SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar – Apr. 2015), PP 11-14
www.iosrjournals.org
DOI: 10.9790/0661-17211114 www.iosrjournals.org 11 | Page
DSNs & X.400 assist in ensuring email reliability
Bassam Talib Sabri
(University of information Technology & Communications)
Abstract: While email is fairly reliable, messages do get lost. This can be due to the store-and-forward nature
of e- mail, which passes responsibility for delivering email from one mail server to another, but in doing so
exposes messages to loss, should a server not fulfil its responsibility. Some end users are more sensitive to
email unreliability than others, and seek tools with which they can detect and recover from email failures. This
paper describes tools that allow email sending software to automatically respond to reports of undeliverability
by persisting with retransmission or retransmitting to alternate recipients.
I. Introduction
Email is one of the most important network applications, with about 31 billion messages sent daily in
2003, a figure which was expected to double by 2006 [1]. However, messages can get lost, resulting in non-
delivery to intended receivers. Measurement studies suggest that about 0.69% of messages might be lost
silently (without the originator receiving a bounce message) [2], and while some servers offend more than
others, perhaps 6% of servers exhibit slight (0.03%) loss and 18% of servers exhibit higher loss rates [3]. Loss
can be caused by many points in the path that an email takes from originator to recipient. (In this paper we
emphasize the loss aspects of reliability, rather than other aspects such as whether messages are duplicated.) At
the ends, the originator may use an incorrect address for the recipient, or the recipient may have exceeded their
storage quota. Filtering, to defend against spam and malware such as worms and viruses, can also lead to loss
both at the recipient's end system or at mail servers en route from originator to recipient. Filters have mixed
impact on overall reliability, since they reduce the possibility of storage quotas being fully used, but at the risk
of misclassifying some messages as unwanted which can lead to them being disregarded. Such filters
particularly affect permission-based marketing messages which may somewhat resemble spam, and several
companies (e.g. Pivotal Veracity, Lyris, Return Path and Message Labs) monitor the deliverability of such
messages and guide sources of such messages as to how they can be tailored to maximize deliverability despite
filters. Garriss et al [4] show how such filters can be improved to reduce unreliability due to filtering. More
fundamentally, two intentional design features of email, the ability for servers to operate asynchronously and for
recipients to forward messages, can harm reliability by allowing loss from servers to evade detection by end-
users. First, email systems are intentionally designed to enable communication between entities that need not be
available simultaneously, i.e. they can operate asynchronously. This is achieved by mail servers operating in a
store-and-forward mode, whereby they accept messages from sources and attempt to relay them towards, or
deliver them to, the recipient. This is particularly useful at the end of a path, where a server can hold a message
in a mail store where it waits for a client to access the message. SMTP servers communicate with each other
through TCP, which includes a retransmission mechanism to ensure reliable transfer over the connection
between servers. However, it is still possible that messages may be lost within servers, and so the end-to-end
transfer from originator to recipient may not be reliable. The store-and-forward nature of SMTP is similar to
that of IP, and just as TCP needs to be superimposed on IP in order to ensure reliable transfer across a network,
so too something needs to be superimposed on a series of SMTP servers if there is to be end-to-end reliability
between mail originator and recipient. The SMTP specification states: “When the receiver-SMTP accepts a
piece of mail … it is accepting responsibility for delivering or relaying the message. It must take this
responsibility seriously. It MUST NOT lose the message for frivolous reasons, such as because the host later
crashes or because of a predictable resource shortage.” [5, Section 6.1]. While this recognises that servers have
the potential to contribute to unreliability, the caveats in the form of “frivolous reasons” and “predictable
resource shortage” (italics added) suggest that servers may not be able to completely avoid contributing to
unreliability. It is also important to note that it is one thing to mandate that a server “MUST NOT lose the
message”, but it is another to enforce this by checking whether an implementation of a server is losing any
messages. Just as the end-to-end arguments [6][7] require end-systems to implement error control (e.g. in
transport protocols such as TCP) because they cannot trust routers to be able to detect and recover from all
errors, so too end-users of email services need to implement error control because they cannot be certain of the
reliability of SMTP servers that their message will pass through. The second feature of email that can detract
from reliability is that recipients can automatically forward messages to (an)other recipient(s). This prevents the
originator from knowing the identity of the ultimate destination(s) of a message, and hence whether any positive
feedback that it may have received (such as Delivery Service Notifications) indicate delivery to the final
DSNs & X.400 assist in ensuring email reliability
DOI: 10.9790/0661-17211114 www.iosrjournals.org 12 | Page
destination or just delivery to some intermediary. Section 2 of this paper provides background about the main
protocol used for email transfer, SMTP, with emphasis on how SMTP addresses reliability. Section 3 describes
active source responses to known errors, such as automatically retransmitting a message, either later, or to an
alternate email address. Section 4 describes our implementation of these responses, and Section 5 concludes.
The authors apologise to readers for this version of this paper having very limited novelty. The version that was
submitted for review to the conference included many substantial novel ideas which filled the page limit stated
in the CFP of “20 double-spaced pages ... using 11-point type”. However the paper was accepted only as a short
paper of “4 pages using 10 point type”. More than halving the length of the paper has left little space for
substance. Readers who are interested in the more substantial ideas from the full paper should email the
authors.
II. SMTP background
Most email today is sent using the Simple Mail Transfer Protocol (SMTP) [5], although in Section 3.20
we will consider an idea from an alternative protocol, X.400, that is not yet supported by SMTP. SMTP is used
between Mail Transfer Agents (MTAs), also known as “mail servers”. An originating MTA (e.g. in an
originating mail client) uses SMTP to send a message to another MTA, usually to a local MTA charged with
forwarding messages out of the originating domain. Local MTAs may be used because they may be better
connected, and so can persist longer, than the originating MTA. A more recent reason for requiring transfer
through local MTAs is to control the flow of messages from a domain (e.g. to curb spam or the spread of
worms). SMTP servers cope with unreliable networks or unavailable peers by persisting in their attempts to
contact downstream servers. The most popular server implementation (sendmail, www.sendmail.org) retries
every 15 minutes to deliver messages, issues a warning message (with a status code beginning with 4) after
trying for 4 hours, and keeps trying for up to 4 days, after which it issues a permanent bounce message. We
return to this possibility of extensive delays (4 hours or 4 days) before the originator receives feedback when
considering retransmission by the originator in Section 3.1. Of the many fields [8] that can appear in message
headers, the most relevant to this paper are the From, Sender, To, CC, and BCC fields which are used for
addressing messages. SMTP provides several types of feedback, which can be used to detect problems,
including 3-digit numeric reply codes, enhanced dotted decimal codes, and finally Message Disposition
Notifications. These can be provided synchronously (when a client is connected to the server), or
asynchronously (after the SMTP session) in the form of a “bounce message”. For example, one server may
synchronously indicate that it accepts a message to be relayed to another server, but later find that it cannot
deliver the message to that server, and so asynchronously sends a bounce message. A source cannot equate no
negative feedback with no error, since the feedback may merely be slow to arrive, or may itself have been lost.
Delivery Status Notifications (DSNs) [9] extend these asynchronous responses by standardising their format and
providing for positive feedback. Servers that support DSN indicate so in response to an ESMTP EHLO
command, and allow the client to specify (with a “NOTIFY” parameter) when DSNs should be generated
(NEVER, or on SUCCESS, FAILURE or DELAY) and (with a “RET” parameter) whether the full message or
just headers should be included in the DSN. While the positive feedback provided by DSNs can assist in
ensuring email reliability, DSN is not yet widely deployed (e.g. at the time of writing, none of the major free
mail providers, Yahoo, Hotmail and Gmail support DSN). The preceding feedback has related to events in
servers. An originator may also be interested in whether a receiving mail client has processed a message. There
have been some attempts to provide Message Disposition notifications from user agents (e.g. RFC 3798 [10], or
by HTML messages covertly linking to message-specific images on servers that log when these images are
accessed), but these can compromise the privacy of end-users who do not wish to reveal when they read specific
messages.
III. Alternate recipients
If a message can’t be delivered to the preferred recipient, then it may be desirable to send it instead to
an alternate recipient. For example, when the destination mailbox is full, the message might be sent to an
alternate mailbox. While using an alternative is superficially obvious and simple, there are some subtleties that
are worth noting. First, there would often be some reason for preferring delivery to the initial address rather
than the alternate address, and delivering to the alternate address may prevent immediate loss but cause other
problems. For example, the alternate address may be for an email account that the recipient checks less often, in
which case using the alternate may introduce delay (before the human end-user reads the message) in order to
avoid immediate loss. Another example is that the alternate address may lead to receipt by people who are
peripheral to the intended recipient (e.g. to one or multiple peers of the intended recipient), which may cause
delay or increase load on others. Second, it is important that the sender be aware that delivery to the initial
address was unsuccessful so that they consider updating the preferred address for subsequent messages. Related
work: The dominance of Internet protocols over alternatives, such as OSI, has also led to SMTP being the
DSNs & X.400 assist in ensuring email reliability
DOI: 10.9790/0661-17211114 www.iosrjournals.org 13 | Page
dominant mail transfer protocol. However, email facilities in some alternate protocol suites provide features
that have not yet appeared in SMTP. X.400 [11] provided an “Alternate Recipient Assignment Service”, which
allowed an originator or recipient (or domain of the recipient) to specify (“assign”) an alternate recipient to
which messages would be sent if they could not be delivered to the “preferred recipient”. Originators could also
specify whether a message is permitted to be delivered to alternates. SMTP does not provide a corresponding
feature, even though this could be used to improve deliverability. (RFC 2156 does define a SMTP Alternate-
Recipient header field for interworking between SMTP and X.400.) Because in our implementation it is the
source that uses alternate addresses, our implementation does not need to modify SMTP or introduce a new
header field to indicate alternates to downstream servers.
IV. Implementation
These tools have been implemented in Java (for portability between operating systems) as a proxy.
The proxy would typically reside on an end-user’s computer, but could also be located on a separate machine
that serves multiple users. The use of a proxy eliminates the need to create plug-ins for separate mail user agent
programs – they need only be configured to use the localhost (127.0.0.1) as the mail server. The proxy needs
root/administrator access rights to run so that it can bind to reserved ports 25 (SMTP) and 110 (POP3), but
(when running on an end-user’s computer) it only accepts connections from the localhost to those ports, and so
does not open security problems from making more mail servers available to other machines. Figure 1 shows the
structure of the proxy software, with the interface to the client at the top, storage for messages being processed
in the central MailAccountHandler, and the interface to other mail servers on the bottom.
Figure 1: Structure of the proxy software
DSNs & X.400 assist in ensuring email reliability
DOI: 10.9790/0661-17211114 www.iosrjournals.org 14 | Page
V. Conclusion
This paper has described two ways by which end- systems, sources in the case of this paper, can
improve email reliability. Several more interesting techniques can be implemented at sources and receivers, and
will be the subject of a future paper.
References
[1]. P. Lyman and H. Varian: "How Much Information", http://www.sims.berkeley.edu/how-much-info-2003
[2]. T. Moors: “Email reliability”, http://uluru.ee.unsw.edu.au/~tim/dependable/email/
[3]. M. Afergan and R. Beverly: "The state of the email address", Computer Communication Review, 35(1):29- 35, Jan. 2005
[4]. S. Garriss, M. Kaminsky, M. Freedman, B. Karp, D. Mazihres and H. Yu: "RE: Reliable Email", Proc. NSDI, pp. 297-310, May
2006
[5]. J. Klensin: "Simple Mail Transfer Protocol," IETF, RFC 2821, Apr. 2001
[6]. J. Saltzer, D. Reed and D. Clark: "End-to-end arguments in system design", ACM Transactions on Computer Systems, 2(4):277-88,
Nov. 1984
[7]. T. Moors: "A critical review of "end-to-end arguments in system design"", Proc. IEEE Int'l Conf. on Comm. (ICC), pp. 1214-9,
Apr.-May 2002
[8]. G. Klyne and J. Palme: “Registration of Mail and MIME Header Fields”, IETF RFC 4021, Mar. 2005
[9]. K. Moore: "Simple Mail Transfer Protocol (SMTP) Service Extension for Delivery Status Notifications (DSNs)," IETF, RFC 3461,
Jan. 2003
[10]. T. Hansen: "Message Disposition Notification," IETF, RFC 3798, May 2004
[11]. ISO/IEC: "Information technology - Message Handling Systems (MHS) - Part 1: System and Service Overview," Standard 10021-1:
1997

More Related Content

What's hot

OTechs Mail system proposal
OTechs Mail system proposalOTechs Mail system proposal
OTechs Mail system proposal
Osman Suliman
 
Intranet Messaging Project Report -phpapp02
Intranet Messaging Project Report -phpapp02Intranet Messaging Project Report -phpapp02
Intranet Messaging Project Report -phpapp02
dvicky12
 
Email Security, The Essence of Secure E-mail
Email Security, The Essence of Secure E-mailEmail Security, The Essence of Secure E-mail
Email Security, The Essence of Secure E-mail
Ralph van der Pauw
 
Mail services and mail commands in linux
Mail services and mail commands in linuxMail services and mail commands in linux
Mail services and mail commands in linux
Gracia Marcom
 
Pop (post office protocol)e mail (electronic mail)
Pop (post office protocol)e mail (electronic mail)Pop (post office protocol)e mail (electronic mail)
Pop (post office protocol)e mail (electronic mail)
MDSHABBIR12
 
The Fundamental of Electronic Mail (E-mail)
The Fundamental of Electronic Mail (E-mail)The Fundamental of Electronic Mail (E-mail)
The Fundamental of Electronic Mail (E-mail)
Vishal Kumar
 
Task communication
Task communicationTask communication
Task communication
1jayanti
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
Kathirvel Ayyaswamy
 
Chapter 4 communication2
Chapter 4 communication2Chapter 4 communication2
Chapter 4 communication2
DBU
 
Electronic mail
Electronic mailElectronic mail
Communication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed SystemsCommunication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed Systemsguest61205606
 
CN
CNCN
CN
sowfi
 
2.communcation in distributed system
2.communcation in distributed system2.communcation in distributed system
2.communcation in distributed system
Gd Goenka University
 
Mail server using Linux(Ubuntu)
Mail server using Linux(Ubuntu)Mail server using Linux(Ubuntu)
Mail server using Linux(Ubuntu)
Navjot Navi
 
Transport layer
Transport layerTransport layer
Transport layer
reshmadayma
 
Communication in Distributed Systems
Communication in Distributed SystemsCommunication in Distributed Systems
Communication in Distributed Systems
Dilum Bandara
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transfer
Serious_SamSoul
 
INTERNAL MAILING SYSTEM-Project report
INTERNAL MAILING SYSTEM-Project reportINTERNAL MAILING SYSTEM-Project report
INTERNAL MAILING SYSTEM-Project report
KULDEEPSINGH CHAUHAN
 

What's hot (19)

OTechs Mail system proposal
OTechs Mail system proposalOTechs Mail system proposal
OTechs Mail system proposal
 
Intranet Messaging Project Report -phpapp02
Intranet Messaging Project Report -phpapp02Intranet Messaging Project Report -phpapp02
Intranet Messaging Project Report -phpapp02
 
Email Security, The Essence of Secure E-mail
Email Security, The Essence of Secure E-mailEmail Security, The Essence of Secure E-mail
Email Security, The Essence of Secure E-mail
 
Mail services and mail commands in linux
Mail services and mail commands in linuxMail services and mail commands in linux
Mail services and mail commands in linux
 
Pop (post office protocol)e mail (electronic mail)
Pop (post office protocol)e mail (electronic mail)Pop (post office protocol)e mail (electronic mail)
Pop (post office protocol)e mail (electronic mail)
 
The Fundamental of Electronic Mail (E-mail)
The Fundamental of Electronic Mail (E-mail)The Fundamental of Electronic Mail (E-mail)
The Fundamental of Electronic Mail (E-mail)
 
Task communication
Task communicationTask communication
Task communication
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Chapter 4 communication2
Chapter 4 communication2Chapter 4 communication2
Chapter 4 communication2
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Communication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed SystemsCommunication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed Systems
 
CN
CNCN
CN
 
2.communcation in distributed system
2.communcation in distributed system2.communcation in distributed system
2.communcation in distributed system
 
Mail server using Linux(Ubuntu)
Mail server using Linux(Ubuntu)Mail server using Linux(Ubuntu)
Mail server using Linux(Ubuntu)
 
Transport layer
Transport layerTransport layer
Transport layer
 
Communication in Distributed Systems
Communication in Distributed SystemsCommunication in Distributed Systems
Communication in Distributed Systems
 
Smtp, pop3, imapv 4
Smtp, pop3, imapv 4Smtp, pop3, imapv 4
Smtp, pop3, imapv 4
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transfer
 
INTERNAL MAILING SYSTEM-Project report
INTERNAL MAILING SYSTEM-Project reportINTERNAL MAILING SYSTEM-Project report
INTERNAL MAILING SYSTEM-Project report
 

Viewers also liked

Improving Irrigation Water Management in Delta of Egypt
Improving Irrigation Water Management in Delta of EgyptImproving Irrigation Water Management in Delta of Egypt
Improving Irrigation Water Management in Delta of Egypt
IOSR Journals
 
Combining SFBC_OFDM Systems with SVD Assisted Multiuser Transmitter and Multi...
Combining SFBC_OFDM Systems with SVD Assisted Multiuser Transmitter and Multi...Combining SFBC_OFDM Systems with SVD Assisted Multiuser Transmitter and Multi...
Combining SFBC_OFDM Systems with SVD Assisted Multiuser Transmitter and Multi...
IOSR Journals
 
R01314118123
R01314118123R01314118123
R01314118123
IOSR Journals
 
Exponential software reliability using SPRT: MLE
Exponential software reliability using SPRT: MLEExponential software reliability using SPRT: MLE
Exponential software reliability using SPRT: MLE
IOSR Journals
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals
 
Design Issues for Search Engines and Web Crawlers: A Review
Design Issues for Search Engines and Web Crawlers: A ReviewDesign Issues for Search Engines and Web Crawlers: A Review
Design Issues for Search Engines and Web Crawlers: A Review
IOSR Journals
 
Advancing Statistical Education using Technology and Mobile Devices
Advancing Statistical Education using Technology and Mobile DevicesAdvancing Statistical Education using Technology and Mobile Devices
Advancing Statistical Education using Technology and Mobile Devices
IOSR Journals
 
Design and implementation of Parallel Prefix Adders using FPGAs
Design and implementation of Parallel Prefix Adders using FPGAsDesign and implementation of Parallel Prefix Adders using FPGAs
Design and implementation of Parallel Prefix Adders using FPGAs
IOSR Journals
 
Analysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm System
Analysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm SystemAnalysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm System
Analysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm System
IOSR Journals
 
The effect of rotational speed variation on the static pressure in the centri...
The effect of rotational speed variation on the static pressure in the centri...The effect of rotational speed variation on the static pressure in the centri...
The effect of rotational speed variation on the static pressure in the centri...
IOSR Journals
 
Spectral Studies of Some Transition Metal Ion complexes with 4-[(E)-(Ferrocen...
Spectral Studies of Some Transition Metal Ion complexes with 4-[(E)-(Ferrocen...Spectral Studies of Some Transition Metal Ion complexes with 4-[(E)-(Ferrocen...
Spectral Studies of Some Transition Metal Ion complexes with 4-[(E)-(Ferrocen...
IOSR Journals
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
IOSR Journals
 
Vehicle Obstacles Avoidance Using Vehicle- To Infrastructure Communication
Vehicle Obstacles Avoidance Using Vehicle- To Infrastructure  CommunicationVehicle Obstacles Avoidance Using Vehicle- To Infrastructure  Communication
Vehicle Obstacles Avoidance Using Vehicle- To Infrastructure Communication
IOSR Journals
 
D010212029
D010212029D010212029
D010212029
IOSR Journals
 
B01460713
B01460713B01460713
B01460713
IOSR Journals
 
O017429398
O017429398O017429398
O017429398
IOSR Journals
 
An Efficient Modified Common Neighbor Approach for Link Prediction in Social ...
An Efficient Modified Common Neighbor Approach for Link Prediction in Social ...An Efficient Modified Common Neighbor Approach for Link Prediction in Social ...
An Efficient Modified Common Neighbor Approach for Link Prediction in Social ...
IOSR Journals
 
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
Cryptography On Android Message Application Using Look  Up Table And Dynamic ...Cryptography On Android Message Application Using Look  Up Table And Dynamic ...
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
IOSR Journals
 
P01061112116
P01061112116P01061112116
P01061112116
IOSR Journals
 

Viewers also liked (20)

Improving Irrigation Water Management in Delta of Egypt
Improving Irrigation Water Management in Delta of EgyptImproving Irrigation Water Management in Delta of Egypt
Improving Irrigation Water Management in Delta of Egypt
 
Combining SFBC_OFDM Systems with SVD Assisted Multiuser Transmitter and Multi...
Combining SFBC_OFDM Systems with SVD Assisted Multiuser Transmitter and Multi...Combining SFBC_OFDM Systems with SVD Assisted Multiuser Transmitter and Multi...
Combining SFBC_OFDM Systems with SVD Assisted Multiuser Transmitter and Multi...
 
R01314118123
R01314118123R01314118123
R01314118123
 
Exponential software reliability using SPRT: MLE
Exponential software reliability using SPRT: MLEExponential software reliability using SPRT: MLE
Exponential software reliability using SPRT: MLE
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
Design Issues for Search Engines and Web Crawlers: A Review
Design Issues for Search Engines and Web Crawlers: A ReviewDesign Issues for Search Engines and Web Crawlers: A Review
Design Issues for Search Engines and Web Crawlers: A Review
 
K01116569
K01116569K01116569
K01116569
 
Advancing Statistical Education using Technology and Mobile Devices
Advancing Statistical Education using Technology and Mobile DevicesAdvancing Statistical Education using Technology and Mobile Devices
Advancing Statistical Education using Technology and Mobile Devices
 
Design and implementation of Parallel Prefix Adders using FPGAs
Design and implementation of Parallel Prefix Adders using FPGAsDesign and implementation of Parallel Prefix Adders using FPGAs
Design and implementation of Parallel Prefix Adders using FPGAs
 
Analysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm System
Analysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm SystemAnalysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm System
Analysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm System
 
The effect of rotational speed variation on the static pressure in the centri...
The effect of rotational speed variation on the static pressure in the centri...The effect of rotational speed variation on the static pressure in the centri...
The effect of rotational speed variation on the static pressure in the centri...
 
Spectral Studies of Some Transition Metal Ion complexes with 4-[(E)-(Ferrocen...
Spectral Studies of Some Transition Metal Ion complexes with 4-[(E)-(Ferrocen...Spectral Studies of Some Transition Metal Ion complexes with 4-[(E)-(Ferrocen...
Spectral Studies of Some Transition Metal Ion complexes with 4-[(E)-(Ferrocen...
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
 
Vehicle Obstacles Avoidance Using Vehicle- To Infrastructure Communication
Vehicle Obstacles Avoidance Using Vehicle- To Infrastructure  CommunicationVehicle Obstacles Avoidance Using Vehicle- To Infrastructure  Communication
Vehicle Obstacles Avoidance Using Vehicle- To Infrastructure Communication
 
D010212029
D010212029D010212029
D010212029
 
B01460713
B01460713B01460713
B01460713
 
O017429398
O017429398O017429398
O017429398
 
An Efficient Modified Common Neighbor Approach for Link Prediction in Social ...
An Efficient Modified Common Neighbor Approach for Link Prediction in Social ...An Efficient Modified Common Neighbor Approach for Link Prediction in Social ...
An Efficient Modified Common Neighbor Approach for Link Prediction in Social ...
 
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
Cryptography On Android Message Application Using Look  Up Table And Dynamic ...Cryptography On Android Message Application Using Look  Up Table And Dynamic ...
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
 
P01061112116
P01061112116P01061112116
P01061112116
 

Similar to DSNs & X.400 assist in ensuring email reliability

how email works
how email workshow email works
how email works
harikaveeravalli
 
Technical Background Overview Ppt
Technical Background Overview PptTechnical Background Overview Ppt
Technical Background Overview Ppt
Antonio Ieranò
 
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAILTECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
IJNSA Journal
 
Email forensic
Email forensic Email forensic
Email forensic
Sakib Khan
 
IRJET- Secure Email Software using e-SMTP
IRJET- Secure Email Software using e-SMTPIRJET- Secure Email Software using e-SMTP
IRJET- Secure Email Software using e-SMTP
IRJET Journal
 
IRJET- Secure Email Software using e-SMTP
IRJET-  	  Secure Email Software using e-SMTPIRJET-  	  Secure Email Software using e-SMTP
IRJET- Secure Email Software using e-SMTP
IRJET Journal
 
The Crucial Role of SMTP Servers in Email Communication A Comprehensive Overv...
The Crucial Role of SMTP Servers in Email Communication A Comprehensive Overv...The Crucial Role of SMTP Servers in Email Communication A Comprehensive Overv...
The Crucial Role of SMTP Servers in Email Communication A Comprehensive Overv...
teesoune
 
Email
EmailEmail
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
Ujjayanta Bhaumik
 
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLSMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
Vidhu Arora
 
Blockmail Technical White Paper
Blockmail   Technical White PaperBlockmail   Technical White Paper
Blockmail Technical White Paper
niallmmackey
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
YouTubeCONTRA
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
Abid Fakhre Alam
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mail
tumetr1
 
10135 a 05
10135 a 0510135 a 05
10135 a 05Bố Su
 
E mail forensics
E mail forensicsE mail forensics
E mail forensics
saddamhusain hadimani
 
Through-Mail Feature: An Enhancement to Contemporary Email Services
Through-Mail Feature: An Enhancement to Contemporary Email ServicesThrough-Mail Feature: An Enhancement to Contemporary Email Services
Through-Mail Feature: An Enhancement to Contemporary Email Services
IRJESJOURNAL
 
internet applications
internet applicationsinternet applications
internet applications
Srinivasa Rao
 
Email
EmailEmail
Email
Roy Thomas
 

Similar to DSNs & X.400 assist in ensuring email reliability (20)

how email works
how email workshow email works
how email works
 
Technical Background Overview Ppt
Technical Background Overview PptTechnical Background Overview Ppt
Technical Background Overview Ppt
 
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAILTECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAIL
 
Email forensic
Email forensic Email forensic
Email forensic
 
IRJET- Secure Email Software using e-SMTP
IRJET- Secure Email Software using e-SMTPIRJET- Secure Email Software using e-SMTP
IRJET- Secure Email Software using e-SMTP
 
IRJET- Secure Email Software using e-SMTP
IRJET-  	  Secure Email Software using e-SMTPIRJET-  	  Secure Email Software using e-SMTP
IRJET- Secure Email Software using e-SMTP
 
The Crucial Role of SMTP Servers in Email Communication A Comprehensive Overv...
The Crucial Role of SMTP Servers in Email Communication A Comprehensive Overv...The Crucial Role of SMTP Servers in Email Communication A Comprehensive Overv...
The Crucial Role of SMTP Servers in Email Communication A Comprehensive Overv...
 
Email
EmailEmail
Email
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLSMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
 
Blockmail Technical White Paper
Blockmail   Technical White PaperBlockmail   Technical White Paper
Blockmail Technical White Paper
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mail
 
10135 a 05
10135 a 0510135 a 05
10135 a 05
 
E mail forensics
E mail forensicsE mail forensics
E mail forensics
 
Through-Mail Feature: An Enhancement to Contemporary Email Services
Through-Mail Feature: An Enhancement to Contemporary Email ServicesThrough-Mail Feature: An Enhancement to Contemporary Email Services
Through-Mail Feature: An Enhancement to Contemporary Email Services
 
Internet
InternetInternet
Internet
 
internet applications
internet applicationsinternet applications
internet applications
 
Email
EmailEmail
Email
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
An Approach to Detecting Writing Styles Based on Clustering Techniques
An Approach to Detecting Writing Styles Based on Clustering TechniquesAn Approach to Detecting Writing Styles Based on Clustering Techniques
An Approach to Detecting Writing Styles Based on Clustering Techniques
ambekarshweta25
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
dxobcob
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 

Recently uploaded (20)

Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
An Approach to Detecting Writing Styles Based on Clustering Techniques
An Approach to Detecting Writing Styles Based on Clustering TechniquesAn Approach to Detecting Writing Styles Based on Clustering Techniques
An Approach to Detecting Writing Styles Based on Clustering Techniques
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
一比一原版(Otago毕业证)奥塔哥大学毕业证成绩单如何办理
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 

DSNs & X.400 assist in ensuring email reliability

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar – Apr. 2015), PP 11-14 www.iosrjournals.org DOI: 10.9790/0661-17211114 www.iosrjournals.org 11 | Page DSNs & X.400 assist in ensuring email reliability Bassam Talib Sabri (University of information Technology & Communications) Abstract: While email is fairly reliable, messages do get lost. This can be due to the store-and-forward nature of e- mail, which passes responsibility for delivering email from one mail server to another, but in doing so exposes messages to loss, should a server not fulfil its responsibility. Some end users are more sensitive to email unreliability than others, and seek tools with which they can detect and recover from email failures. This paper describes tools that allow email sending software to automatically respond to reports of undeliverability by persisting with retransmission or retransmitting to alternate recipients. I. Introduction Email is one of the most important network applications, with about 31 billion messages sent daily in 2003, a figure which was expected to double by 2006 [1]. However, messages can get lost, resulting in non- delivery to intended receivers. Measurement studies suggest that about 0.69% of messages might be lost silently (without the originator receiving a bounce message) [2], and while some servers offend more than others, perhaps 6% of servers exhibit slight (0.03%) loss and 18% of servers exhibit higher loss rates [3]. Loss can be caused by many points in the path that an email takes from originator to recipient. (In this paper we emphasize the loss aspects of reliability, rather than other aspects such as whether messages are duplicated.) At the ends, the originator may use an incorrect address for the recipient, or the recipient may have exceeded their storage quota. Filtering, to defend against spam and malware such as worms and viruses, can also lead to loss both at the recipient's end system or at mail servers en route from originator to recipient. Filters have mixed impact on overall reliability, since they reduce the possibility of storage quotas being fully used, but at the risk of misclassifying some messages as unwanted which can lead to them being disregarded. Such filters particularly affect permission-based marketing messages which may somewhat resemble spam, and several companies (e.g. Pivotal Veracity, Lyris, Return Path and Message Labs) monitor the deliverability of such messages and guide sources of such messages as to how they can be tailored to maximize deliverability despite filters. Garriss et al [4] show how such filters can be improved to reduce unreliability due to filtering. More fundamentally, two intentional design features of email, the ability for servers to operate asynchronously and for recipients to forward messages, can harm reliability by allowing loss from servers to evade detection by end- users. First, email systems are intentionally designed to enable communication between entities that need not be available simultaneously, i.e. they can operate asynchronously. This is achieved by mail servers operating in a store-and-forward mode, whereby they accept messages from sources and attempt to relay them towards, or deliver them to, the recipient. This is particularly useful at the end of a path, where a server can hold a message in a mail store where it waits for a client to access the message. SMTP servers communicate with each other through TCP, which includes a retransmission mechanism to ensure reliable transfer over the connection between servers. However, it is still possible that messages may be lost within servers, and so the end-to-end transfer from originator to recipient may not be reliable. The store-and-forward nature of SMTP is similar to that of IP, and just as TCP needs to be superimposed on IP in order to ensure reliable transfer across a network, so too something needs to be superimposed on a series of SMTP servers if there is to be end-to-end reliability between mail originator and recipient. The SMTP specification states: “When the receiver-SMTP accepts a piece of mail … it is accepting responsibility for delivering or relaying the message. It must take this responsibility seriously. It MUST NOT lose the message for frivolous reasons, such as because the host later crashes or because of a predictable resource shortage.” [5, Section 6.1]. While this recognises that servers have the potential to contribute to unreliability, the caveats in the form of “frivolous reasons” and “predictable resource shortage” (italics added) suggest that servers may not be able to completely avoid contributing to unreliability. It is also important to note that it is one thing to mandate that a server “MUST NOT lose the message”, but it is another to enforce this by checking whether an implementation of a server is losing any messages. Just as the end-to-end arguments [6][7] require end-systems to implement error control (e.g. in transport protocols such as TCP) because they cannot trust routers to be able to detect and recover from all errors, so too end-users of email services need to implement error control because they cannot be certain of the reliability of SMTP servers that their message will pass through. The second feature of email that can detract from reliability is that recipients can automatically forward messages to (an)other recipient(s). This prevents the originator from knowing the identity of the ultimate destination(s) of a message, and hence whether any positive feedback that it may have received (such as Delivery Service Notifications) indicate delivery to the final
  • 2. DSNs & X.400 assist in ensuring email reliability DOI: 10.9790/0661-17211114 www.iosrjournals.org 12 | Page destination or just delivery to some intermediary. Section 2 of this paper provides background about the main protocol used for email transfer, SMTP, with emphasis on how SMTP addresses reliability. Section 3 describes active source responses to known errors, such as automatically retransmitting a message, either later, or to an alternate email address. Section 4 describes our implementation of these responses, and Section 5 concludes. The authors apologise to readers for this version of this paper having very limited novelty. The version that was submitted for review to the conference included many substantial novel ideas which filled the page limit stated in the CFP of “20 double-spaced pages ... using 11-point type”. However the paper was accepted only as a short paper of “4 pages using 10 point type”. More than halving the length of the paper has left little space for substance. Readers who are interested in the more substantial ideas from the full paper should email the authors. II. SMTP background Most email today is sent using the Simple Mail Transfer Protocol (SMTP) [5], although in Section 3.20 we will consider an idea from an alternative protocol, X.400, that is not yet supported by SMTP. SMTP is used between Mail Transfer Agents (MTAs), also known as “mail servers”. An originating MTA (e.g. in an originating mail client) uses SMTP to send a message to another MTA, usually to a local MTA charged with forwarding messages out of the originating domain. Local MTAs may be used because they may be better connected, and so can persist longer, than the originating MTA. A more recent reason for requiring transfer through local MTAs is to control the flow of messages from a domain (e.g. to curb spam or the spread of worms). SMTP servers cope with unreliable networks or unavailable peers by persisting in their attempts to contact downstream servers. The most popular server implementation (sendmail, www.sendmail.org) retries every 15 minutes to deliver messages, issues a warning message (with a status code beginning with 4) after trying for 4 hours, and keeps trying for up to 4 days, after which it issues a permanent bounce message. We return to this possibility of extensive delays (4 hours or 4 days) before the originator receives feedback when considering retransmission by the originator in Section 3.1. Of the many fields [8] that can appear in message headers, the most relevant to this paper are the From, Sender, To, CC, and BCC fields which are used for addressing messages. SMTP provides several types of feedback, which can be used to detect problems, including 3-digit numeric reply codes, enhanced dotted decimal codes, and finally Message Disposition Notifications. These can be provided synchronously (when a client is connected to the server), or asynchronously (after the SMTP session) in the form of a “bounce message”. For example, one server may synchronously indicate that it accepts a message to be relayed to another server, but later find that it cannot deliver the message to that server, and so asynchronously sends a bounce message. A source cannot equate no negative feedback with no error, since the feedback may merely be slow to arrive, or may itself have been lost. Delivery Status Notifications (DSNs) [9] extend these asynchronous responses by standardising their format and providing for positive feedback. Servers that support DSN indicate so in response to an ESMTP EHLO command, and allow the client to specify (with a “NOTIFY” parameter) when DSNs should be generated (NEVER, or on SUCCESS, FAILURE or DELAY) and (with a “RET” parameter) whether the full message or just headers should be included in the DSN. While the positive feedback provided by DSNs can assist in ensuring email reliability, DSN is not yet widely deployed (e.g. at the time of writing, none of the major free mail providers, Yahoo, Hotmail and Gmail support DSN). The preceding feedback has related to events in servers. An originator may also be interested in whether a receiving mail client has processed a message. There have been some attempts to provide Message Disposition notifications from user agents (e.g. RFC 3798 [10], or by HTML messages covertly linking to message-specific images on servers that log when these images are accessed), but these can compromise the privacy of end-users who do not wish to reveal when they read specific messages. III. Alternate recipients If a message can’t be delivered to the preferred recipient, then it may be desirable to send it instead to an alternate recipient. For example, when the destination mailbox is full, the message might be sent to an alternate mailbox. While using an alternative is superficially obvious and simple, there are some subtleties that are worth noting. First, there would often be some reason for preferring delivery to the initial address rather than the alternate address, and delivering to the alternate address may prevent immediate loss but cause other problems. For example, the alternate address may be for an email account that the recipient checks less often, in which case using the alternate may introduce delay (before the human end-user reads the message) in order to avoid immediate loss. Another example is that the alternate address may lead to receipt by people who are peripheral to the intended recipient (e.g. to one or multiple peers of the intended recipient), which may cause delay or increase load on others. Second, it is important that the sender be aware that delivery to the initial address was unsuccessful so that they consider updating the preferred address for subsequent messages. Related work: The dominance of Internet protocols over alternatives, such as OSI, has also led to SMTP being the
  • 3. DSNs & X.400 assist in ensuring email reliability DOI: 10.9790/0661-17211114 www.iosrjournals.org 13 | Page dominant mail transfer protocol. However, email facilities in some alternate protocol suites provide features that have not yet appeared in SMTP. X.400 [11] provided an “Alternate Recipient Assignment Service”, which allowed an originator or recipient (or domain of the recipient) to specify (“assign”) an alternate recipient to which messages would be sent if they could not be delivered to the “preferred recipient”. Originators could also specify whether a message is permitted to be delivered to alternates. SMTP does not provide a corresponding feature, even though this could be used to improve deliverability. (RFC 2156 does define a SMTP Alternate- Recipient header field for interworking between SMTP and X.400.) Because in our implementation it is the source that uses alternate addresses, our implementation does not need to modify SMTP or introduce a new header field to indicate alternates to downstream servers. IV. Implementation These tools have been implemented in Java (for portability between operating systems) as a proxy. The proxy would typically reside on an end-user’s computer, but could also be located on a separate machine that serves multiple users. The use of a proxy eliminates the need to create plug-ins for separate mail user agent programs – they need only be configured to use the localhost (127.0.0.1) as the mail server. The proxy needs root/administrator access rights to run so that it can bind to reserved ports 25 (SMTP) and 110 (POP3), but (when running on an end-user’s computer) it only accepts connections from the localhost to those ports, and so does not open security problems from making more mail servers available to other machines. Figure 1 shows the structure of the proxy software, with the interface to the client at the top, storage for messages being processed in the central MailAccountHandler, and the interface to other mail servers on the bottom. Figure 1: Structure of the proxy software
  • 4. DSNs & X.400 assist in ensuring email reliability DOI: 10.9790/0661-17211114 www.iosrjournals.org 14 | Page V. Conclusion This paper has described two ways by which end- systems, sources in the case of this paper, can improve email reliability. Several more interesting techniques can be implemented at sources and receivers, and will be the subject of a future paper. References [1]. P. Lyman and H. Varian: "How Much Information", http://www.sims.berkeley.edu/how-much-info-2003 [2]. T. Moors: “Email reliability”, http://uluru.ee.unsw.edu.au/~tim/dependable/email/ [3]. M. Afergan and R. Beverly: "The state of the email address", Computer Communication Review, 35(1):29- 35, Jan. 2005 [4]. S. Garriss, M. Kaminsky, M. Freedman, B. Karp, D. Mazihres and H. Yu: "RE: Reliable Email", Proc. NSDI, pp. 297-310, May 2006 [5]. J. Klensin: "Simple Mail Transfer Protocol," IETF, RFC 2821, Apr. 2001 [6]. J. Saltzer, D. Reed and D. Clark: "End-to-end arguments in system design", ACM Transactions on Computer Systems, 2(4):277-88, Nov. 1984 [7]. T. Moors: "A critical review of "end-to-end arguments in system design"", Proc. IEEE Int'l Conf. on Comm. (ICC), pp. 1214-9, Apr.-May 2002 [8]. G. Klyne and J. Palme: “Registration of Mail and MIME Header Fields”, IETF RFC 4021, Mar. 2005 [9]. K. Moore: "Simple Mail Transfer Protocol (SMTP) Service Extension for Delivery Status Notifications (DSNs)," IETF, RFC 3461, Jan. 2003 [10]. T. Hansen: "Message Disposition Notification," IETF, RFC 3798, May 2004 [11]. ISO/IEC: "Information technology - Message Handling Systems (MHS) - Part 1: System and Service Overview," Standard 10021-1: 1997