M. DHARANI M.SC (CS),
NADAR SARASWATHI COLLEGE OF
ARTS AND SCIENCE, THENI
EMAIL AND TELNET
INDEX
 DEFINTION
 USER AGENT
 SENDING MAIL
 RECEIVING MAIL
 ADDRESS
 MAILING LIST OR GROUP LIST
 SECURITY
 TELNET DEFINITON
 LOCAL VERSUS REMOTE LOGGING
 NETWORK VIRTUAL TERMINAL
 USER INTERFACE
DEFFINTION
Electronic mail allows user to exchange
message .
In an application such us HTTP or FTP,
the server program is running all the
time, waiting for a request from a
client.
There is a request and there is a
response.
First email is considered a one-way
transaction
USER AGENT
The first components of a electronic
mail system is the user agent (UA) .
A user agent is a software package
(program) that composes , reads ,
replies to, and forward message.
There are two types of user agent,
1. command- driven
2. GUI based
SENDING MAIL
 To send mail, the user , through the
UA, creates mail that looks very similar
to postal mail.
The envelope usually contains the
sender address, the receiver address
and other information.
 The message contains the header and
body.
The body of the message contains the
actual information to be read by the
RECEIVING MAIL
 The user agent is triggered by the user.
 If a user has mail, the UA informs the
user with a notices.
 If the user is ready to read the
information, a list is displayed in which
each lines contains the summary of
information about a particular message
in the mail box.
 In the user can select any of the
message and display it contains on
ADDRESSES
 To deliver mail, a mail handling system
must use an addressing system with
unique addresses.
 The addresses consists of two parts,
1. local part
2. Domain name
 The domain name assigned to each mail
exchanger either comes from the DNS
at database.
MAILING LIST OF GROUPING
LIST
 Electronic mail allows one name, an alias
to represents, several different email
address .
 This is called mailing list or grouping
list.
 Every time a message is to be send ,
the system check the recipients name
against the alias database.
EMAIL SECURITY
 The protocol does not provide any
security provisions per second.
 However, the email exchange can be
secure using to application layer
security design is particular for email
system.
 Two protocols,
1. Pretty good privacy (PGP)
2. secure / multi purpose internet
mail extensions ( S /MIME)
TELNET
 A server program can provide a specific
service to its corresponding client
program.
 TELNET FOR TWO REASONS:
 The simple plaintext architecture of
telnet allows as to explain the issues
and challenges related to the concept
of remote logging.
 Network administration of an use telnet
for diagnostic and debugging purposes.
LOCAL VERSUS REMOTE
LOGGING
 When a user logs into a local system, its
is called local logging.
 The terminal drives the process the
character to the operating system.
 The operating system turn , interprets
the combination of character and
invokes the design application program
or utility.
NETWORK VIRTUAL
TERMINAL (NVL)
 The mechanism to access a remote
computer is complex .
 We are dealing with heterogeneous
system.
 The server telnet on the other hand
translate data and commands from
NVT form into the form acceptable
by the remote computer.
USER INTERFACE
 The Operating system ( UNIX, FOR
EXAMPLE ) Defines and interface with
user- friendly command.
 OPEN -- connect to a remote computer
 CLOSE – close the connection
 DISPLAY – show the operating
parameters
 MODE – change to line or character
mode
 QUIT – To exit telnet
THANK YOU !!!

CN

  • 1.
    M. DHARANI M.SC(CS), NADAR SARASWATHI COLLEGE OF ARTS AND SCIENCE, THENI EMAIL AND TELNET
  • 2.
    INDEX  DEFINTION  USERAGENT  SENDING MAIL  RECEIVING MAIL  ADDRESS  MAILING LIST OR GROUP LIST  SECURITY  TELNET DEFINITON  LOCAL VERSUS REMOTE LOGGING  NETWORK VIRTUAL TERMINAL  USER INTERFACE
  • 3.
    DEFFINTION Electronic mail allowsuser to exchange message . In an application such us HTTP or FTP, the server program is running all the time, waiting for a request from a client. There is a request and there is a response. First email is considered a one-way transaction
  • 4.
    USER AGENT The firstcomponents of a electronic mail system is the user agent (UA) . A user agent is a software package (program) that composes , reads , replies to, and forward message. There are two types of user agent, 1. command- driven 2. GUI based
  • 5.
    SENDING MAIL  Tosend mail, the user , through the UA, creates mail that looks very similar to postal mail. The envelope usually contains the sender address, the receiver address and other information.  The message contains the header and body. The body of the message contains the actual information to be read by the
  • 6.
    RECEIVING MAIL  Theuser agent is triggered by the user.  If a user has mail, the UA informs the user with a notices.  If the user is ready to read the information, a list is displayed in which each lines contains the summary of information about a particular message in the mail box.  In the user can select any of the message and display it contains on
  • 7.
    ADDRESSES  To delivermail, a mail handling system must use an addressing system with unique addresses.  The addresses consists of two parts, 1. local part 2. Domain name  The domain name assigned to each mail exchanger either comes from the DNS at database.
  • 8.
    MAILING LIST OFGROUPING LIST  Electronic mail allows one name, an alias to represents, several different email address .  This is called mailing list or grouping list.  Every time a message is to be send , the system check the recipients name against the alias database.
  • 9.
    EMAIL SECURITY  Theprotocol does not provide any security provisions per second.  However, the email exchange can be secure using to application layer security design is particular for email system.  Two protocols, 1. Pretty good privacy (PGP) 2. secure / multi purpose internet mail extensions ( S /MIME)
  • 10.
    TELNET  A serverprogram can provide a specific service to its corresponding client program.  TELNET FOR TWO REASONS:  The simple plaintext architecture of telnet allows as to explain the issues and challenges related to the concept of remote logging.  Network administration of an use telnet for diagnostic and debugging purposes.
  • 11.
    LOCAL VERSUS REMOTE LOGGING When a user logs into a local system, its is called local logging.  The terminal drives the process the character to the operating system.  The operating system turn , interprets the combination of character and invokes the design application program or utility.
  • 12.
    NETWORK VIRTUAL TERMINAL (NVL) The mechanism to access a remote computer is complex .  We are dealing with heterogeneous system.  The server telnet on the other hand translate data and commands from NVT form into the form acceptable by the remote computer.
  • 13.
    USER INTERFACE  TheOperating system ( UNIX, FOR EXAMPLE ) Defines and interface with user- friendly command.  OPEN -- connect to a remote computer  CLOSE – close the connection  DISPLAY – show the operating parameters  MODE – change to line or character mode  QUIT – To exit telnet
  • 14.