SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Web Platform
Presented By
Priyanka Shinde (M - 3248)
What is a protocol after all?
 Protocol is a standard used to define a method of
exchanging data over a computer network such as local
area network, Internet, Intranet
 Protocols define how messages are sent and received, i.e.
the format and order of them, what happens when
messages are transmitted and received.
 Each protocol has its own method of how data is
formatted when sent and what to do with it once received,
how that data is compressed or how to check for errors in
data.
 The protocol can be implemented either in hardware or in
software.
Internet Protocol (IP)
It is a protocol by which data is sent from one
computer to another on the Internet.
Each computer (known as a host) on the Internet
has at least one IP address that uniquely
identifies it from all other computers on the
Internet.
When you send or receive data (for example, an
e-mail note or a Web page), the message gets
divided into little chunks called packets.
 Packets can arrive in a different order than the order they were
sent in. The Internet Protocol just delivers them. It's up to
another protocol, the Transmission Control Protocol (TCP) to
put them back in the right order.
 Each of these packets contains both the sender's Internet
address and the receiver's address
 Protocol version 4 (IPv4) standard that features IP addresses
four bytes (32 bits) in length.
 The newer Internet Protocol version 6 (IPv6) standard features
addresses 16 bytes (128 bits) in length.
Hypertext Transfer Protocol
(HTTP)
 HTTP is a set of standards that allow
users of the World Wide Web to
exchange information found on web
pages.
 The term HTTP was coined by Ted
Nelson
 HTTP commonly utilizes port 80, 8008,
or 8080
 When wanting to access any web page
enter http:// in front of the web
address, which tells the browser to
communicate over HTTP
Hypertext Transfer Protocol over
Secure (HTTPS)
 It is a secure method of accessing or sending information across
a web page.
 All data sent over HTTPS is encrypted before it is sent, this
prevents anyone from understanding that information if
intercepted.
 Because data is encrypted over HTTPS, it is slower than HTTP,
which is why HTTPS is only used when requiring login
information or with pages that contain sensitive information
such as an online bank web page.
 HTTPS uses port 443 to transfer its information.
 HTTPS is first used in HTTP/1.1
File Transfer Protocol (FTP)
File Transfer Protocol (FTP)
• Standard Internet protocol for transmitting files between
computers on the Internet.
• First proposed on April 16, 1971 by Abhay Bhushan
• Used to transfer Web page files from their creator to the
computer that acts as their server for everyone on the
Internet.
• It's also commonly used to download programs and other
files to your computer from other servers.
Contd…
• Your Web browser can also make FTP requests to
download programs you select from a Web page.
• Using FTP, you can also update (delete, rename,
move, and copy) files at a server.
• You need to logon to an FTP server.
• FTP is most commonly used to download a file
from a server using the Internet or to upload a file
to a server (e.g., uploading a Web page file to a
server).
Email Protocols
Interactions between email servers and
clients are governed by email protocols.
The most common email protocols are
POP - Post Office Protocol
IMAP - Internet Mail Access Protocol
SMTP - Simple Mail Transport Protocol
Post Office Protocol (POP3)
Most recent version of a standard protocol for
receiving e-mail.
Provides a simple, standardized way for users
to access mailboxes and download messages
to their computers.
When using the POP protocol all eMail
messages will be downloaded from the mail
server to your local computer
Most POP clients also provide an option to
leave copies of email on the server.
Advantage is that once messages are downloaded
you can cut the internet connection and read your
email at your leisure without incurring further
communication costs
protocol is built into most popular e-mail
products, such as Eudora and Outlook
Express.
It's also built into the Netscape and Microsoft
Internet Explorer browsers.
The conventional port number for POP3 is
110.
Internet Mail Access Protocol (IMAP)
 IMAP was developed at Stanford University in 1986
 Standard protocol for accessing e-mail from your local
server.
 The latest version, IMAP4, is similar to POP3 but
supports some additional features.
 For example, with IMAP4, you can search through
your e-mail messages for keywords while the
messages are still on mail server. You can then choose
which messages to download to your machine.
 Port - 143
Confused?????
Difference between POP3 & IMAP
IMAP POP3
It is a method of accessing
e-mail messages on a
server without having to
download them to your
local hard drive
POP3 requires users to
download messages to
their hard drive before
reading them
The advantage of using an IMAP mail server is that
users can check their mail from multiple computers
and always see the same messages.
This is because the messages stay on the server until
the user chooses to download them to his or her local
drive.
Simple Mail Transfer Protocol
(SMTP)
 SMTP was created in the early 1980's
 used by the Mail Transfer Agent (MTA) to deliver your eMail to the
recipient's mail server.
 only be used to send emails, not to receive them.
 This is why you need to specify both the POP or IMAP server and
the SMTP server when you configure your e-mail application.
 SMTP usually is implemented to operate over Internet port 25.
 An alternative to SMTP that is widely used in Europe is X.400.
 Many mail servers now support Extended Simple Mail Transfer
Protocol (ESMTP), which allows multimedia files to be delivered as
e-mail.
Multipurpose Internet Mail
Extensions (MIME)
Multipurpose Internet Mail
Extensions (MIME)
 MIME was defined in 1992 by the Internet Engineering Task
Force (IETF)
 Many e-mail clients now support MIME, which enables them to
send and receive graphics, audio, and video files via the
Internet mail system.
 There are many predefined MIME types, such as GIF graphics
files and PostScript files.
 In addition, MIME supports messages in character sets other
than ASCII.
 A new version, called S/MIME, supports encrypted messages.
Information on protocols-email protocols

Weitere ähnliche Inhalte

Was ist angesagt?

HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)Gurjot Singh
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsHimanshu Pathak
 
E mail protocol - SMTP
E mail protocol - SMTPE mail protocol - SMTP
E mail protocol - SMTPMd Syed Ahamad
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP PresentationHarish Chand
 
Computer networking anjalisingh1
Computer networking anjalisingh1Computer networking anjalisingh1
Computer networking anjalisingh1perfectoanjali22
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcastNetProtocol Xpert
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp) Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp) RochakSrivastava3
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocolasimnawaz54
 
communication-protocols
 communication-protocols communication-protocols
communication-protocolsAli Kamil
 
vishal_sharma: python email sending software
vishal_sharma: python email sending software  vishal_sharma: python email sending software
vishal_sharma: python email sending software vishal sharma
 

Was ist angesagt? (20)

TCP/IP
TCP/IPTCP/IP
TCP/IP
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
 
E mail protocol - SMTP
E mail protocol - SMTPE mail protocol - SMTP
E mail protocol - SMTP
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Smtp protocol
Smtp protocolSmtp protocol
Smtp protocol
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
 
Computer networking anjalisingh1
Computer networking anjalisingh1Computer networking anjalisingh1
Computer networking anjalisingh1
 
How Email Works
How Email WorksHow Email Works
How Email Works
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Tcp and udp
Tcp and udpTcp and udp
Tcp and udp
 
Tcp/ip model and protocol
Tcp/ip model and protocolTcp/ip model and protocol
Tcp/ip model and protocol
 
Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp) Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp)
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
communication-protocols
 communication-protocols communication-protocols
communication-protocols
 
TCP Vs UDP
TCP Vs UDP TCP Vs UDP
TCP Vs UDP
 
vishal_sharma: python email sending software
vishal_sharma: python email sending software  vishal_sharma: python email sending software
vishal_sharma: python email sending software
 

Andere mochten auch

Email ppt
Email pptEmail ppt
Email pptmelgade
 
Mime powerpointt
Mime powerpointt Mime powerpointt
Mime powerpointt Zara
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocolguest029bcd
 
E Mail Ppt
E Mail PptE Mail Ppt
E Mail Pptkevpatel
 
Security consideration with e commerce
Security consideration with e commerceSecurity consideration with e commerce
Security consideration with e commerceStudsPlanet.com
 
E mail transfer .74
E mail transfer .74E mail transfer .74
E mail transfer .74myrajendra
 
N-tier Application Developement
N-tier Application DevelopementN-tier Application Developement
N-tier Application DevelopementDetectivee Mirza
 
Tier 1, 2 and 3 Capital based on the Basel II accord
Tier 1, 2 and 3 Capital based on the Basel II accordTier 1, 2 and 3 Capital based on the Basel II accord
Tier 1, 2 and 3 Capital based on the Basel II accordNahid Anjum
 
Web page analysis
Web page analysisWeb page analysis
Web page analysisibz10
 
E-Mail - Technical Overview
E-Mail - Technical OverviewE-Mail - Technical Overview
E-Mail - Technical OverviewVenkatesh Iyer
 
Computer Concepts Unit A PPT Lecture
Computer Concepts Unit A PPT LectureComputer Concepts Unit A PPT Lecture
Computer Concepts Unit A PPT Lecturewsbaker
 
Bandwidth Presentation
Bandwidth PresentationBandwidth Presentation
Bandwidth PresentationGrace=] Penda
 
Differences Between Architectures
Differences Between ArchitecturesDifferences Between Architectures
Differences Between Architecturesprasadsmn
 

Andere mochten auch (20)

Smtp, pop3, imapv 4
Smtp, pop3, imapv 4Smtp, pop3, imapv 4
Smtp, pop3, imapv 4
 
Email ppt
Email pptEmail ppt
Email ppt
 
Mime powerpointt
Mime powerpointt Mime powerpointt
Mime powerpointt
 
Mime
MimeMime
Mime
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
E Mail Ppt
E Mail PptE Mail Ppt
E Mail Ppt
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Online Marketing PPT
Online Marketing PPTOnline Marketing PPT
Online Marketing PPT
 
POP3
POP3POP3
POP3
 
Security consideration with e commerce
Security consideration with e commerceSecurity consideration with e commerce
Security consideration with e commerce
 
E mail transfer .74
E mail transfer .74E mail transfer .74
E mail transfer .74
 
N-tier Application Developement
N-tier Application DevelopementN-tier Application Developement
N-tier Application Developement
 
How email works
How email worksHow email works
How email works
 
Tier 1, 2 and 3 Capital based on the Basel II accord
Tier 1, 2 and 3 Capital based on the Basel II accordTier 1, 2 and 3 Capital based on the Basel II accord
Tier 1, 2 and 3 Capital based on the Basel II accord
 
Web page analysis
Web page analysisWeb page analysis
Web page analysis
 
Mime presentation
Mime presentationMime presentation
Mime presentation
 
E-Mail - Technical Overview
E-Mail - Technical OverviewE-Mail - Technical Overview
E-Mail - Technical Overview
 
Computer Concepts Unit A PPT Lecture
Computer Concepts Unit A PPT LectureComputer Concepts Unit A PPT Lecture
Computer Concepts Unit A PPT Lecture
 
Bandwidth Presentation
Bandwidth PresentationBandwidth Presentation
Bandwidth Presentation
 
Differences Between Architectures
Differences Between ArchitecturesDifferences Between Architectures
Differences Between Architectures
 

Ähnlich wie Information on protocols-email protocols

network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinitashach22
 
Ways to-access-inetrnet-
Ways to-access-inetrnet-Ways to-access-inetrnet-
Ways to-access-inetrnet-markgernale24
 
Introduction to internet.
Introduction to internet.Introduction to internet.
Introduction to internet.Anish Thomas
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityManishKumarH
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To InternetMohit Dhankher
 
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfTCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfanjaniar7gallery
 
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSSWeb Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSSKajal Singh
 
Internet tools and services
Internet tools and servicesInternet tools and services
Internet tools and serviceslearnt
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet ProtocolsAnil Neupane
 
Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)IMRAN KHAN
 

Ähnlich wie Information on protocols-email protocols (20)

network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Ways to-access-inetrnet-
Ways to-access-inetrnet-Ways to-access-inetrnet-
Ways to-access-inetrnet-
 
Introduction to internet.
Introduction to internet.Introduction to internet.
Introduction to internet.
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To Internet
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Network Protocols
Network ProtocolsNetwork Protocols
Network Protocols
 
Protocols
ProtocolsProtocols
Protocols
 
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfTCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
 
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSSWeb Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
 
application layer
application layerapplication layer
application layer
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Internet tools and services
Internet tools and servicesInternet tools and services
Internet tools and services
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Web protocol.pptx
Web protocol.pptxWeb protocol.pptx
Web protocol.pptx
 
Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)
 
Tcp
TcpTcp
Tcp
 
Protocol
ProtocolProtocol
Protocol
 

Kürzlich hochgeladen

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Kürzlich hochgeladen (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Information on protocols-email protocols

  • 2. What is a protocol after all?  Protocol is a standard used to define a method of exchanging data over a computer network such as local area network, Internet, Intranet  Protocols define how messages are sent and received, i.e. the format and order of them, what happens when messages are transmitted and received.  Each protocol has its own method of how data is formatted when sent and what to do with it once received, how that data is compressed or how to check for errors in data.  The protocol can be implemented either in hardware or in software.
  • 3. Internet Protocol (IP) It is a protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet. When you send or receive data (for example, an e-mail note or a Web page), the message gets divided into little chunks called packets.
  • 4.  Packets can arrive in a different order than the order they were sent in. The Internet Protocol just delivers them. It's up to another protocol, the Transmission Control Protocol (TCP) to put them back in the right order.  Each of these packets contains both the sender's Internet address and the receiver's address  Protocol version 4 (IPv4) standard that features IP addresses four bytes (32 bits) in length.  The newer Internet Protocol version 6 (IPv6) standard features addresses 16 bytes (128 bits) in length.
  • 5. Hypertext Transfer Protocol (HTTP)  HTTP is a set of standards that allow users of the World Wide Web to exchange information found on web pages.  The term HTTP was coined by Ted Nelson  HTTP commonly utilizes port 80, 8008, or 8080  When wanting to access any web page enter http:// in front of the web address, which tells the browser to communicate over HTTP
  • 6. Hypertext Transfer Protocol over Secure (HTTPS)  It is a secure method of accessing or sending information across a web page.  All data sent over HTTPS is encrypted before it is sent, this prevents anyone from understanding that information if intercepted.  Because data is encrypted over HTTPS, it is slower than HTTP, which is why HTTPS is only used when requiring login information or with pages that contain sensitive information such as an online bank web page.  HTTPS uses port 443 to transfer its information.  HTTPS is first used in HTTP/1.1
  • 8. File Transfer Protocol (FTP) • Standard Internet protocol for transmitting files between computers on the Internet. • First proposed on April 16, 1971 by Abhay Bhushan • Used to transfer Web page files from their creator to the computer that acts as their server for everyone on the Internet. • It's also commonly used to download programs and other files to your computer from other servers.
  • 9. Contd… • Your Web browser can also make FTP requests to download programs you select from a Web page. • Using FTP, you can also update (delete, rename, move, and copy) files at a server. • You need to logon to an FTP server. • FTP is most commonly used to download a file from a server using the Internet or to upload a file to a server (e.g., uploading a Web page file to a server).
  • 10. Email Protocols Interactions between email servers and clients are governed by email protocols. The most common email protocols are POP - Post Office Protocol IMAP - Internet Mail Access Protocol SMTP - Simple Mail Transport Protocol
  • 12. Most recent version of a standard protocol for receiving e-mail. Provides a simple, standardized way for users to access mailboxes and download messages to their computers. When using the POP protocol all eMail messages will be downloaded from the mail server to your local computer Most POP clients also provide an option to leave copies of email on the server.
  • 13. Advantage is that once messages are downloaded you can cut the internet connection and read your email at your leisure without incurring further communication costs protocol is built into most popular e-mail products, such as Eudora and Outlook Express. It's also built into the Netscape and Microsoft Internet Explorer browsers. The conventional port number for POP3 is 110.
  • 14. Internet Mail Access Protocol (IMAP)
  • 15.  IMAP was developed at Stanford University in 1986  Standard protocol for accessing e-mail from your local server.  The latest version, IMAP4, is similar to POP3 but supports some additional features.  For example, with IMAP4, you can search through your e-mail messages for keywords while the messages are still on mail server. You can then choose which messages to download to your machine.  Port - 143
  • 17. Difference between POP3 & IMAP IMAP POP3 It is a method of accessing e-mail messages on a server without having to download them to your local hard drive POP3 requires users to download messages to their hard drive before reading them The advantage of using an IMAP mail server is that users can check their mail from multiple computers and always see the same messages. This is because the messages stay on the server until the user chooses to download them to his or her local drive.
  • 18. Simple Mail Transfer Protocol (SMTP)
  • 19.  SMTP was created in the early 1980's  used by the Mail Transfer Agent (MTA) to deliver your eMail to the recipient's mail server.  only be used to send emails, not to receive them.  This is why you need to specify both the POP or IMAP server and the SMTP server when you configure your e-mail application.  SMTP usually is implemented to operate over Internet port 25.  An alternative to SMTP that is widely used in Europe is X.400.  Many mail servers now support Extended Simple Mail Transfer Protocol (ESMTP), which allows multimedia files to be delivered as e-mail.
  • 21. Multipurpose Internet Mail Extensions (MIME)  MIME was defined in 1992 by the Internet Engineering Task Force (IETF)  Many e-mail clients now support MIME, which enables them to send and receive graphics, audio, and video files via the Internet mail system.  There are many predefined MIME types, such as GIF graphics files and PostScript files.  In addition, MIME supports messages in character sets other than ASCII.  A new version, called S/MIME, supports encrypted messages.