SlideShare a Scribd company logo
1 of 19
Application Layer
Service:
Electronic Mail
Architecture
First Scenario
Simplest
Second Scenario
More Complex
Third Scenario
More Complex
Fourth Scenario
Most common in the exchange of
email
Software application that
allows user to read ,compose
and send email.It also handles
mailboxes.
Software application that
transport,deliver and
forward email.
Protocol used to retrieving
incoming mails from local
servers.
In the first scenario, the sender and the receiver of the email are users (or
application programs) on the same system
In the second scenario, the sender and the receiver of the email are
users (or application programs) on two different systems.
In the third scenario,when the sender is connected to the mail server via a
LAN or a WAN,we need two UAs and two pairs of MTAs (client and
server).
In the fourth scenario,when both the sender and receiver is connected to the mail
server via a LAN or a WAN, we need two UAs, two pairs of MTAs and a pair of
MAAs.
Push and Pull in electronic email
Services of User Agent
A user agent
helps the user
compose the e-
mail message to
be sent out.
A user agent read the
incoming messages.
Each email contains
the following fields.
number field, sender,
size of the message,
a flag, subject field
(optional).
After reading a
message, a user can
use the user agent to
reply to a message
to the original
sender or to reply to
all recipients of the
message..
Forwarding is
defined as
sending the
message to a
third party.
Managing
mailbox like
archive a
message or
mark as spam.
● Command-Driven ● GUI-Based Modem
User Agent Types
A command-driven user agent
normally accepts a one-
character command from the
keyboard to perform its task.
Some examples of command-driven
user agents are mail, pine, and
elm.
They contain graphical-user
interface (GUI)components that
allow the user to interact with the
software by using both the keyboard
and the mouse.
Some examples of GUI-based user
agents are Eudora, Microsoft's
Outlook, and Netscape.
Format of an e-mail and e-
mail address
Multipurpose Internet Mail Extensions MIME
Multipurpose Internet Mail Extensions is a standard to expand limited
capabilities of e-mail.It allows the users to exchange different kinds of data files on
the Internet: audio, video, images, application programs as well.
Features of MIME –
1. It is able to send multiple attachments with a single message.
2. Unlimited message length.
3. Binary attachments (executables, images, audio, or video files) which may be divided if
needed.
4. MIME provided support for varying content types and multi-part messages.
Working of MIME
MIME header
MIME header is basically inserted at the beginning of any e-mail transfer.
Message Transfer Agent: SMTP
The formal protocol that defines the MTA client and server in the Internet is called the Simple
Mail Transfer Protocol (SMTP). Two pairs of MTA client/server programs are used in the
most common situation (fourth scenario).
Commands and Responses
Command
format
SMTP uses commands and responses to transfer messages between an
MTA client and an MTA server.
Commands Response
Message Access Protocols
Currently two message access protocols are available:
1) Post Office Protocol, version 3 (POP3)
2) Internet Mail Access Protocol, version 4 (IMAP4).
Presentation By:
Amisha Sahu

More Related Content

What's hot

Imap(internet massege access protocaols)
Imap(internet massege access protocaols)Imap(internet massege access protocaols)
Imap(internet massege access protocaols)shashikant pabari
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting Newtechbed
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Ravindra Raju Kolahalam
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptxAcad
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocolasimnawaz54
 
Internetworking
InternetworkingInternetworking
InternetworkingRaghu nath
 
Congestion control
Congestion controlCongestion control
Congestion controlAman Jaiswal
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switchingDr Rajiv Srivastava
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP modelRubal Sagwal
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing ProtocolsKABILESH RAMAR
 

What's hot (20)

Imap(internet massege access protocaols)
Imap(internet massege access protocaols)Imap(internet massege access protocaols)
Imap(internet massege access protocaols)
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]
 
Network software
Network softwareNetwork software
Network software
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Internetworking
InternetworkingInternetworking
Internetworking
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Osi model
Osi modelOsi model
Osi model
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
 

Similar to Application layer protocol - Electronic Mail

Similar to Application layer protocol - Electronic Mail (20)

Electronic mail - Computer Networks
Electronic mail - Computer NetworksElectronic mail - Computer Networks
Electronic mail - Computer Networks
 
Electronic Mail.ppt
Electronic Mail.pptElectronic Mail.ppt
Electronic Mail.ppt
 
CN
CNCN
CN
 
Email
EmailEmail
Email
 
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAILTECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
 
Email forensic
Email forensic Email forensic
Email forensic
 
Email
EmailEmail
Email
 
Cn u5
Cn u5Cn u5
Cn u5
 
Higher level internet protocols (ppt)
Higher level internet protocols (ppt)Higher level internet protocols (ppt)
Higher level internet protocols (ppt)
 
Application layer
Application layerApplication layer
Application layer
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
 
How email works
How email worksHow email works
How email works
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transfer
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Mail server using Linux(Ubuntu)
Mail server using Linux(Ubuntu)Mail server using Linux(Ubuntu)
Mail server using Linux(Ubuntu)
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Presentation client mail_Android
Presentation client mail_AndroidPresentation client mail_Android
Presentation client mail_Android
 
Email Client Server System
Email Client Server SystemEmail Client Server System
Email Client Server System
 
Internet.ppt
Internet.pptInternet.ppt
Internet.ppt
 
Email
EmailEmail
Email
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfOverkill Security
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 

Recently uploaded (20)

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 

Application layer protocol - Electronic Mail

  • 2. Architecture First Scenario Simplest Second Scenario More Complex Third Scenario More Complex Fourth Scenario Most common in the exchange of email
  • 3. Software application that allows user to read ,compose and send email.It also handles mailboxes. Software application that transport,deliver and forward email. Protocol used to retrieving incoming mails from local servers.
  • 4. In the first scenario, the sender and the receiver of the email are users (or application programs) on the same system
  • 5. In the second scenario, the sender and the receiver of the email are users (or application programs) on two different systems.
  • 6. In the third scenario,when the sender is connected to the mail server via a LAN or a WAN,we need two UAs and two pairs of MTAs (client and server).
  • 7. In the fourth scenario,when both the sender and receiver is connected to the mail server via a LAN or a WAN, we need two UAs, two pairs of MTAs and a pair of MAAs.
  • 8. Push and Pull in electronic email
  • 9. Services of User Agent A user agent helps the user compose the e- mail message to be sent out. A user agent read the incoming messages. Each email contains the following fields. number field, sender, size of the message, a flag, subject field (optional). After reading a message, a user can use the user agent to reply to a message to the original sender or to reply to all recipients of the message.. Forwarding is defined as sending the message to a third party. Managing mailbox like archive a message or mark as spam.
  • 10. ● Command-Driven ● GUI-Based Modem User Agent Types A command-driven user agent normally accepts a one- character command from the keyboard to perform its task. Some examples of command-driven user agents are mail, pine, and elm. They contain graphical-user interface (GUI)components that allow the user to interact with the software by using both the keyboard and the mouse. Some examples of GUI-based user agents are Eudora, Microsoft's Outlook, and Netscape.
  • 11. Format of an e-mail and e- mail address
  • 12. Multipurpose Internet Mail Extensions MIME Multipurpose Internet Mail Extensions is a standard to expand limited capabilities of e-mail.It allows the users to exchange different kinds of data files on the Internet: audio, video, images, application programs as well. Features of MIME – 1. It is able to send multiple attachments with a single message. 2. Unlimited message length. 3. Binary attachments (executables, images, audio, or video files) which may be divided if needed. 4. MIME provided support for varying content types and multi-part messages.
  • 14. MIME header MIME header is basically inserted at the beginning of any e-mail transfer.
  • 15. Message Transfer Agent: SMTP The formal protocol that defines the MTA client and server in the Internet is called the Simple Mail Transfer Protocol (SMTP). Two pairs of MTA client/server programs are used in the most common situation (fourth scenario).
  • 16. Commands and Responses Command format SMTP uses commands and responses to transfer messages between an MTA client and an MTA server.
  • 18. Message Access Protocols Currently two message access protocols are available: 1) Post Office Protocol, version 3 (POP3) 2) Internet Mail Access Protocol, version 4 (IMAP4).