr
 
An Insight into the Linux Booting Process
An Insight into the Linux Booting ProcessAn Insight into the Linux Booting Process
An Insight into the Linux Booting ProcessHardeep Bhurji
 
Linux booting procedure
Linux booting procedureLinux booting procedure
Linux booting procedureDhaval Kaneria
 
Linux booting procedure
Linux booting procedureLinux booting procedure
Linux booting procedureDhaval Kaneria
 

Andere mochten auch (6)

Comparison between grub-legacy ,lilo and grub -2
Comparison between grub-legacy ,lilo and grub -2Comparison between grub-legacy ,lilo and grub -2
Comparison between grub-legacy ,lilo and grub -2
 
Grub의 이해
Grub의 이해Grub의 이해
Grub의 이해
 
An Insight into the Linux Booting Process
An Insight into the Linux Booting ProcessAn Insight into the Linux Booting Process
An Insight into the Linux Booting Process
 
Linux booting procedure
Linux booting procedureLinux booting procedure
Linux booting procedure
 
Linux booting procedure
Linux booting procedureLinux booting procedure
Linux booting procedure
 
Linux Booting Steps
Linux Booting StepsLinux Booting Steps
Linux Booting Steps
 

Ähnlich wie Push Email Technology: Protocols and Popular Setups

How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...
How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...
How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...Amit Maisheri - Senior Analyst at eClerx
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptxYouTubeCONTRA
 
Mail server using Linux(Ubuntu)
Mail server using Linux(Ubuntu)Mail server using Linux(Ubuntu)
Mail server using Linux(Ubuntu)Navjot Navi
 
Voice enable smtp client
Voice enable smtp clientVoice enable smtp client
Voice enable smtp clientNilesh Padwal
 
SMS Blast Corporate Presentation
SMS  Blast  Corporate PresentationSMS  Blast  Corporate Presentation
SMS Blast Corporate PresentationACCENT Trading
 
Zend Framework Push Notifications
Zend Framework Push NotificationsZend Framework Push Notifications
Zend Framework Push NotificationsMike Willbanks
 
Developing email client re mail for iphone, ipad and ipod on ios
Developing email client re mail for iphone, ipad and ipod on iosDeveloping email client re mail for iphone, ipad and ipod on ios
Developing email client re mail for iphone, ipad and ipod on iosRahul Sharma
 
Leveraging Zend Framework for Sending Push Notifications
Leveraging Zend Framework for Sending Push NotificationsLeveraging Zend Framework for Sending Push Notifications
Leveraging Zend Framework for Sending Push NotificationsMike Willbanks
 
window server 2008 mail configuration
window server 2008 mail configurationwindow server 2008 mail configuration
window server 2008 mail configurationanwarkade1
 
Email Security, The Essence of Secure E-mail
Email Security, The Essence of Secure E-mailEmail Security, The Essence of Secure E-mail
Email Security, The Essence of Secure E-mailRalph van der Pauw
 
Ramón Silva - A Day Without E-Mail
Ramón Silva - A Day Without E-MailRamón Silva - A Day Without E-Mail
Ramón Silva - A Day Without E-MailRamon Silva
 
SMS Boot Camp (c) MIT - Univ of Nairobi, Kenya
SMS Boot Camp (c) MIT - Univ of Nairobi, KenyaSMS Boot Camp (c) MIT - Univ of Nairobi, Kenya
SMS Boot Camp (c) MIT - Univ of Nairobi, Kenyamirasn
 

Ähnlich wie Push Email Technology: Protocols and Popular Setups (20)

Point of preference (POP)
Point of preference (POP)Point of preference (POP)
Point of preference (POP)
 
How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...
How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...
How e-mail, chat, ATM, Skype, VOIP, online submission (online forms), online ...
 
Push mail
Push mailPush mail
Push mail
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
 
Mail server using Linux(Ubuntu)
Mail server using Linux(Ubuntu)Mail server using Linux(Ubuntu)
Mail server using Linux(Ubuntu)
 
Smtp, pop3, imapv 4
Smtp, pop3, imapv 4Smtp, pop3, imapv 4
Smtp, pop3, imapv 4
 
Voice enable smtp client
Voice enable smtp clientVoice enable smtp client
Voice enable smtp client
 
E mail systems
E mail systemsE mail systems
E mail systems
 
SMS Blast Corporate Presentation
SMS  Blast  Corporate PresentationSMS  Blast  Corporate Presentation
SMS Blast Corporate Presentation
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Zend Framework Push Notifications
Zend Framework Push NotificationsZend Framework Push Notifications
Zend Framework Push Notifications
 
Developing email client re mail for iphone, ipad and ipod on ios
Developing email client re mail for iphone, ipad and ipod on iosDeveloping email client re mail for iphone, ipad and ipod on ios
Developing email client re mail for iphone, ipad and ipod on ios
 
Leveraging Zend Framework for Sending Push Notifications
Leveraging Zend Framework for Sending Push NotificationsLeveraging Zend Framework for Sending Push Notifications
Leveraging Zend Framework for Sending Push Notifications
 
window server 2008 mail configuration
window server 2008 mail configurationwindow server 2008 mail configuration
window server 2008 mail configuration
 
Spam Filter
Spam FilterSpam Filter
Spam Filter
 
Email Security, The Essence of Secure E-mail
Email Security, The Essence of Secure E-mailEmail Security, The Essence of Secure E-mail
Email Security, The Essence of Secure E-mail
 
Ramón Silva - A Day Without E-Mail
Ramón Silva - A Day Without E-MailRamón Silva - A Day Without E-Mail
Ramón Silva - A Day Without E-Mail
 
SMS Boot Camp (c) MIT - Univ of Nairobi, Kenya
SMS Boot Camp (c) MIT - Univ of Nairobi, KenyaSMS Boot Camp (c) MIT - Univ of Nairobi, Kenya
SMS Boot Camp (c) MIT - Univ of Nairobi, Kenya
 
Mail server
Mail serverMail server
Mail server
 
Mail server
Mail serverMail server
Mail server
 

Kürzlich hochgeladen

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 

Kürzlich hochgeladen (20)

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 

Push Email Technology: Protocols and Popular Setups

  • 1. PUSH MAIL By, Hardeep Singh Bhurji
  • 2. CONTENTS WHAT IS PUSH EMAIL PROTOCAL USED IN PUSH MAIL TECHNOLOGY SOME POPULAR PUSH MAIL SETUPS DIFFERENT PUSH MAIL PROVIDERS
  • 3. WHAT IS A PUSH MAIL ? Push email is a method of pushing content (email in this case) over the internet to your targeted audience. Technically Push Mail can be defined as a e-mail systems that provide an always- on capability, in which new e-mail is actively transferred (pushed) as it arrives by the mail delivery agent (MDA) (commonly called mail server) to the mail user agent (MUA), also called the e-mail client. E-mail clients include smartphones and, less strictly, IMAP personal computer mail applications. Push email utilizes a mail delivery system with real-time capability to “push” email through to the client as soon as it arrives, rather than requiring the client to poll and collect or pull mail manually. With a push email smartphone, for example, the client’s mailbox is constantly updated with arriving email without user intervention. Smartphones announce new mail arrival with an alert.
  • 4. WHAT IS A PUSH MAIL ? Push email can be especially crucial to field reporters, stock market businessmen, military personal and other professionals for whom time is of the essence. A one-minute delay can make all the difference in breaking a story, losing money, or making a crucial sale.
  • 5. START OF PUSH MAIL Although push e-mail had existed in wired-based systems for many years, one of the first uses of the system with a portable, "always on" wireless device outside of Asia was the BlackBerry service from Research In Motion. In Japan, "push e-mail" has been standard in cell phones since 2000. BlackBerry was the first personal digital assistant (PDA) to offer push email and gained near-instant success as a result. Today, many devices have incorporated push email, and its popularity continues to grow. Some of the products that have incorporated push email include Chatteremail for Treo, Nokia Intellisync Wireless Email, Roadsync, and Sony Ericsson phones.
  • 6. PROTOCAL USED IN PUSH MAIL TECHNOLOGY The different protocols used in Push Mail technology are as follows :  RIM’s standards for BlackBerry.  Push-IMAP  SyncML  IETF Lemonade (Its an extension to IMAP and SMTP)  Microsoft Exchange 2003 standards.
  • 7. SOME POPULAR PUSH MAIL SETUPS  Microsoft’s Direct Push  The IMAP IDLE Push  RIM BlackBerry Push
  • 8. Microsoft’s Direct Push  The smartphone sends an HTTP request to the Exchange server, asking to be notified when something changes on the server.  This request lasts for the shorter of (a) a timeout period and (b) a change on the server.  If there is a change, the Exchange server responds to the smartphone with details of the folders in which the changes have occurred.  Upon receiving this response, the smartphone sends a synchronization request in respect of each of the folders notified by the server, and the server delivers the details of the changes – depending on signal strength / connection speed.
  • 10. Microsoft’s Direct Push  If there is no change within the timeout period, the Exchange server sends an empty response to the smartphone.  In either case, when the smartphone receives the Exchange response, it reissues the HTTP request – essentially, this is a looping process, and the issue / receive loop is often referred to as the “heartbeat”.  Each heartbeat is 309 bytes, and, by default, a heartbeat is issued every 15 minutes.
  • 11. The IMAP IDLE Push  IMAP system works by notifying the smartphone of any changes in the folders on the server when the user is actively monitoring the server.  This only works when the mail client on the smartphone is active, and thus notifications stop when a user stops using the mail application or puts the smartphone away.  IMAP IDLE issues a “NOOP” (“No Operation”) command to the IMAP server at a regular interval, usually every 15 minutes.  By sending this command, the connection is kept active, and thus the user is notified of any changes.
  • 13. RIM BlackBerry Push  To receive data RIM uses a Network Operating Centre (NOC).  Here the email is forwarded to your BlackBerry by the RIM-operated NOC only when there is email.  Only the first chunk of email is sent. The data is sent via normal UDP packets that are encrypted at the data level.  To find out if there is a mail or not the NOC constantly polls the inbox.  Once there is a mail the NOC encrypts the data and sends it to the device immediately where ever it is located.  In the absence of email, nothing at all happens, and your BlackBerry behaves much like a normal mobile phone.
  • 15. DIFFERENT PUSH MAIL PROVIDERS  Apple iPhone and iPod Touch  Google Android  Microsoft Windows Mobile and Windows Phone  Nokia Symbian Series 60  Nokia Messaging  Research In Motion BlackBerry  SEVEN Networks  Sony Ericsson