SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
Name: Shwetanshu Gupta
MBA- 1st Sem- 49
E- mail ?
One of the most important services of internet
is electronic- mail.
Electronic mail, commonly referred to as e-
mail since 1993, is a method of exchanging
digital messages from a user to one or more
recipients.
Some early email systems required both the
users to be online at the same time.
Cont’d
Today's email systems are based on a store-
and-forward model.
Requires an account on a mail server and
supporting software on your PC
The username and password will allow you
to access your account
All e-mail programs allow you to Send,
Compose, Reply, and Forward mail
E-mail format
An Internet email message consists of
three components: Envelope, Header and
Body.
Architecture
User Agent -Software program that
composes, reads, replies to, and
forwards messages. It also handles
mailboxes.
Message Transfer Agent - The actual mail
transfer is done through message
transfer agents. SMTP is an example of
an MTA.
Message Access Agent - The software
that pulls messages out of a mailbox.
SCENARIORS IN E-MAIL
When the sender and the receiver
of an e-mail are on the same mail
server, we need only two user
agents.
When the sender and the receiver
of an e-mail are on different mail
servers, we need two UAs and a
pair of MTAs (client and server).
When the sender is connected to
the mail server via a LAN or a
WAN, we need two UAs and two
pairs of MTAs (client and server).
When both sender and receiver are
connected to the mail server via a LAN
or a WAN, we need two UAs, two pairs of
MTAs (client and server), and a pair of
MAAs (client and server). This is the
most common situation today.
SMTP, POP 3, IMAPV4
For exchanging of e-
mail, protocols are
required. These are:
SMTP
SMTP is short for Simple Mail Transfer Protocol. It is
a standard for sending electronic mail over internet
and part of the TCP/IP protocol suite.
SMTP defines the message format and the message
transfer agent (MTA), which stores and forwards the
mail.
SMTP is a relatively simple, text-based
protocol, where one or more recipients of a message
are specified and then the message text is
transferred.
The direction of the bulk data (messages) is from the
client to the server.
SMTP ARCHITECTURE
Commands and Responses
Commands are sent from client to
server; responses vice versa.
Keywords; argument(s)
Commands format
Commands
14 different
commands.
First 5 are
required by
all
institutions.
Next 3 are
often
used, but
highly
recommended
.
Responses
Responses
are3-digit
codes
Codes that
begin with
a 2 are
positive
completion
s
LIMITATIONS OF SMTP:
Security matters for SMTP are worse.
Its usefulness is limited by its
simplicity.
Transmission of binary files using SMTP
is not possible without converting into
text files. Use MIME to send mail in
other format.
It is limited to 7-bit ASCII characters
only.
SMTP servers may reject mail messages
beyond some specific length.
POP3 AND IMAPV4
The first and the second stages of mail
delivery use SMTP. However, SMTP is not
involved in the third stage because SMTP is a
push protocol; it pushes the message from the
client to the server.
In other words, the direction of the bulk data
(messages) is from the client to the server.
On the other hand, the third stage needs a pull
protocol; the client must pull messages from
the server. The direction of the bulk data are
from the server to the client. The third stage
uses a message access agent.
There are 3 stages in Mail Delivery:
The first and the second stages of mail
delivery use SMTP( push messages)
The third stage of mail delivery use
POP3 or IMAP4(pull messages)
Stages of Mail
Delivery
POP3 is simple and limited in functionality.
Need POP3 client on user machine and POP3
server on the mail server machine.
It is a pull protocol; the client must pull
messages from the server.
The direction of the bulk data are from the
server to the client.
It is a message access agent.
Pop 3
POP 3
Pop3 has two modes: keep mode and
delete mode
In delete mode mail is deleted from
mailbox after each retrieval.
In keep mode, mail remains in mailbox
after each retrieval.
Advantages:
Simple protocol
Easier to
implement
Copies all
messages when
connection is
made.
Disadvantages:
Don’t allow user
to organize mails
on server.
Don’t allow user
to partially
check the
contents of mail
before
downloading.
IMAPV4
As its name implies, IMAP allows us to access
email messages wherever we are .
Basically, email messages are stored on
servers. Whenever we heck inbox, our email
client contacts the server to connect with
messages.
When we read an email message using IMAP, we
aren't actually downloading or storing it on
computer; instead, we are reading it off of
the server.
As a result, it's possible to email from
several different devices without missing a
thing.
It as an intermediary between email
client and email server.
When you sign into an email client like
Microsoft Outlook, it contacts the
email server using IMAP.
The headers of all of your email
messages are then displayed.
If you choose to read a message, it is
quickly downloaded so that you can
see it - emails are not downloaded
unless you need to open them.
POP works by contacting email server and
downloading all new messages from it. Once
they are downloaded, they disappear from
the server.
If we decide to check email from a different
device, the messages that have been
downloaded previously will not be
available.
POP works fine for those who generally
only check their email messages from a
single device; those who travel or need to
access their email from various devices are
much better off with IMAP-based email
Unlike POP, IMAP allows us to access, organize,
read and sort email messages without having
to download them first.
As a result, IMAP is very fast and efficient.
The server also keeps a record of all of the
messages that we send, allowing us to access
sent messages from anywhere.
IMAP does not move messages from the server
to computer; instead, it synchronizes the
email that's on computer with the email that's
on the server.
POP3 VS IMAPV4
Advantages of imapv4
A user can check the email header prior to
downloading
A user can search the contents of the email
for a specific string of characters prior to
downloading
A user can partially download email
(helpful if email contains huge attachments
and connection is slow)
A user can create, delete, or rename
mailboxes on the mail server
A user can create a hierarchy of mailboxes in
a folder for email storage
It allows us to access email messages from
anywhere, and from many different devices as we
want.
It only downloads a message when we click on it. As a
result, you do not have to wait for all of your new
messages to download from the server before you
can read them.
Attachments are not automatically downloaded with
IMAP. As a result, you're able to check your messages a
lot more quickly and have greater control over
which attachments are opened.
Finally, IMAP can be used offline just like POP - you
can basically enjoy the benefits of both protocols in
one.
CONCLUSION
As the world becomes more mobile
than ever, IMAP is becoming more and
more popular. The proliferation of
smartphones, laptops, tablets and
other devices is making the demand
for IMAP stronger than ever.
While POP will remain popular with
people who only access their email via
one or two devices - and those who
have slow connections to the Internet -
IMAP is sure to remain the protocol of
choice for most of today's busy
people.
Smtp, pop3, imapv 4

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
 
Introduction to Application layer
Introduction to Application layerIntroduction to Application layer
Introduction to Application layer
 
TCP and UDP
TCP and UDP TCP and UDP
TCP and UDP
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Email and DNS
Email and DNSEmail and DNS
Email and DNS
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
POP3 Post Office Protocol
POP3 Post Office ProtocolPOP3 Post Office Protocol
POP3 Post Office Protocol
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Tcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport LayerTcp Udp Icmp And The Transport Layer
Tcp Udp Icmp And The Transport Layer
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Electronic mail - Computer Networks
Electronic mail - Computer NetworksElectronic mail - Computer Networks
Electronic mail - Computer Networks
 
TCP-IP Reference Model
TCP-IP Reference ModelTCP-IP Reference Model
TCP-IP Reference Model
 
5. icmp
5. icmp5. icmp
5. icmp
 
Tcp
TcpTcp
Tcp
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
OSI Layer
OSI LayerOSI Layer
OSI Layer
 
Network Layer
Network LayerNetwork Layer
Network Layer
 

Ähnlich wie Smtp, pop3, imapv 4

SMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLSMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLVidhu Arora
 
Pop (post office protocol)e mail (electronic mail)
Pop (post office protocol)e mail (electronic mail)Pop (post office protocol)e mail (electronic mail)
Pop (post office protocol)e mail (electronic mail)MDSHABBIR12
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptxYouTubeCONTRA
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mailtumetr1
 
window server 2008 mail configuration
window server 2008 mail configurationwindow server 2008 mail configuration
window server 2008 mail configurationanwarkade1
 
CFIMAP & CFPOP
CFIMAP & CFPOPCFIMAP & CFPOP
CFIMAP & CFPOPisummation
 
Introduction to basics command in linux, and working in linux
Introduction to basics command in linux, and working in linuxIntroduction to basics command in linux, and working in linux
Introduction to basics command in linux, and working in linuxGracia Marcom
 
Electronic mail protocols and operations
 Electronic mail protocols and operations Electronic mail protocols and operations
Electronic mail protocols and operationsVivekRajawat9
 
Powerpoint Preentation
Powerpoint PreentationPowerpoint Preentation
Powerpoint Preentationsubhamanu1990
 
Application layer
Application layerApplication layer
Application layerAnithaRaj31
 

Ähnlich wie Smtp, pop3, imapv 4 (20)

Smtp
SmtpSmtp
Smtp
 
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLSMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
 
Mail server
Mail serverMail server
Mail server
 
Mail server
Mail serverMail server
Mail server
 
Pop (post office protocol)e mail (electronic mail)
Pop (post office protocol)e mail (electronic mail)Pop (post office protocol)e mail (electronic mail)
Pop (post office protocol)e mail (electronic mail)
 
Electronic Mail.ppt
Electronic Mail.pptElectronic Mail.ppt
Electronic Mail.ppt
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
 
how email works
how email workshow email works
how email works
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mail
 
window server 2008 mail configuration
window server 2008 mail configurationwindow server 2008 mail configuration
window server 2008 mail configuration
 
CFIMAP & CFPOP
CFIMAP & CFPOPCFIMAP & CFPOP
CFIMAP & CFPOP
 
Spam Filter
Spam FilterSpam Filter
Spam Filter
 
Introduction to basics command in linux, and working in linux
Introduction to basics command in linux, and working in linuxIntroduction to basics command in linux, and working in linux
Introduction to basics command in linux, and working in linux
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Email
EmailEmail
Email
 
Electronic mail protocols and operations
 Electronic mail protocols and operations Electronic mail protocols and operations
Electronic mail protocols and operations
 
Powerpoint Preentation
Powerpoint PreentationPowerpoint Preentation
Powerpoint Preentation
 
Application layer
Application layerApplication layer
Application layer
 

Mehr von Shwetanshu Gupta

project report on FITNESS HUB
project report on FITNESS HUBproject report on FITNESS HUB
project report on FITNESS HUBShwetanshu Gupta
 
Sales training: program, execution and evaluation
Sales training: program, execution and evaluationSales training: program, execution and evaluation
Sales training: program, execution and evaluationShwetanshu Gupta
 
Legal & ethical issues in retailing
Legal & ethical issues in retailingLegal & ethical issues in retailing
Legal & ethical issues in retailingShwetanshu Gupta
 
basic Anchoring script for buiness quiz competition
basic Anchoring script for buiness quiz competitionbasic Anchoring script for buiness quiz competition
basic Anchoring script for buiness quiz competitionShwetanshu Gupta
 
barriers and use case study of mobile internet for the age group above 40-- A...
barriers and use case study of mobile internet for the age group above 40-- A...barriers and use case study of mobile internet for the age group above 40-- A...
barriers and use case study of mobile internet for the age group above 40-- A...Shwetanshu Gupta
 
barriers and use case study for mobile internet for the age group above 40- A...
barriers and use case study for mobile internet for the age group above 40- A...barriers and use case study for mobile internet for the age group above 40- A...
barriers and use case study for mobile internet for the age group above 40- A...Shwetanshu Gupta
 
Adaptibility: the new competitive advantage
Adaptibility: the new competitive advantageAdaptibility: the new competitive advantage
Adaptibility: the new competitive advantageShwetanshu Gupta
 
Supply and demand management in services
Supply and demand management in servicesSupply and demand management in services
Supply and demand management in servicesShwetanshu Gupta
 
M naraSIMHAM COMMITEE ON FINANCIAL AND BANKING SECTOR REFORM pdf
M naraSIMHAM COMMITEE ON FINANCIAL AND BANKING SECTOR REFORM pdfM naraSIMHAM COMMITEE ON FINANCIAL AND BANKING SECTOR REFORM pdf
M naraSIMHAM COMMITEE ON FINANCIAL AND BANKING SECTOR REFORM pdfShwetanshu Gupta
 
M Narasinhan committee on banking sector reforms
M Narasinhan committee on banking sector reformsM Narasinhan committee on banking sector reforms
M Narasinhan committee on banking sector reformsShwetanshu Gupta
 
management information system in elections
management information system in electionsmanagement information system in elections
management information system in electionsShwetanshu Gupta
 

Mehr von Shwetanshu Gupta (20)

project report on FITNESS HUB
project report on FITNESS HUBproject report on FITNESS HUB
project report on FITNESS HUB
 
Sales training: program, execution and evaluation
Sales training: program, execution and evaluationSales training: program, execution and evaluation
Sales training: program, execution and evaluation
 
Films , music and sports
Films , music and sportsFilms , music and sports
Films , music and sports
 
Brand and brand equity
Brand and brand equityBrand and brand equity
Brand and brand equity
 
Introduction to law
Introduction to lawIntroduction to law
Introduction to law
 
Trade pattern
Trade patternTrade pattern
Trade pattern
 
Legal & ethical issues in retailing
Legal & ethical issues in retailingLegal & ethical issues in retailing
Legal & ethical issues in retailing
 
Crm technology
Crm technologyCrm technology
Crm technology
 
basic Anchoring script for buiness quiz competition
basic Anchoring script for buiness quiz competitionbasic Anchoring script for buiness quiz competition
basic Anchoring script for buiness quiz competition
 
Just in time concept
Just in time conceptJust in time concept
Just in time concept
 
barriers and use case study of mobile internet for the age group above 40-- A...
barriers and use case study of mobile internet for the age group above 40-- A...barriers and use case study of mobile internet for the age group above 40-- A...
barriers and use case study of mobile internet for the age group above 40-- A...
 
barriers and use case study for mobile internet for the age group above 40- A...
barriers and use case study for mobile internet for the age group above 40- A...barriers and use case study for mobile internet for the age group above 40- A...
barriers and use case study for mobile internet for the age group above 40- A...
 
Adaptibility: the new competitive advantage
Adaptibility: the new competitive advantageAdaptibility: the new competitive advantage
Adaptibility: the new competitive advantage
 
STP STRATEGIES
STP STRATEGIESSTP STRATEGIES
STP STRATEGIES
 
Supply and demand management in services
Supply and demand management in servicesSupply and demand management in services
Supply and demand management in services
 
M naraSIMHAM COMMITEE ON FINANCIAL AND BANKING SECTOR REFORM pdf
M naraSIMHAM COMMITEE ON FINANCIAL AND BANKING SECTOR REFORM pdfM naraSIMHAM COMMITEE ON FINANCIAL AND BANKING SECTOR REFORM pdf
M naraSIMHAM COMMITEE ON FINANCIAL AND BANKING SECTOR REFORM pdf
 
M Narasinhan committee on banking sector reforms
M Narasinhan committee on banking sector reformsM Narasinhan committee on banking sector reforms
M Narasinhan committee on banking sector reforms
 
Financial services
Financial servicesFinancial services
Financial services
 
management information system in elections
management information system in electionsmanagement information system in elections
management information system in elections
 
Final research
Final researchFinal research
Final research
 

Kürzlich hochgeladen

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 

Kürzlich hochgeladen (20)

Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 

Smtp, pop3, imapv 4

  • 2. E- mail ? One of the most important services of internet is electronic- mail. Electronic mail, commonly referred to as e- mail since 1993, is a method of exchanging digital messages from a user to one or more recipients. Some early email systems required both the users to be online at the same time.
  • 3. Cont’d Today's email systems are based on a store- and-forward model. Requires an account on a mail server and supporting software on your PC The username and password will allow you to access your account All e-mail programs allow you to Send, Compose, Reply, and Forward mail
  • 4. E-mail format An Internet email message consists of three components: Envelope, Header and Body.
  • 5. Architecture User Agent -Software program that composes, reads, replies to, and forwards messages. It also handles mailboxes. Message Transfer Agent - The actual mail transfer is done through message transfer agents. SMTP is an example of an MTA. Message Access Agent - The software that pulls messages out of a mailbox.
  • 6. SCENARIORS IN E-MAIL When the sender and the receiver of an e-mail are on the same mail server, we need only two user agents.
  • 7. When the sender and the receiver of an e-mail are on different mail servers, we need two UAs and a pair of MTAs (client and server).
  • 8. When the sender is connected to the mail server via a LAN or a WAN, we need two UAs and two pairs of MTAs (client and server).
  • 9. When both sender and receiver are connected to the mail server via a LAN or a WAN, we need two UAs, two pairs of MTAs (client and server), and a pair of MAAs (client and server). This is the most common situation today.
  • 10. SMTP, POP 3, IMAPV4 For exchanging of e- mail, protocols are required. These are:
  • 11. SMTP SMTP is short for Simple Mail Transfer Protocol. It is a standard for sending electronic mail over internet and part of the TCP/IP protocol suite. SMTP defines the message format and the message transfer agent (MTA), which stores and forwards the mail. SMTP is a relatively simple, text-based protocol, where one or more recipients of a message are specified and then the message text is transferred. The direction of the bulk data (messages) is from the client to the server.
  • 13. Commands and Responses Commands are sent from client to server; responses vice versa. Keywords; argument(s) Commands format
  • 14. Commands 14 different commands. First 5 are required by all institutions. Next 3 are often used, but highly recommended .
  • 16. LIMITATIONS OF SMTP: Security matters for SMTP are worse. Its usefulness is limited by its simplicity. Transmission of binary files using SMTP is not possible without converting into text files. Use MIME to send mail in other format. It is limited to 7-bit ASCII characters only. SMTP servers may reject mail messages beyond some specific length.
  • 17. POP3 AND IMAPV4 The first and the second stages of mail delivery use SMTP. However, SMTP is not involved in the third stage because SMTP is a push protocol; it pushes the message from the client to the server. In other words, the direction of the bulk data (messages) is from the client to the server. On the other hand, the third stage needs a pull protocol; the client must pull messages from the server. The direction of the bulk data are from the server to the client. The third stage uses a message access agent.
  • 18. There are 3 stages in Mail Delivery: The first and the second stages of mail delivery use SMTP( push messages) The third stage of mail delivery use POP3 or IMAP4(pull messages) Stages of Mail Delivery
  • 19. POP3 is simple and limited in functionality. Need POP3 client on user machine and POP3 server on the mail server machine. It is a pull protocol; the client must pull messages from the server. The direction of the bulk data are from the server to the client. It is a message access agent. Pop 3
  • 20. POP 3 Pop3 has two modes: keep mode and delete mode In delete mode mail is deleted from mailbox after each retrieval. In keep mode, mail remains in mailbox after each retrieval.
  • 21. Advantages: Simple protocol Easier to implement Copies all messages when connection is made. Disadvantages: Don’t allow user to organize mails on server. Don’t allow user to partially check the contents of mail before downloading.
  • 22. IMAPV4 As its name implies, IMAP allows us to access email messages wherever we are . Basically, email messages are stored on servers. Whenever we heck inbox, our email client contacts the server to connect with messages. When we read an email message using IMAP, we aren't actually downloading or storing it on computer; instead, we are reading it off of the server. As a result, it's possible to email from several different devices without missing a thing.
  • 23. It as an intermediary between email client and email server. When you sign into an email client like Microsoft Outlook, it contacts the email server using IMAP. The headers of all of your email messages are then displayed. If you choose to read a message, it is quickly downloaded so that you can see it - emails are not downloaded unless you need to open them.
  • 24. POP works by contacting email server and downloading all new messages from it. Once they are downloaded, they disappear from the server. If we decide to check email from a different device, the messages that have been downloaded previously will not be available. POP works fine for those who generally only check their email messages from a single device; those who travel or need to access their email from various devices are much better off with IMAP-based email
  • 25. Unlike POP, IMAP allows us to access, organize, read and sort email messages without having to download them first. As a result, IMAP is very fast and efficient. The server also keeps a record of all of the messages that we send, allowing us to access sent messages from anywhere. IMAP does not move messages from the server to computer; instead, it synchronizes the email that's on computer with the email that's on the server. POP3 VS IMAPV4
  • 26. Advantages of imapv4 A user can check the email header prior to downloading A user can search the contents of the email for a specific string of characters prior to downloading A user can partially download email (helpful if email contains huge attachments and connection is slow) A user can create, delete, or rename mailboxes on the mail server A user can create a hierarchy of mailboxes in a folder for email storage
  • 27. It allows us to access email messages from anywhere, and from many different devices as we want. It only downloads a message when we click on it. As a result, you do not have to wait for all of your new messages to download from the server before you can read them. Attachments are not automatically downloaded with IMAP. As a result, you're able to check your messages a lot more quickly and have greater control over which attachments are opened. Finally, IMAP can be used offline just like POP - you can basically enjoy the benefits of both protocols in one.
  • 28. CONCLUSION As the world becomes more mobile than ever, IMAP is becoming more and more popular. The proliferation of smartphones, laptops, tablets and other devices is making the demand for IMAP stronger than ever. While POP will remain popular with people who only access their email via one or two devices - and those who have slow connections to the Internet - IMAP is sure to remain the protocol of choice for most of today's busy people.