SlideShare a Scribd company logo
Application Layer
Service:
Electronic Mail
Architecture
First Scenario
Simplest
Second Scenario
More Complex
Third Scenario
More Complex
Fourth Scenario
Most common in the exchange of
email
Software application that
allows user to read ,compose
and send email.It also handles
mailboxes.
Software application that
transport,deliver and
forward email.
Protocol used to retrieving
incoming mails from local
servers.
In the first scenario, the sender and the receiver of the email are users (or
application programs) on the same system
In the second scenario, the sender and the receiver of the email are
users (or application programs) on two different systems.
In the third scenario,when the sender is connected to the mail server via a
LAN or a WAN,we need two UAs and two pairs of MTAs (client and
server).
In the fourth scenario,when both the sender and receiver is connected to the mail
server via a LAN or a WAN, we need two UAs, two pairs of MTAs and a pair of
MAAs.
Push and Pull in electronic email
Services of User Agent
A user agent
helps the user
compose the e-
mail message to
be sent out.
A user agent read the
incoming messages.
Each email contains
the following fields.
number field, sender,
size of the message,
a flag, subject field
(optional).
After reading a
message, a user can
use the user agent to
reply to a message
to the original
sender or to reply to
all recipients of the
message..
Forwarding is
defined as
sending the
message to a
third party.
Managing
mailbox like
archive a
message or
mark as spam.
● Command-Driven ● GUI-Based Modem
User Agent Types
A command-driven user agent
normally accepts a one-
character command from the
keyboard to perform its task.
Some examples of command-driven
user agents are mail, pine, and
elm.
They contain graphical-user
interface (GUI)components that
allow the user to interact with the
software by using both the keyboard
and the mouse.
Some examples of GUI-based user
agents are Eudora, Microsoft's
Outlook, and Netscape.
Format of an e-mail and e-
mail address
Multipurpose Internet Mail Extensions MIME
Multipurpose Internet Mail Extensions is a standard to expand limited
capabilities of e-mail.It allows the users to exchange different kinds of data files on
the Internet: audio, video, images, application programs as well.
Features of MIME –
1. It is able to send multiple attachments with a single message.
2. Unlimited message length.
3. Binary attachments (executables, images, audio, or video files) which may be divided if
needed.
4. MIME provided support for varying content types and multi-part messages.
Working of MIME
MIME header
MIME header is basically inserted at the beginning of any e-mail transfer.
Message Transfer Agent: SMTP
The formal protocol that defines the MTA client and server in the Internet is called the Simple
Mail Transfer Protocol (SMTP). Two pairs of MTA client/server programs are used in the
most common situation (fourth scenario).
Commands and Responses
Command
format
SMTP uses commands and responses to transfer messages between an
MTA client and an MTA server.
Commands Response
Message Access Protocols
Currently two message access protocols are available:
1) Post Office Protocol, version 3 (POP3)
2) Internet Mail Access Protocol, version 4 (IMAP4).
Presentation By:
Amisha Sahu

More Related Content

What's hot

Lexical analysis - Compiler Design
Lexical analysis - Compiler DesignLexical analysis - Compiler Design
Lexical analysis - Compiler Design
Muhammed Afsal Villan
 
Php Simple Xml
Php Simple XmlPhp Simple Xml
Php Simple Xmlmussawir20
 
Components of client server application
Components of client server applicationComponents of client server application
Components of client server application
Ashwin Ananthapadmanabhan
 
Transport layer
Transport layerTransport layer
Transport layer
reshmadayma
 
Applets
AppletsApplets
two tier and three tier
two tier and three tiertwo tier and three tier
two tier and three tier
Kashafnaz2
 
Training report on web developing
Training report on web developingTraining report on web developing
Training report on web developing
Jawhar Ali
 
HTTP request and response
HTTP request and responseHTTP request and response
HTTP request and response
Sahil Agarwal
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
JAIGANESH SEKAR
 
web communication protocols in IoT
web communication protocols in IoTweb communication protocols in IoT
web communication protocols in IoT
FabMinds
 
Web and http computer network
Web and http computer networkWeb and http computer network
Web and http computer network
Anil Pokhrel
 
Finite automata-for-lexical-analysis
Finite automata-for-lexical-analysisFinite automata-for-lexical-analysis
Finite automata-for-lexical-analysis
Dattatray Gandhmal
 
Domain name system
Domain name systemDomain name system
Domain name system
Siddique Ibrahim
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
guest029bcd
 
Performance analysis(Time & Space Complexity)
Performance analysis(Time & Space Complexity)Performance analysis(Time & Space Complexity)
Performance analysis(Time & Space Complexity)
swapnac12
 
Servlets
ServletsServlets
Application layer
Application layerApplication layer
Application layer
reshmadayma
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
Bushra M
 
Telnet
TelnetTelnet

What's hot (20)

Lexical analysis - Compiler Design
Lexical analysis - Compiler DesignLexical analysis - Compiler Design
Lexical analysis - Compiler Design
 
Php Simple Xml
Php Simple XmlPhp Simple Xml
Php Simple Xml
 
Components of client server application
Components of client server applicationComponents of client server application
Components of client server application
 
Transport layer
Transport layerTransport layer
Transport layer
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Applets
AppletsApplets
Applets
 
two tier and three tier
two tier and three tiertwo tier and three tier
two tier and three tier
 
Training report on web developing
Training report on web developingTraining report on web developing
Training report on web developing
 
HTTP request and response
HTTP request and responseHTTP request and response
HTTP request and response
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
web communication protocols in IoT
web communication protocols in IoTweb communication protocols in IoT
web communication protocols in IoT
 
Web and http computer network
Web and http computer networkWeb and http computer network
Web and http computer network
 
Finite automata-for-lexical-analysis
Finite automata-for-lexical-analysisFinite automata-for-lexical-analysis
Finite automata-for-lexical-analysis
 
Domain name system
Domain name systemDomain name system
Domain name system
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Performance analysis(Time & Space Complexity)
Performance analysis(Time & Space Complexity)Performance analysis(Time & Space Complexity)
Performance analysis(Time & Space Complexity)
 
Servlets
ServletsServlets
Servlets
 
Application layer
Application layerApplication layer
Application layer
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Telnet
TelnetTelnet
Telnet
 

Similar to Application layer protocol - Electronic Mail

Electronic Mail.ppt
Electronic Mail.pptElectronic Mail.ppt
Electronic Mail.ppt
MRMATHSACADEMY1
 
CN
CNCN
CN
sowfi
 
Email
EmailEmail
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAILTECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
IJNSA Journal
 
Email forensic
Email forensic Email forensic
Email forensic
Sakib Khan
 
Higher level internet protocols (ppt)
Higher level internet protocols (ppt)Higher level internet protocols (ppt)
Higher level internet protocols (ppt)
Jv Christian Olvida
 
Application layer
Application layerApplication layer
Application layer
AnithaRaj31
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
YouTubeCONTRA
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transfer
Serious_SamSoul
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
Kathirvel Ayyaswamy
 
Mail server using Linux(Ubuntu)
Mail server using Linux(Ubuntu)Mail server using Linux(Ubuntu)
Mail server using Linux(Ubuntu)
Navjot Navi
 
Application Layer
Application LayerApplication Layer
Application Layer
Sweta Kumari Barnwal
 
Presentation client mail_Android
Presentation client mail_AndroidPresentation client mail_Android
Presentation client mail_Android
Mejri Hassen
 
Internet.ppt
Internet.pptInternet.ppt
Internet.ppt
Yesan Sellan
 
Working of Email_services
Working of Email_services Working of Email_services
Working of Email_services
Sabin dumre
 

Similar to Application layer protocol - Electronic Mail (20)

Electronic Mail.ppt
Electronic Mail.pptElectronic Mail.ppt
Electronic Mail.ppt
 
CN
CNCN
CN
 
Email
EmailEmail
Email
 
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAILTECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
 
Email forensic
Email forensic Email forensic
Email forensic
 
Email
EmailEmail
Email
 
Cn u5
Cn u5Cn u5
Cn u5
 
Higher level internet protocols (ppt)
Higher level internet protocols (ppt)Higher level internet protocols (ppt)
Higher level internet protocols (ppt)
 
Application layer
Application layerApplication layer
Application layer
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
 
How email works
How email worksHow email works
How email works
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transfer
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Mail server using Linux(Ubuntu)
Mail server using Linux(Ubuntu)Mail server using Linux(Ubuntu)
Mail server using Linux(Ubuntu)
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Presentation client mail_Android
Presentation client mail_AndroidPresentation client mail_Android
Presentation client mail_Android
 
Email Client Server System
Email Client Server SystemEmail Client Server System
Email Client Server System
 
Internet.ppt
Internet.pptInternet.ppt
Internet.ppt
 
Email
EmailEmail
Email
 
Working of Email_services
Working of Email_services Working of Email_services
Working of Email_services
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Application layer protocol - Electronic Mail

  • 2. Architecture First Scenario Simplest Second Scenario More Complex Third Scenario More Complex Fourth Scenario Most common in the exchange of email
  • 3. Software application that allows user to read ,compose and send email.It also handles mailboxes. Software application that transport,deliver and forward email. Protocol used to retrieving incoming mails from local servers.
  • 4. In the first scenario, the sender and the receiver of the email are users (or application programs) on the same system
  • 5. In the second scenario, the sender and the receiver of the email are users (or application programs) on two different systems.
  • 6. In the third scenario,when the sender is connected to the mail server via a LAN or a WAN,we need two UAs and two pairs of MTAs (client and server).
  • 7. In the fourth scenario,when both the sender and receiver is connected to the mail server via a LAN or a WAN, we need two UAs, two pairs of MTAs and a pair of MAAs.
  • 8. Push and Pull in electronic email
  • 9. Services of User Agent A user agent helps the user compose the e- mail message to be sent out. A user agent read the incoming messages. Each email contains the following fields. number field, sender, size of the message, a flag, subject field (optional). After reading a message, a user can use the user agent to reply to a message to the original sender or to reply to all recipients of the message.. Forwarding is defined as sending the message to a third party. Managing mailbox like archive a message or mark as spam.
  • 10. ● Command-Driven ● GUI-Based Modem User Agent Types A command-driven user agent normally accepts a one- character command from the keyboard to perform its task. Some examples of command-driven user agents are mail, pine, and elm. They contain graphical-user interface (GUI)components that allow the user to interact with the software by using both the keyboard and the mouse. Some examples of GUI-based user agents are Eudora, Microsoft's Outlook, and Netscape.
  • 11. Format of an e-mail and e- mail address
  • 12. Multipurpose Internet Mail Extensions MIME Multipurpose Internet Mail Extensions is a standard to expand limited capabilities of e-mail.It allows the users to exchange different kinds of data files on the Internet: audio, video, images, application programs as well. Features of MIME – 1. It is able to send multiple attachments with a single message. 2. Unlimited message length. 3. Binary attachments (executables, images, audio, or video files) which may be divided if needed. 4. MIME provided support for varying content types and multi-part messages.
  • 14. MIME header MIME header is basically inserted at the beginning of any e-mail transfer.
  • 15. Message Transfer Agent: SMTP The formal protocol that defines the MTA client and server in the Internet is called the Simple Mail Transfer Protocol (SMTP). Two pairs of MTA client/server programs are used in the most common situation (fourth scenario).
  • 16. Commands and Responses Command format SMTP uses commands and responses to transfer messages between an MTA client and an MTA server.
  • 18. Message Access Protocols Currently two message access protocols are available: 1) Post Office Protocol, version 3 (POP3) 2) Internet Mail Access Protocol, version 4 (IMAP4).