SlideShare a Scribd company logo
1 of 14
M. DHARANI M.SC (CS),
NADAR SARASWATHI COLLEGE OF
ARTS AND SCIENCE, THENI
EMAIL AND TELNET
INDEX
 DEFINTION
 USER AGENT
 SENDING MAIL
 RECEIVING MAIL
 ADDRESS
 MAILING LIST OR GROUP LIST
 SECURITY
 TELNET DEFINITON
 LOCAL VERSUS REMOTE LOGGING
 NETWORK VIRTUAL TERMINAL
 USER INTERFACE
DEFFINTION
Electronic mail allows user to exchange
message .
In an application such us HTTP or FTP,
the server program is running all the
time, waiting for a request from a
client.
There is a request and there is a
response.
First email is considered a one-way
transaction
USER AGENT
The first components of a electronic
mail system is the user agent (UA) .
A user agent is a software package
(program) that composes , reads ,
replies to, and forward message.
There are two types of user agent,
1. command- driven
2. GUI based
SENDING MAIL
 To send mail, the user , through the
UA, creates mail that looks very similar
to postal mail.
The envelope usually contains the
sender address, the receiver address
and other information.
 The message contains the header and
body.
The body of the message contains the
actual information to be read by the
RECEIVING MAIL
 The user agent is triggered by the user.
 If a user has mail, the UA informs the
user with a notices.
 If the user is ready to read the
information, a list is displayed in which
each lines contains the summary of
information about a particular message
in the mail box.
 In the user can select any of the
message and display it contains on
ADDRESSES
 To deliver mail, a mail handling system
must use an addressing system with
unique addresses.
 The addresses consists of two parts,
1. local part
2. Domain name
 The domain name assigned to each mail
exchanger either comes from the DNS
at database.
MAILING LIST OF GROUPING
LIST
 Electronic mail allows one name, an alias
to represents, several different email
address .
 This is called mailing list or grouping
list.
 Every time a message is to be send ,
the system check the recipients name
against the alias database.
EMAIL SECURITY
 The protocol does not provide any
security provisions per second.
 However, the email exchange can be
secure using to application layer
security design is particular for email
system.
 Two protocols,
1. Pretty good privacy (PGP)
2. secure / multi purpose internet
mail extensions ( S /MIME)
TELNET
 A server program can provide a specific
service to its corresponding client
program.
 TELNET FOR TWO REASONS:
 The simple plaintext architecture of
telnet allows as to explain the issues
and challenges related to the concept
of remote logging.
 Network administration of an use telnet
for diagnostic and debugging purposes.
LOCAL VERSUS REMOTE
LOGGING
 When a user logs into a local system, its
is called local logging.
 The terminal drives the process the
character to the operating system.
 The operating system turn , interprets
the combination of character and
invokes the design application program
or utility.
NETWORK VIRTUAL
TERMINAL (NVL)
 The mechanism to access a remote
computer is complex .
 We are dealing with heterogeneous
system.
 The server telnet on the other hand
translate data and commands from
NVT form into the form acceptable
by the remote computer.
USER INTERFACE
 The Operating system ( UNIX, FOR
EXAMPLE ) Defines and interface with
user- friendly command.
 OPEN -- connect to a remote computer
 CLOSE – close the connection
 DISPLAY – show the operating
parameters
 MODE – change to line or character
mode
 QUIT – To exit telnet
THANK YOU !!!

More Related Content

What's hot

Mail Server Project Report
Mail Server Project ReportMail Server Project Report
Mail Server Project Report
Kavita Sharma
 
ICC Abstract Doument_English Rev.2
ICC Abstract Doument_English Rev.2ICC Abstract Doument_English Rev.2
ICC Abstract Doument_English Rev.2
Mohammad Chamanpara
 

What's hot (20)

How Email Works
How Email WorksHow Email Works
How Email Works
 
Email forensic
Email forensic Email forensic
Email forensic
 
Mail Server Project Report
Mail Server Project ReportMail Server Project Report
Mail Server Project Report
 
Lesson4.7 u4 l2 network redundancy
Lesson4.7 u4 l2 network redundancyLesson4.7 u4 l2 network redundancy
Lesson4.7 u4 l2 network redundancy
 
OTechs Mail system proposal
OTechs Mail system proposalOTechs Mail system proposal
OTechs Mail system proposal
 
Working of Email_services
Working of Email_services Working of Email_services
Working of Email_services
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Android components by sai gopi
Android components by sai gopiAndroid components by sai gopi
Android components by sai gopi
 
Lesson4.9 b u4l3 ip addresses
Lesson4.9 b u4l3 ip addressesLesson4.9 b u4l3 ip addresses
Lesson4.9 b u4l3 ip addresses
 
Chapter3
Chapter3Chapter3
Chapter3
 
Email - Electronic Mail
Email - Electronic MailEmail - Electronic Mail
Email - Electronic Mail
 
Class Note 01
Class Note 01Class Note 01
Class Note 01
 
Electronic Mail
Electronic MailElectronic Mail
Electronic Mail
 
Email
EmailEmail
Email
 
ICC Abstract Doument_English Rev.2
ICC Abstract Doument_English Rev.2ICC Abstract Doument_English Rev.2
ICC Abstract Doument_English Rev.2
 
Client server chat application
Client server chat applicationClient server chat application
Client server chat application
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
The Fundamental of Electronic Mail (E-mail)
The Fundamental of Electronic Mail (E-mail)The Fundamental of Electronic Mail (E-mail)
The Fundamental of Electronic Mail (E-mail)
 
Email security
Email securityEmail security
Email security
 
Class Note 02
Class Note 02Class Note 02
Class Note 02
 

Similar to CN

TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAILTECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
IJNSA Journal
 
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docxRunning header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
jeffsrosalyn
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
YouTubeCONTRA
 
Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And Disadvantages
Renee Jones
 

Similar to CN (20)

TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAILTECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
 
Application layer protocol - Electronic Mail
Application layer protocol - Electronic MailApplication layer protocol - Electronic Mail
Application layer protocol - Electronic Mail
 
Intranet Messaging Project Report -phpapp02
Intranet Messaging Project Report -phpapp02Intranet Messaging Project Report -phpapp02
Intranet Messaging Project Report -phpapp02
 
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSSWeb Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docxRunning header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
Running header EMAIL FORENSICSEMAIL FORENSICSEmail Forens.docx
 
application layer
application layerapplication layer
application layer
 
Cn u5
Cn u5Cn u5
Cn u5
 
DSNs & X.400 assist in ensuring email reliability
DSNs & X.400 assist in ensuring email reliabilityDSNs & X.400 assist in ensuring email reliability
DSNs & X.400 assist in ensuring email reliability
 
DSNs & X.400 assist in ensuring email reliability
DSNs & X.400 assist in ensuring email reliabilityDSNs & X.400 assist in ensuring email reliability
DSNs & X.400 assist in ensuring email reliability
 
B017211114
B017211114B017211114
B017211114
 
New PPT Presentation.pptx
New PPT Presentation.pptxNew PPT Presentation.pptx
New PPT Presentation.pptx
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
 
Presentation (1)
Presentation (1)Presentation (1)
Presentation (1)
 
Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And Disadvantages
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Osi
OsiOsi
Osi
 
E -MAIL AND INTERNET
E -MAIL AND INTERNETE -MAIL AND INTERNET
E -MAIL AND INTERNET
 
Internet, Intranet & Extranet & IP and MAC
Internet, Intranet & Extranet & IP and MACInternet, Intranet & Extranet & IP and MAC
Internet, Intranet & Extranet & IP and MAC
 
Report on Heartbleed
Report on HeartbleedReport on Heartbleed
Report on Heartbleed
 

More from sowfi (20)

Lavanya m.sc
Lavanya m.scLavanya m.sc
Lavanya m.sc
 
Lavanya m.sc
Lavanya m.scLavanya m.sc
Lavanya m.sc
 
Soundarya m.sc
Soundarya m.scSoundarya m.sc
Soundarya m.sc
 
Software engineering 2
Software engineering 2Software engineering 2
Software engineering 2
 
Compiler design
Compiler designCompiler design
Compiler design
 
Big data analytics
Big data analyticsBig data analytics
Big data analytics
 
Web programming
Web programmingWeb programming
Web programming
 
OS
OSOS
OS
 
OS
OSOS
OS
 
RDBMS
RDBMSRDBMS
RDBMS
 
DM
DMDM
DM
 
CN
CNCN
CN
 
Dm
DmDm
Dm
 
RDBMS
RDBMSRDBMS
RDBMS
 
connected compounds
connected compoundsconnected compounds
connected compounds
 
GENETIC ALGORITHM
GENETIC ALGORITHMGENETIC ALGORITHM
GENETIC ALGORITHM
 
JDBE
JDBEJDBE
JDBE
 
AUTO & HETRO CORRELATOR
AUTO & HETRO CORRELATORAUTO & HETRO CORRELATOR
AUTO & HETRO CORRELATOR
 
single source shorest path
single source shorest pathsingle source shorest path
single source shorest path
 
servlet in java
servlet in javaservlet in java
servlet in java
 

Recently uploaded

An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 

CN

  • 1. M. DHARANI M.SC (CS), NADAR SARASWATHI COLLEGE OF ARTS AND SCIENCE, THENI EMAIL AND TELNET
  • 2. INDEX  DEFINTION  USER AGENT  SENDING MAIL  RECEIVING MAIL  ADDRESS  MAILING LIST OR GROUP LIST  SECURITY  TELNET DEFINITON  LOCAL VERSUS REMOTE LOGGING  NETWORK VIRTUAL TERMINAL  USER INTERFACE
  • 3. DEFFINTION Electronic mail allows user to exchange message . In an application such us HTTP or FTP, the server program is running all the time, waiting for a request from a client. There is a request and there is a response. First email is considered a one-way transaction
  • 4. USER AGENT The first components of a electronic mail system is the user agent (UA) . A user agent is a software package (program) that composes , reads , replies to, and forward message. There are two types of user agent, 1. command- driven 2. GUI based
  • 5. SENDING MAIL  To send mail, the user , through the UA, creates mail that looks very similar to postal mail. The envelope usually contains the sender address, the receiver address and other information.  The message contains the header and body. The body of the message contains the actual information to be read by the
  • 6. RECEIVING MAIL  The user agent is triggered by the user.  If a user has mail, the UA informs the user with a notices.  If the user is ready to read the information, a list is displayed in which each lines contains the summary of information about a particular message in the mail box.  In the user can select any of the message and display it contains on
  • 7. ADDRESSES  To deliver mail, a mail handling system must use an addressing system with unique addresses.  The addresses consists of two parts, 1. local part 2. Domain name  The domain name assigned to each mail exchanger either comes from the DNS at database.
  • 8. MAILING LIST OF GROUPING LIST  Electronic mail allows one name, an alias to represents, several different email address .  This is called mailing list or grouping list.  Every time a message is to be send , the system check the recipients name against the alias database.
  • 9. EMAIL SECURITY  The protocol does not provide any security provisions per second.  However, the email exchange can be secure using to application layer security design is particular for email system.  Two protocols, 1. Pretty good privacy (PGP) 2. secure / multi purpose internet mail extensions ( S /MIME)
  • 10. TELNET  A server program can provide a specific service to its corresponding client program.  TELNET FOR TWO REASONS:  The simple plaintext architecture of telnet allows as to explain the issues and challenges related to the concept of remote logging.  Network administration of an use telnet for diagnostic and debugging purposes.
  • 11. LOCAL VERSUS REMOTE LOGGING  When a user logs into a local system, its is called local logging.  The terminal drives the process the character to the operating system.  The operating system turn , interprets the combination of character and invokes the design application program or utility.
  • 12. NETWORK VIRTUAL TERMINAL (NVL)  The mechanism to access a remote computer is complex .  We are dealing with heterogeneous system.  The server telnet on the other hand translate data and commands from NVT form into the form acceptable by the remote computer.
  • 13. USER INTERFACE  The Operating system ( UNIX, FOR EXAMPLE ) Defines and interface with user- friendly command.  OPEN -- connect to a remote computer  CLOSE – close the connection  DISPLAY – show the operating parameters  MODE – change to line or character mode  QUIT – To exit telnet