Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

E mail systems

1,994 views

Published on

  • Be the first to comment

E mail systems

  1. 1. Presentation on How Email Works Presenters: Candy Sikand Jyoti Karwal Vishav Khajuria
  2. 2. Table of Contents <ul><li>Origin of Email </li></ul><ul><li>Email Basics </li></ul><ul><li>Email Format </li></ul><ul><li>How Email Works </li></ul><ul><li>Protocols </li></ul><ul><li>Snail mail vs. Email </li></ul><ul><li>Uses of Email </li></ul><ul><li>Problems with Email </li></ul>
  3. 3. Contd…… <ul><li>Various Email Service Providers </li></ul><ul><li>Conclusion </li></ul>
  4. 4. Origin of Email <ul><li>Host Based Email System </li></ul><ul><li>Lan Based Email System </li></ul><ul><li>Attempts of interoperability </li></ul><ul><li>The rise of ARPANET mail </li></ul>
  5. 5. Email Basics <ul><li>What is an Email </li></ul><ul><li>Can be as simple as a few lines of text, or include attachments such as pictures or documents. </li></ul><ul><li>Email made up 75% of network traffic soon after the introduction of the internet. </li></ul>
  6. 6. Email Format <ul><li>Message Header </li></ul><ul><li>Message Body </li></ul>
  7. 7. Message Header <ul><li>From </li></ul><ul><li>To </li></ul><ul><li>Subject </li></ul><ul><li>Date </li></ul><ul><li>MessageID </li></ul>
  8. 8. Message Body <ul><li>Content Encoding </li></ul><ul><li>Plain text and HTML </li></ul>
  9. 9. How Email Works A.Sender creates and sends an email B.Sender's MDA/MTA routes the email C : Network Cloud D: Email Queue E: MTA to MTA Transfer F: Firewalls, Spam and Virus Filters
  10. 10. Contd….. <ul><li>Different Architectural Models exist for constructing computer systems. </li></ul><ul><li>Some models include: </li></ul><ul><ul><li>Peer-Peer </li></ul></ul><ul><ul><li>Client-Server </li></ul></ul>
  11. 11. Contd…….. <ul><li>The model that works best for email is the Client-Server model. </li></ul><ul><li>Clients carry out user interactions with the email server. </li></ul>
  12. 12. Snail mail vs. Email <ul><li>Speed of Delievery </li></ul><ul><li>Composing of Letters </li></ul><ul><li>Cost </li></ul>
  13. 13. Protocols used <ul><li>IMAP </li></ul><ul><li>POP3 </li></ul><ul><li>SMTP </li></ul>
  14. 14. Uses of Email <ul><li>In society </li></ul><ul><li>-Flaming </li></ul><ul><li>-Email Bankruptcy </li></ul><ul><li>In Business </li></ul><ul><li>-Problem of Logistics </li></ul><ul><li>-Problem of Synchronisation </li></ul>
  15. 15. Problems with Email <ul><li>Loss of context </li></ul><ul><li>Information Overload </li></ul><ul><li>Inconsistency </li></ul><ul><li>Attachment filesize limitation </li></ul><ul><li>Information Overload </li></ul><ul><li>Spamming and Computer Viruses </li></ul><ul><li>Email Spoofing </li></ul><ul><li>Email Bombing </li></ul>
  16. 16. Contd….. <ul><li>Privacy Concerns </li></ul><ul><li>-e-mail messages are generally not encrypted. </li></ul><ul><li>-e-mail messages have to go through </li></ul><ul><li> intermediate computers . </li></ul><ul><li>-many Internet Service Providers (ISP) store </li></ul><ul><li> copies of e-mail messages on their mail servers. </li></ul>

×