SlideShare a Scribd company logo
1 of 22
Web Platform
Presented By
Priyanka Shinde (M - 3248)
What is a protocol after all?
 Protocol is a standard used to define a method of
exchanging data over a computer network such as local
area network, Internet, Intranet
 Protocols define how messages are sent and received, i.e.
the format and order of them, what happens when
messages are transmitted and received.
 Each protocol has its own method of how data is
formatted when sent and what to do with it once received,
how that data is compressed or how to check for errors in
data.
 The protocol can be implemented either in hardware or in
software.
Internet Protocol (IP)
It is a protocol by which data is sent from one
computer to another on the Internet.
Each computer (known as a host) on the Internet
has at least one IP address that uniquely
identifies it from all other computers on the
Internet.
When you send or receive data (for example, an
e-mail note or a Web page), the message gets
divided into little chunks called packets.
 Packets can arrive in a different order than the order they were
sent in. The Internet Protocol just delivers them. It's up to
another protocol, the Transmission Control Protocol (TCP) to
put them back in the right order.
 Each of these packets contains both the sender's Internet
address and the receiver's address
 Protocol version 4 (IPv4) standard that features IP addresses
four bytes (32 bits) in length.
 The newer Internet Protocol version 6 (IPv6) standard features
addresses 16 bytes (128 bits) in length.
Hypertext Transfer Protocol
(HTTP)
 HTTP is a set of standards that allow
users of the World Wide Web to
exchange information found on web
pages.
 The term HTTP was coined by Ted
Nelson
 HTTP commonly utilizes port 80, 8008,
or 8080
 When wanting to access any web page
enter http:// in front of the web
address, which tells the browser to
communicate over HTTP
Hypertext Transfer Protocol over
Secure (HTTPS)
 It is a secure method of accessing or sending information across
a web page.
 All data sent over HTTPS is encrypted before it is sent, this
prevents anyone from understanding that information if
intercepted.
 Because data is encrypted over HTTPS, it is slower than HTTP,
which is why HTTPS is only used when requiring login
information or with pages that contain sensitive information
such as an online bank web page.
 HTTPS uses port 443 to transfer its information.
 HTTPS is first used in HTTP/1.1
File Transfer Protocol (FTP)
File Transfer Protocol (FTP)
• Standard Internet protocol for transmitting files between
computers on the Internet.
• First proposed on April 16, 1971 by Abhay Bhushan
• Used to transfer Web page files from their creator to the
computer that acts as their server for everyone on the
Internet.
• It's also commonly used to download programs and other
files to your computer from other servers.
Contd…
• Your Web browser can also make FTP requests to
download programs you select from a Web page.
• Using FTP, you can also update (delete, rename,
move, and copy) files at a server.
• You need to logon to an FTP server.
• FTP is most commonly used to download a file
from a server using the Internet or to upload a file
to a server (e.g., uploading a Web page file to a
server).
Email Protocols
Interactions between email servers and
clients are governed by email protocols.
The most common email protocols are
POP - Post Office Protocol
IMAP - Internet Mail Access Protocol
SMTP - Simple Mail Transport Protocol
Post Office Protocol (POP3)
Most recent version of a standard protocol for
receiving e-mail.
Provides a simple, standardized way for users
to access mailboxes and download messages
to their computers.
When using the POP protocol all eMail
messages will be downloaded from the mail
server to your local computer
Most POP clients also provide an option to
leave copies of email on the server.
Advantage is that once messages are downloaded
you can cut the internet connection and read your
email at your leisure without incurring further
communication costs
protocol is built into most popular e-mail
products, such as Eudora and Outlook
Express.
It's also built into the Netscape and Microsoft
Internet Explorer browsers.
The conventional port number for POP3 is
110.
Internet Mail Access Protocol (IMAP)
 IMAP was developed at Stanford University in 1986
 Standard protocol for accessing e-mail from your local
server.
 The latest version, IMAP4, is similar to POP3 but
supports some additional features.
 For example, with IMAP4, you can search through
your e-mail messages for keywords while the
messages are still on mail server. You can then choose
which messages to download to your machine.
 Port - 143
Confused?????
Difference between POP3 & IMAP
IMAP POP3
It is a method of accessing
e-mail messages on a
server without having to
download them to your
local hard drive
POP3 requires users to
download messages to
their hard drive before
reading them
The advantage of using an IMAP mail server is that
users can check their mail from multiple computers
and always see the same messages.
This is because the messages stay on the server until
the user chooses to download them to his or her local
drive.
Simple Mail Transfer Protocol
(SMTP)
 SMTP was created in the early 1980's
 used by the Mail Transfer Agent (MTA) to deliver your eMail to the
recipient's mail server.
 only be used to send emails, not to receive them.
 This is why you need to specify both the POP or IMAP server and
the SMTP server when you configure your e-mail application.
 SMTP usually is implemented to operate over Internet port 25.
 An alternative to SMTP that is widely used in Europe is X.400.
 Many mail servers now support Extended Simple Mail Transfer
Protocol (ESMTP), which allows multimedia files to be delivered as
e-mail.
Multipurpose Internet Mail
Extensions (MIME)
Multipurpose Internet Mail
Extensions (MIME)
 MIME was defined in 1992 by the Internet Engineering Task
Force (IETF)
 Many e-mail clients now support MIME, which enables them to
send and receive graphics, audio, and video files via the
Internet mail system.
 There are many predefined MIME types, such as GIF graphics
files and PostScript files.
 In addition, MIME supports messages in character sets other
than ASCII.
 A new version, called S/MIME, supports encrypted messages.
Information on protocols-email protocols

More Related Content

What's hot

Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Zakirul Islam
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet ProtocolsAnil Neupane
 
Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp) Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp) RochakSrivastava3
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udprahul kundu
 
Network News Transfer Protocol
Network News Transfer ProtocolNetwork News Transfer Protocol
Network News Transfer ProtocolDaniyal Khan
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)Kruti Niranjan
 
Introduction to MQTT
Introduction to MQTTIntroduction to MQTT
Introduction to MQTTEMQ
 
File transfer protocol
File transfer protocolFile transfer protocol
File transfer protocolVipin Rai
 
Mail POP vs IMAP
Mail POP vs IMAPMail POP vs IMAP
Mail POP vs IMAPjrock2004
 
Transmission control protocol
Transmission control protocolTransmission control protocol
Transmission control protocolSundra Anand
 
MQTT - A practical protocol for the Internet of Things
MQTT - A practical protocol for the Internet of ThingsMQTT - A practical protocol for the Internet of Things
MQTT - A practical protocol for the Internet of ThingsBryan Boyd
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)NetProtocol Xpert
 
What Is User Datagram Protocol?
What Is User Datagram Protocol?What Is User Datagram Protocol?
What Is User Datagram Protocol?Simplilearn
 
FTP - File Transfer Protocol
FTP - File Transfer ProtocolFTP - File Transfer Protocol
FTP - File Transfer ProtocolPeter R. Egli
 

What's hot (20)

pop3-imap.ppt
pop3-imap.pptpop3-imap.ppt
pop3-imap.ppt
 
Rip presentation
Rip presentationRip presentation
Rip presentation
 
Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3Protocol layer,OSI model & POP3
Protocol layer,OSI model & POP3
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp) Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp)
 
POP3 Post Office Protocol
POP3 Post Office ProtocolPOP3 Post Office Protocol
POP3 Post Office Protocol
 
Introduction of tcp, ip & udp
Introduction of tcp, ip & udpIntroduction of tcp, ip & udp
Introduction of tcp, ip & udp
 
Network News Transfer Protocol
Network News Transfer ProtocolNetwork News Transfer Protocol
Network News Transfer Protocol
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
Introduction to MQTT
Introduction to MQTTIntroduction to MQTT
Introduction to MQTT
 
File transfer protocol
File transfer protocolFile transfer protocol
File transfer protocol
 
E mail protocols
E mail protocolsE mail protocols
E mail protocols
 
Mail POP vs IMAP
Mail POP vs IMAPMail POP vs IMAP
Mail POP vs IMAP
 
Transmission control protocol
Transmission control protocolTransmission control protocol
Transmission control protocol
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
 
Bgp protocol
Bgp protocolBgp protocol
Bgp protocol
 
MQTT - A practical protocol for the Internet of Things
MQTT - A practical protocol for the Internet of ThingsMQTT - A practical protocol for the Internet of Things
MQTT - A practical protocol for the Internet of Things
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 
What Is User Datagram Protocol?
What Is User Datagram Protocol?What Is User Datagram Protocol?
What Is User Datagram Protocol?
 
FTP - File Transfer Protocol
FTP - File Transfer ProtocolFTP - File Transfer Protocol
FTP - File Transfer Protocol
 

Viewers also liked

Email ppt
Email pptEmail ppt
Email pptmelgade
 
Mime powerpointt
Mime powerpointt Mime powerpointt
Mime powerpointt Zara
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocolguest029bcd
 
E Mail Ppt
E Mail PptE Mail Ppt
E Mail Pptkevpatel
 
Security consideration with e commerce
Security consideration with e commerceSecurity consideration with e commerce
Security consideration with e commerceStudsPlanet.com
 
E mail transfer .74
E mail transfer .74E mail transfer .74
E mail transfer .74myrajendra
 
N-tier Application Developement
N-tier Application DevelopementN-tier Application Developement
N-tier Application DevelopementDetectivee Mirza
 
Tier 1, 2 and 3 Capital based on the Basel II accord
Tier 1, 2 and 3 Capital based on the Basel II accordTier 1, 2 and 3 Capital based on the Basel II accord
Tier 1, 2 and 3 Capital based on the Basel II accordNahid Anjum
 
Web page analysis
Web page analysisWeb page analysis
Web page analysisibz10
 
E-Mail - Technical Overview
E-Mail - Technical OverviewE-Mail - Technical Overview
E-Mail - Technical OverviewVenkatesh Iyer
 
Computer Concepts Unit A PPT Lecture
Computer Concepts Unit A PPT LectureComputer Concepts Unit A PPT Lecture
Computer Concepts Unit A PPT Lecturewsbaker
 
Bandwidth Presentation
Bandwidth PresentationBandwidth Presentation
Bandwidth PresentationGrace=] Penda
 
Differences Between Architectures
Differences Between ArchitecturesDifferences Between Architectures
Differences Between Architecturesprasadsmn
 

Viewers also liked (20)

Smtp, pop3, imapv 4
Smtp, pop3, imapv 4Smtp, pop3, imapv 4
Smtp, pop3, imapv 4
 
Email ppt
Email pptEmail ppt
Email ppt
 
Mime powerpointt
Mime powerpointt Mime powerpointt
Mime powerpointt
 
Mime
MimeMime
Mime
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
E Mail Ppt
E Mail PptE Mail Ppt
E Mail Ppt
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Online Marketing PPT
Online Marketing PPTOnline Marketing PPT
Online Marketing PPT
 
POP3
POP3POP3
POP3
 
Security consideration with e commerce
Security consideration with e commerceSecurity consideration with e commerce
Security consideration with e commerce
 
E mail transfer .74
E mail transfer .74E mail transfer .74
E mail transfer .74
 
N-tier Application Developement
N-tier Application DevelopementN-tier Application Developement
N-tier Application Developement
 
How email works
How email worksHow email works
How email works
 
Tier 1, 2 and 3 Capital based on the Basel II accord
Tier 1, 2 and 3 Capital based on the Basel II accordTier 1, 2 and 3 Capital based on the Basel II accord
Tier 1, 2 and 3 Capital based on the Basel II accord
 
Web page analysis
Web page analysisWeb page analysis
Web page analysis
 
Mime presentation
Mime presentationMime presentation
Mime presentation
 
E-Mail - Technical Overview
E-Mail - Technical OverviewE-Mail - Technical Overview
E-Mail - Technical Overview
 
Computer Concepts Unit A PPT Lecture
Computer Concepts Unit A PPT LectureComputer Concepts Unit A PPT Lecture
Computer Concepts Unit A PPT Lecture
 
Bandwidth Presentation
Bandwidth PresentationBandwidth Presentation
Bandwidth Presentation
 
Differences Between Architectures
Differences Between ArchitecturesDifferences Between Architectures
Differences Between Architectures
 

Similar to Information on protocols-email protocols

network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinitashach22
 
Ways to-access-inetrnet-
Ways to-access-inetrnet-Ways to-access-inetrnet-
Ways to-access-inetrnet-markgernale24
 
Introduction to internet.
Introduction to internet.Introduction to internet.
Introduction to internet.Anish Thomas
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityManishKumarH
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To InternetMohit Dhankher
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsHimanshu Pathak
 
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfTCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfanjaniar7gallery
 
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSSWeb Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSSKajal Singh
 
Internet tools and services
Internet tools and servicesInternet tools and services
Internet tools and serviceslearnt
 
Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)IMRAN KHAN
 

Similar to Information on protocols-email protocols (20)

network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Ways to-access-inetrnet-
Ways to-access-inetrnet-Ways to-access-inetrnet-
Ways to-access-inetrnet-
 
Introduction to internet.
Introduction to internet.Introduction to internet.
Introduction to internet.
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To Internet
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
 
Network Protocols
Network ProtocolsNetwork Protocols
Network Protocols
 
Protocols
ProtocolsProtocols
Protocols
 
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfTCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
 
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSSWeb Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
 
application layer
application layerapplication layer
application layer
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Internet tools and services
Internet tools and servicesInternet tools and services
Internet tools and services
 
Web protocol.pptx
Web protocol.pptxWeb protocol.pptx
Web protocol.pptx
 
Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)
 
Tcp
TcpTcp
Tcp
 

Recently uploaded

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Information on protocols-email protocols

  • 2. What is a protocol after all?  Protocol is a standard used to define a method of exchanging data over a computer network such as local area network, Internet, Intranet  Protocols define how messages are sent and received, i.e. the format and order of them, what happens when messages are transmitted and received.  Each protocol has its own method of how data is formatted when sent and what to do with it once received, how that data is compressed or how to check for errors in data.  The protocol can be implemented either in hardware or in software.
  • 3. Internet Protocol (IP) It is a protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet. When you send or receive data (for example, an e-mail note or a Web page), the message gets divided into little chunks called packets.
  • 4.  Packets can arrive in a different order than the order they were sent in. The Internet Protocol just delivers them. It's up to another protocol, the Transmission Control Protocol (TCP) to put them back in the right order.  Each of these packets contains both the sender's Internet address and the receiver's address  Protocol version 4 (IPv4) standard that features IP addresses four bytes (32 bits) in length.  The newer Internet Protocol version 6 (IPv6) standard features addresses 16 bytes (128 bits) in length.
  • 5. Hypertext Transfer Protocol (HTTP)  HTTP is a set of standards that allow users of the World Wide Web to exchange information found on web pages.  The term HTTP was coined by Ted Nelson  HTTP commonly utilizes port 80, 8008, or 8080  When wanting to access any web page enter http:// in front of the web address, which tells the browser to communicate over HTTP
  • 6. Hypertext Transfer Protocol over Secure (HTTPS)  It is a secure method of accessing or sending information across a web page.  All data sent over HTTPS is encrypted before it is sent, this prevents anyone from understanding that information if intercepted.  Because data is encrypted over HTTPS, it is slower than HTTP, which is why HTTPS is only used when requiring login information or with pages that contain sensitive information such as an online bank web page.  HTTPS uses port 443 to transfer its information.  HTTPS is first used in HTTP/1.1
  • 8. File Transfer Protocol (FTP) • Standard Internet protocol for transmitting files between computers on the Internet. • First proposed on April 16, 1971 by Abhay Bhushan • Used to transfer Web page files from their creator to the computer that acts as their server for everyone on the Internet. • It's also commonly used to download programs and other files to your computer from other servers.
  • 9. Contd… • Your Web browser can also make FTP requests to download programs you select from a Web page. • Using FTP, you can also update (delete, rename, move, and copy) files at a server. • You need to logon to an FTP server. • FTP is most commonly used to download a file from a server using the Internet or to upload a file to a server (e.g., uploading a Web page file to a server).
  • 10. Email Protocols Interactions between email servers and clients are governed by email protocols. The most common email protocols are POP - Post Office Protocol IMAP - Internet Mail Access Protocol SMTP - Simple Mail Transport Protocol
  • 12. Most recent version of a standard protocol for receiving e-mail. Provides a simple, standardized way for users to access mailboxes and download messages to their computers. When using the POP protocol all eMail messages will be downloaded from the mail server to your local computer Most POP clients also provide an option to leave copies of email on the server.
  • 13. Advantage is that once messages are downloaded you can cut the internet connection and read your email at your leisure without incurring further communication costs protocol is built into most popular e-mail products, such as Eudora and Outlook Express. It's also built into the Netscape and Microsoft Internet Explorer browsers. The conventional port number for POP3 is 110.
  • 14. Internet Mail Access Protocol (IMAP)
  • 15.  IMAP was developed at Stanford University in 1986  Standard protocol for accessing e-mail from your local server.  The latest version, IMAP4, is similar to POP3 but supports some additional features.  For example, with IMAP4, you can search through your e-mail messages for keywords while the messages are still on mail server. You can then choose which messages to download to your machine.  Port - 143
  • 17. Difference between POP3 & IMAP IMAP POP3 It is a method of accessing e-mail messages on a server without having to download them to your local hard drive POP3 requires users to download messages to their hard drive before reading them The advantage of using an IMAP mail server is that users can check their mail from multiple computers and always see the same messages. This is because the messages stay on the server until the user chooses to download them to his or her local drive.
  • 18. Simple Mail Transfer Protocol (SMTP)
  • 19.  SMTP was created in the early 1980's  used by the Mail Transfer Agent (MTA) to deliver your eMail to the recipient's mail server.  only be used to send emails, not to receive them.  This is why you need to specify both the POP or IMAP server and the SMTP server when you configure your e-mail application.  SMTP usually is implemented to operate over Internet port 25.  An alternative to SMTP that is widely used in Europe is X.400.  Many mail servers now support Extended Simple Mail Transfer Protocol (ESMTP), which allows multimedia files to be delivered as e-mail.
  • 21. Multipurpose Internet Mail Extensions (MIME)  MIME was defined in 1992 by the Internet Engineering Task Force (IETF)  Many e-mail clients now support MIME, which enables them to send and receive graphics, audio, and video files via the Internet mail system.  There are many predefined MIME types, such as GIF graphics files and PostScript files.  In addition, MIME supports messages in character sets other than ASCII.  A new version, called S/MIME, supports encrypted messages.