SlideShare ist ein Scribd-Unternehmen logo
1 von 21
DATA COMMUNICATION
TOPIC:THE WHY,WHAT AND HOW OF EMAIL
Submitted by:
SHRADHA KANODIA[1MS13IS102]
VEERAVALLI HARIKA[1MS13IS121]
M.S RAMAIAH INSTITUTE OF
TECHNOLOGY
What is Electronic Mail?
• Electronic Mail - It is a facility that allows users to
transmit messages across the Internet.
• It is the most widely used application service offering
a fast conventional method of transferring information.
• It can accommodate large messages or voluminous
memos.
• It allows communication between groups or single
individuals.
HOW EMAIL IS SENT
MESSAGE ACCESS
PROTOCOLS
1) POP3
2) IMAP
Post Office Protocol
Version 3 (POP3)
• Post Office Protocol Version 3 has been the most popular protocol
has been the most popular protocol used to transfer messages from
a permanent mailbox to a local computer.
• When the user invokes a POP3 client, it establishes a TCP
connection and contacts a POP3 server on the mailbox computer.
The user sends a login and a password to authenticate the session.
If login was successful, the client sends commands to retrieve
copies of messages and to delete messages from the permanent
mailbox.
• Both SMTP servers and POP3 servers must synchronize access to
the mailbox.
POP3 Commands
• USER name: User name for authentication
• PASS password: Password used for
authentication
• STAT: Get number and total size of message
• LIST: [msg] get size of message
• RETR: msg Send message to client
• DELE: msg Delete message from mailbox
• RSET: Cancel previous delete requests.
• QUIT: Updates mailbox (deletes messages) and
quits.
Internet Message Access
Protocol (IMAP)
• An alternative to POP3 is IMAP version 4. It defines an
abstraction known as a MAILBOX. Mailboxes are located on
the same computer as a server.
• IMAP4 is a method for accessing electronic mail messages
that are kept on a mail server. It permits a client
e-mail program to view and manipulate those messages.
• Electronic mail stored on an IMAP server can be viewed
or manipulated from a desktop computer at home,
a notebook computer, or at a workstation. We can also say
that mail messages can be accessed from multiple
locations.
What are the functions
of IMAP4?
Includes operations for:
• creating mailboxes
• deleting mailboxes
• renaming mailboxes
• checking for new messages
• permanently removing messages
• setting and clearing flags
• searching
• fetching of message attributes texts, and
portions.
• IMAP provides extended functionality for
message retrieval and processing.
• Users can obtain information about a
message or examine header fields without
retrieving the entire message.
• Users can search for a specified string and
retrieve portions of a message. This is
useful for slow-speed dialup connections
since they wont need to download useless
information.
MESSAGE TRANSFER
AGENT
(SMTP)
Introduction to SMTP
• The TCP/IP Protocol specifies a standard for the
exchange of mail between machines. This
standard specifies the exact format of messages
a client on a single machine uses to transfer
mail to a server on another.
• This standard transfer protocol is known as the
Simple Mail Transfer Protocol. (SMTP) The main
objective of SMTP is to provide the reliability and
efficiency of mail transfer.
• SMTP basically focuses on how the underlying
mail delivery
system passes messages across an internet
from machine to
machine.
• SMTP does not specify how the mail system
accepts mail
from a user or how the user interface presents
messages.
• An important feature of SMTP is "mail relaying."
Mail relaying is SMTP's capability of transporting
across
networks.
• Through SMTP, a process can transfer mail to
another
process using the same or other networks via a
relay
process accessible to both networks.
• Mail messages can be passed through a
number of intermediate
relay or gateways hosts from sender to ultimate
destination.
Basic SMTP Design
User
File System
Client SMTP Server SMTP
File System
OPERATION
Simple Mail Transfer Protocol (SMTP) is an Internet standard for
electronic mail (email) transmission. Although electronic mail
servers and other mail transfer agents use SMTP to send and
receive mail messages, user-level client mail applications
typically use SMTP only for sending messages to a mail server
for relaying. For receiving messages, client applications usually
use either POP3 or IMAP.
A message transfer agent receives mail from either another MTA,
a mail submission agent (MSA), or a mail user agent (MUA).
The transmission details are specified by the Simple Mail
Transfer Protocol (SMTP). When a recipient mailbox of a
message is not hosted locally, the message is relayed, that is,
forwarded to another MTA.
Every time an MTA receives an email message, it adds
a received trace header field to the top of the header of the
message,thereby building a sequential record of MTAs handling
the message. The process of choosing a target MTA for the next
hop is also described in SMTP, but can usually be overridden by
configuring the MTA software with specific route
Security
Considerations
Mail security and spoofing
• SMTP is not a secure protocol.
• A user may spoof, which means they may trick the
protocol to send a message posing as someone else.
• Usually a user will prove that they are authentic in the
message body with a digital signature or SPF (sender
policy framework) records.
• SPF records work by telling people which machines you
send email from, and if the sender is not one of those
machines then they are lying.
• If relay is on, no authentication possible.
• Spam was a huge problem early on because early
defaults had relay on and people didn't know how to turn
it off.
Scope of operation of SMTP
servers
• An SMTP server may refuse to accept mail for any operational or
technical reason that makes sense to the site providing the server.
• If sites take excessive advantage of the right to reject traffic, the
ubiquity of email availability (one of the strengths of the Internet) will
be threatened.
• Considerable care should be taken and balance maintained if a site
decides to be selective about the traffic it will accept and process.
• In recent years, use of the relay function through arbitrary sites has
been used as part of hostile efforts to hide the actual origins of mail.
• Some sites have decided to limit the use of the relay function to
known or identifiable sources, and implementations should provide
the capability to perform this type of filtering.
• When mail is rejected for these or other policy reasons, a 550 code
should be used in response to EHLO, MAIL, or RCPT as
appropriate.

Weitere ähnliche Inhalte

Was ist angesagt?

Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp) Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp) RochakSrivastava3
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocolsPriyanka Shinde
 
Imap(internet massege access protocaols)
Imap(internet massege access protocaols)Imap(internet massege access protocaols)
Imap(internet massege access protocaols)shashikant pabari
 
Communication through internet.ppt
Communication through internet.pptCommunication through internet.ppt
Communication through internet.pptgasumova
 
Ping-and-Traceroute.ppt
Ping-and-Traceroute.pptPing-and-Traceroute.ppt
Ping-and-Traceroute.pptMathewSanJuan
 
Preventions of Email Hacking
Preventions of Email HackingPreventions of Email Hacking
Preventions of Email HackingUsman Khan
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolMaitree Patel
 
Email use in business ppt
Email use in business pptEmail use in business ppt
Email use in business pptJason Roy
 
Electronic mail - Computer Networks
Electronic mail - Computer NetworksElectronic mail - Computer Networks
Electronic mail - Computer NetworksUmme Jamal
 
Email ppt
Email pptEmail ppt
Email pptmelgade
 

Was ist angesagt? (20)

Email
EmailEmail
Email
 
How Email Works
How Email WorksHow Email Works
How Email Works
 
Basic Email
Basic EmailBasic Email
Basic Email
 
Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp) Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp)
 
The Application Layer.ppt
The Application Layer.pptThe Application Layer.ppt
The Application Layer.ppt
 
Another one on Email...
Another one on Email...Another one on Email...
Another one on Email...
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocols
 
Imap(internet massege access protocaols)
Imap(internet massege access protocaols)Imap(internet massege access protocaols)
Imap(internet massege access protocaols)
 
Communication through internet.ppt
Communication through internet.pptCommunication through internet.ppt
Communication through internet.ppt
 
Electronic Mail
Electronic MailElectronic Mail
Electronic Mail
 
Ping-and-Traceroute.ppt
Ping-and-Traceroute.pptPing-and-Traceroute.ppt
Ping-and-Traceroute.ppt
 
Email security
Email securityEmail security
Email security
 
Preventions of Email Hacking
Preventions of Email HackingPreventions of Email Hacking
Preventions of Email Hacking
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
POP3 Post Office Protocol
POP3 Post Office ProtocolPOP3 Post Office Protocol
POP3 Post Office Protocol
 
How e mail works
How e mail worksHow e mail works
How e mail works
 
Email use in business ppt
Email use in business pptEmail use in business ppt
Email use in business ppt
 
Electronic mail - Computer Networks
Electronic mail - Computer NetworksElectronic mail - Computer Networks
Electronic mail - Computer Networks
 
Email etiquette
Email etiquetteEmail etiquette
Email etiquette
 
Email ppt
Email pptEmail ppt
Email ppt
 

Andere mochten auch

Implementation of secure email server in cloud environment copy1
Implementation of secure email server in cloud environment   copy1Implementation of secure email server in cloud environment   copy1
Implementation of secure email server in cloud environment copy1Solmaz Salehian
 
MPS_CV_MO_10-26-2015_Photograph_Signed_Highlighted
MPS_CV_MO_10-26-2015_Photograph_Signed_HighlightedMPS_CV_MO_10-26-2015_Photograph_Signed_Highlighted
MPS_CV_MO_10-26-2015_Photograph_Signed_HighlightedMichael Sherman
 
Fin de año
Fin de añoFin de año
Fin de añoPoleth13
 
Fabmeetup vol.23
Fabmeetup vol.23Fabmeetup vol.23
Fabmeetup vol.23esquisse
 
Email Marketing Tools
Email Marketing ToolsEmail Marketing Tools
Email Marketing ToolsAndrea Garcia
 
Bahasan 1 lingkup alat media pendidikan
Bahasan 1 lingkup alat media pendidikanBahasan 1 lingkup alat media pendidikan
Bahasan 1 lingkup alat media pendidikanstevialdyani7
 
Search Results in Alive Web Directory
Search Results in Alive Web DirectorySearch Results in Alive Web Directory
Search Results in Alive Web DirectoryYuri Thacker
 
Informatica aplicada
Informatica aplicadaInformatica aplicada
Informatica aplicadaAndreavimel
 
In Ukraine at that time there was no institutions that could provide complex ...
In Ukraine at that time there was no institutions that could provide complex ...In Ukraine at that time there was no institutions that could provide complex ...
In Ukraine at that time there was no institutions that could provide complex ...urii1969
 
Unidad educativa municipal oswaldo lombeyda
Unidad educativa municipal oswaldo lombeydaUnidad educativa municipal oswaldo lombeyda
Unidad educativa municipal oswaldo lombeydaPoleth13
 
Teaching international students
Teaching international studentsTeaching international students
Teaching international studentsEmma Kennedy
 
Influencia de las t.i.c en la gestion y reingenieria de procesos
Influencia de las t.i.c en la gestion y reingenieria de procesosInfluencia de las t.i.c en la gestion y reingenieria de procesos
Influencia de las t.i.c en la gestion y reingenieria de procesoskaty1694
 
Introdução à redes neurais artificiais
Introdução à redes neurais artificiaisIntrodução à redes neurais artificiais
Introdução à redes neurais artificiaisRobson Gomes
 
Student Engagement and Learning Needs: helping your students learn in the cla...
Student Engagement and Learning Needs: helping your students learn in the cla...Student Engagement and Learning Needs: helping your students learn in the cla...
Student Engagement and Learning Needs: helping your students learn in the cla...Emma Kennedy
 

Andere mochten auch (20)

Implementation of secure email server in cloud environment copy1
Implementation of secure email server in cloud environment   copy1Implementation of secure email server in cloud environment   copy1
Implementation of secure email server in cloud environment copy1
 
MPS_CV_MO_10-26-2015_Photograph_Signed_Highlighted
MPS_CV_MO_10-26-2015_Photograph_Signed_HighlightedMPS_CV_MO_10-26-2015_Photograph_Signed_Highlighted
MPS_CV_MO_10-26-2015_Photograph_Signed_Highlighted
 
Fin de año
Fin de añoFin de año
Fin de año
 
Fabmeetup vol.23
Fabmeetup vol.23Fabmeetup vol.23
Fabmeetup vol.23
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Tugas 1 kelompok 1
Tugas 1 kelompok 1Tugas 1 kelompok 1
Tugas 1 kelompok 1
 
Best Foods For Dry Skin
Best Foods For Dry SkinBest Foods For Dry Skin
Best Foods For Dry Skin
 
Email Marketing Tools
Email Marketing ToolsEmail Marketing Tools
Email Marketing Tools
 
Bahasan 1 lingkup alat media pendidikan
Bahasan 1 lingkup alat media pendidikanBahasan 1 lingkup alat media pendidikan
Bahasan 1 lingkup alat media pendidikan
 
Search Results in Alive Web Directory
Search Results in Alive Web DirectorySearch Results in Alive Web Directory
Search Results in Alive Web Directory
 
Informatica aplicada
Informatica aplicadaInformatica aplicada
Informatica aplicada
 
Tik kelompok 1(1)
Tik kelompok 1(1)Tik kelompok 1(1)
Tik kelompok 1(1)
 
In Ukraine at that time there was no institutions that could provide complex ...
In Ukraine at that time there was no institutions that could provide complex ...In Ukraine at that time there was no institutions that could provide complex ...
In Ukraine at that time there was no institutions that could provide complex ...
 
iX_POV_FinalDraft
iX_POV_FinalDraftiX_POV_FinalDraft
iX_POV_FinalDraft
 
Unidad educativa municipal oswaldo lombeyda
Unidad educativa municipal oswaldo lombeydaUnidad educativa municipal oswaldo lombeyda
Unidad educativa municipal oswaldo lombeyda
 
Teaching international students
Teaching international studentsTeaching international students
Teaching international students
 
Influencia de las t.i.c en la gestion y reingenieria de procesos
Influencia de las t.i.c en la gestion y reingenieria de procesosInfluencia de las t.i.c en la gestion y reingenieria de procesos
Influencia de las t.i.c en la gestion y reingenieria de procesos
 
Introdução à redes neurais artificiais
Introdução à redes neurais artificiaisIntrodução à redes neurais artificiais
Introdução à redes neurais artificiais
 
Storyboard presentation
Storyboard presentationStoryboard presentation
Storyboard presentation
 
Student Engagement and Learning Needs: helping your students learn in the cla...
Student Engagement and Learning Needs: helping your students learn in the cla...Student Engagement and Learning Needs: helping your students learn in the cla...
Student Engagement and Learning Needs: helping your students learn in the cla...
 

Ähnlich wie how email works

Ähnlich wie how email works (20)

retrieving the mail
retrieving the mailretrieving the mail
retrieving the mail
 
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLSMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - IT
 
Smtp, pop3, imapv 4
Smtp, pop3, imapv 4Smtp, pop3, imapv 4
Smtp, pop3, imapv 4
 
Email
EmailEmail
Email
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
window server 2008 mail configuration
window server 2008 mail configurationwindow server 2008 mail configuration
window server 2008 mail configuration
 
Ch22 system administration
Ch22 system administration Ch22 system administration
Ch22 system administration
 
Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit v
 
Mail server
Mail serverMail server
Mail server
 
Mail server
Mail serverMail server
Mail server
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
 
E mail flow
E mail flowE mail flow
E mail flow
 
E mail forensics
E mail forensicsE mail forensics
E mail forensics
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
 
SNMP/SMTP/MIME
SNMP/SMTP/MIMESNMP/SMTP/MIME
SNMP/SMTP/MIME
 
DSNs & X.400 assist in ensuring email reliability
DSNs & X.400 assist in ensuring email reliabilityDSNs & X.400 assist in ensuring email reliability
DSNs & X.400 assist in ensuring email reliability
 
DSNs & X.400 assist in ensuring email reliability
DSNs & X.400 assist in ensuring email reliabilityDSNs & X.400 assist in ensuring email reliability
DSNs & X.400 assist in ensuring email reliability
 

Kürzlich hochgeladen

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 

Kürzlich hochgeladen (20)

Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

how email works

  • 1. DATA COMMUNICATION TOPIC:THE WHY,WHAT AND HOW OF EMAIL Submitted by: SHRADHA KANODIA[1MS13IS102] VEERAVALLI HARIKA[1MS13IS121] M.S RAMAIAH INSTITUTE OF TECHNOLOGY
  • 2. What is Electronic Mail? • Electronic Mail - It is a facility that allows users to transmit messages across the Internet. • It is the most widely used application service offering a fast conventional method of transferring information. • It can accommodate large messages or voluminous memos. • It allows communication between groups or single individuals.
  • 5. Post Office Protocol Version 3 (POP3) • Post Office Protocol Version 3 has been the most popular protocol has been the most popular protocol used to transfer messages from a permanent mailbox to a local computer. • When the user invokes a POP3 client, it establishes a TCP connection and contacts a POP3 server on the mailbox computer. The user sends a login and a password to authenticate the session. If login was successful, the client sends commands to retrieve copies of messages and to delete messages from the permanent mailbox. • Both SMTP servers and POP3 servers must synchronize access to the mailbox.
  • 6. POP3 Commands • USER name: User name for authentication • PASS password: Password used for authentication • STAT: Get number and total size of message • LIST: [msg] get size of message • RETR: msg Send message to client • DELE: msg Delete message from mailbox • RSET: Cancel previous delete requests. • QUIT: Updates mailbox (deletes messages) and quits.
  • 7. Internet Message Access Protocol (IMAP) • An alternative to POP3 is IMAP version 4. It defines an abstraction known as a MAILBOX. Mailboxes are located on the same computer as a server. • IMAP4 is a method for accessing electronic mail messages that are kept on a mail server. It permits a client e-mail program to view and manipulate those messages. • Electronic mail stored on an IMAP server can be viewed or manipulated from a desktop computer at home, a notebook computer, or at a workstation. We can also say that mail messages can be accessed from multiple locations.
  • 8. What are the functions of IMAP4? Includes operations for: • creating mailboxes • deleting mailboxes • renaming mailboxes • checking for new messages • permanently removing messages • setting and clearing flags • searching • fetching of message attributes texts, and portions.
  • 9. • IMAP provides extended functionality for message retrieval and processing. • Users can obtain information about a message or examine header fields without retrieving the entire message. • Users can search for a specified string and retrieve portions of a message. This is useful for slow-speed dialup connections since they wont need to download useless information.
  • 10.
  • 12. Introduction to SMTP • The TCP/IP Protocol specifies a standard for the exchange of mail between machines. This standard specifies the exact format of messages a client on a single machine uses to transfer mail to a server on another. • This standard transfer protocol is known as the Simple Mail Transfer Protocol. (SMTP) The main objective of SMTP is to provide the reliability and efficiency of mail transfer.
  • 13. • SMTP basically focuses on how the underlying mail delivery system passes messages across an internet from machine to machine. • SMTP does not specify how the mail system accepts mail from a user or how the user interface presents messages.
  • 14. • An important feature of SMTP is "mail relaying." Mail relaying is SMTP's capability of transporting across networks. • Through SMTP, a process can transfer mail to another process using the same or other networks via a relay process accessible to both networks. • Mail messages can be passed through a number of intermediate relay or gateways hosts from sender to ultimate destination.
  • 15. Basic SMTP Design User File System Client SMTP Server SMTP File System
  • 16. OPERATION Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission. Although electronic mail servers and other mail transfer agents use SMTP to send and receive mail messages, user-level client mail applications typically use SMTP only for sending messages to a mail server for relaying. For receiving messages, client applications usually use either POP3 or IMAP. A message transfer agent receives mail from either another MTA, a mail submission agent (MSA), or a mail user agent (MUA). The transmission details are specified by the Simple Mail Transfer Protocol (SMTP). When a recipient mailbox of a message is not hosted locally, the message is relayed, that is, forwarded to another MTA.
  • 17. Every time an MTA receives an email message, it adds a received trace header field to the top of the header of the message,thereby building a sequential record of MTAs handling the message. The process of choosing a target MTA for the next hop is also described in SMTP, but can usually be overridden by configuring the MTA software with specific route
  • 19.
  • 20. Mail security and spoofing • SMTP is not a secure protocol. • A user may spoof, which means they may trick the protocol to send a message posing as someone else. • Usually a user will prove that they are authentic in the message body with a digital signature or SPF (sender policy framework) records. • SPF records work by telling people which machines you send email from, and if the sender is not one of those machines then they are lying. • If relay is on, no authentication possible. • Spam was a huge problem early on because early defaults had relay on and people didn't know how to turn it off.
  • 21. Scope of operation of SMTP servers • An SMTP server may refuse to accept mail for any operational or technical reason that makes sense to the site providing the server. • If sites take excessive advantage of the right to reject traffic, the ubiquity of email availability (one of the strengths of the Internet) will be threatened. • Considerable care should be taken and balance maintained if a site decides to be selective about the traffic it will accept and process. • In recent years, use of the relay function through arbitrary sites has been used as part of hostile efforts to hide the actual origins of mail. • Some sites have decided to limit the use of the relay function to known or identifiable sources, and implementations should provide the capability to perform this type of filtering. • When mail is rejected for these or other policy reasons, a 550 code should be used in response to EHLO, MAIL, or RCPT as appropriate.