This document discusses tools that can help ensure email reliability by automatically responding to reports of undeliverability. It describes how Delivery Status Notifications (DSNs) and the Alternate Recipient Assignment Service from the X.400 protocol can help detect email failures and retransmit messages to alternate recipients. The document provides background on how SMTP works and how messages can get lost, before explaining how DSNs provide positive and negative delivery feedback. It also discusses issues with using alternate recipients and describes an implementation of these reliability tools as a Java proxy application.
This presentation depicts how the functioning of emails get unnoticed in our lives. It contains the brief overview of various things related to protocols and servers in the electronic mail's context.
Overview of Email protocols.
Electronic mail was one of the first applications of the fledgling Internet back in the 70ies of the last century. Mail represents basically an electronic equivalent of telegrams that can be sent without having a direct and simultaneous network connection with the recipient.
In email systems, a mail transfer agent (MTA) takes care of the message to be sent and repeatedly tries to deliver the message to the ultimate receiver until successful.
One of the first and still prevalent email protocols is SMTP (Simple Mail Transfer Protocol). It is a very simple protocol for sending electronic messages consisting of a header and a body between a sender and a recipient (relay agent or final mail transfer agent).
SMPT is not suited for receiving mail. Additional protocols like POP (Post Office Protocol) or the newer IMAP (Internet Mail Access Protocol) are needed to retrieve mail messages from a mail box.
SMPT was originally restricted to the ASCII character set so binary content or non-ASCII characters could not be used in mail messages. To overcome this limitation, MIME (Multipurpose Internet Mail Extensions) was devised to allow mail senders to encode non-ASCII content with special character encodings.
This presentation depicts how the functioning of emails get unnoticed in our lives. It contains the brief overview of various things related to protocols and servers in the electronic mail's context.
Overview of Email protocols.
Electronic mail was one of the first applications of the fledgling Internet back in the 70ies of the last century. Mail represents basically an electronic equivalent of telegrams that can be sent without having a direct and simultaneous network connection with the recipient.
In email systems, a mail transfer agent (MTA) takes care of the message to be sent and repeatedly tries to deliver the message to the ultimate receiver until successful.
One of the first and still prevalent email protocols is SMTP (Simple Mail Transfer Protocol). It is a very simple protocol for sending electronic messages consisting of a header and a body between a sender and a recipient (relay agent or final mail transfer agent).
SMPT is not suited for receiving mail. Additional protocols like POP (Post Office Protocol) or the newer IMAP (Internet Mail Access Protocol) are needed to retrieve mail messages from a mail box.
SMPT was originally restricted to the ASCII character set so binary content or non-ASCII characters could not be used in mail messages. To overcome this limitation, MIME (Multipurpose Internet Mail Extensions) was devised to allow mail senders to encode non-ASCII content with special character encodings.
Pop (post office protocol)e mail (electronic mail)MDSHABBIR12
Brief detail about pop3 and Electronic Mail. In this presentation, I describe the post office protocol and Electronic Mail.
1. History of Post Office Protocol.
2. Advantage and Disadvantage of postoffice protocol.
The Fundamental of Electronic Mail (E-mail)Vishal Kumar
This document contain the complete information about the Electronic mail. you will learn the basic structure and flow of email message, the Header and response codes, etc.
A brief introduction to task communication in real time operating system.It covers Inter-process communication like concepts of shared memory , message passing, remoteprocedure call .Interprocess communication (IPC) refers specifically to the mechanisms an operating system provides to allow the processes to manage shared data. Typically, applications can use IPC, categorized as clients and servers, where the client requests data and the server responds to client requests.Many applications are both clients and servers, as commonly seen in distributed computing.
One of the most popular Internet services is electronic mail (e-mail).
At the beginning of the Internet era, the messages sent by electronic mail were short and consisted of text only.
Today, electronic mail is much more complex. It allows a message to include text, audio, and video.
It also allows one message to be sent to one or more recipients.
Overview of Network Programming, Remote Procedure Calls, Remote Method Invocation, Message Oriented Communication, and web services in distributed systems
Combining SFBC_OFDM Systems with SVD Assisted Multiuser Transmitter and Multi...IOSR Journals
Abstract: In this work, we exploit the SVD assisted multiuser transmitter (MUT) and multiuser detector (MUD) technique, using downlink (DL) preprocessing transmitter and DL postprocessing receiver matrice .In combination with space frequency block coding (SFBC). And also propose the precoded DL transmission scheme, were the both proposed schemes take advantage of the channel state information (CSI) of all users at the base station (BS), but only of the mobile station (MS)’s own CSI, to decompose the MU MIMO channels into parallel single input single output (SISO), these two proposed schemes are compared to the vertical layered space time (V_BLAST) combined with SFBC (SFBC_VBLAST). Our Simulation results show that the performance of the proposed scheme with DL Zero Forcing (ZF) transmitter for interference canceller outperforms the SFBC_VBLAST and the precoded DL schemes with ZF receiver in frequency selective fading channels. Keywords – Post processing, Preprocessing,, SFBC, SVD, ZF.
Pop (post office protocol)e mail (electronic mail)MDSHABBIR12
Brief detail about pop3 and Electronic Mail. In this presentation, I describe the post office protocol and Electronic Mail.
1. History of Post Office Protocol.
2. Advantage and Disadvantage of postoffice protocol.
The Fundamental of Electronic Mail (E-mail)Vishal Kumar
This document contain the complete information about the Electronic mail. you will learn the basic structure and flow of email message, the Header and response codes, etc.
A brief introduction to task communication in real time operating system.It covers Inter-process communication like concepts of shared memory , message passing, remoteprocedure call .Interprocess communication (IPC) refers specifically to the mechanisms an operating system provides to allow the processes to manage shared data. Typically, applications can use IPC, categorized as clients and servers, where the client requests data and the server responds to client requests.Many applications are both clients and servers, as commonly seen in distributed computing.
One of the most popular Internet services is electronic mail (e-mail).
At the beginning of the Internet era, the messages sent by electronic mail were short and consisted of text only.
Today, electronic mail is much more complex. It allows a message to include text, audio, and video.
It also allows one message to be sent to one or more recipients.
Overview of Network Programming, Remote Procedure Calls, Remote Method Invocation, Message Oriented Communication, and web services in distributed systems
Combining SFBC_OFDM Systems with SVD Assisted Multiuser Transmitter and Multi...IOSR Journals
Abstract: In this work, we exploit the SVD assisted multiuser transmitter (MUT) and multiuser detector (MUD) technique, using downlink (DL) preprocessing transmitter and DL postprocessing receiver matrice .In combination with space frequency block coding (SFBC). And also propose the precoded DL transmission scheme, were the both proposed schemes take advantage of the channel state information (CSI) of all users at the base station (BS), but only of the mobile station (MS)’s own CSI, to decompose the MU MIMO channels into parallel single input single output (SISO), these two proposed schemes are compared to the vertical layered space time (V_BLAST) combined with SFBC (SFBC_VBLAST). Our Simulation results show that the performance of the proposed scheme with DL Zero Forcing (ZF) transmitter for interference canceller outperforms the SFBC_VBLAST and the precoded DL schemes with ZF receiver in frequency selective fading channels. Keywords – Post processing, Preprocessing,, SFBC, SVD, ZF.
Design Issues for Search Engines and Web Crawlers: A ReviewIOSR Journals
Abstract: The World Wide Web is a huge source of hyperlinked information contained in hypertext documents.
Search engines use web crawlers to collect these web documents from web for storage and indexing. The prompt
growth of the World Wide Web has posed incomparable challenges for the designers of search engines and web
crawlers; that help users to retrieve web pages in a reasonable amount of time. In this paper, a review on need
and working of a search engine, and role of a web crawler is being presented.
Key words: Internet, www, search engine, types, design issues, web crawlers.
Design and implementation of Parallel Prefix Adders using FPGAsIOSR Journals
Abstract: Adders are known to have the frequently used in VLSI designs. In digital design we have half adder and full adder, main adders by using these adders we can implement ripple carry adders. RCA use to perform any number of addition. In this RCA is serial adder and it has commutation delay problem. If increase the ha&fa simultaneously delay also increase. That’s why we go for parallel adders(parallel prefix adders). IN the parallel prefix adder are ks adder(kogge-stone),sks adder(sparse kogge-stone),spaning tree and brentkung adder. These adders are designd and implemented on FPGA sparton3E kit. Simulated and synthesis by model sim6.4b, Xilinx ise10.1.
Analysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm SystemIOSR Journals
Abstract: Orthogonal Frequency Division Multiplexing (OFDM) has become the most popular modulation echnique for high speed data transmission. But the great disadvantage of the OFDM technique is its high Peak to Average Power Ratio (PAPR). In this paper, the Selected Mapping (SLM) technique and Clipping and Differential Scaling is applied to Space Frequency Block Coded (SFBC) OFDM systems to reduce the PAPR with Alamouti coding scheme. In SLM technique, different representations of OFDM symbols are generated by rotation of the original OFDM frame by different phase sequences, and the signal with minimum PAPR is selected and transmitted. To compensate for the effect of the phase rotation at the receiver, it is necessary to transmit the index of the selected phase sequence as side information (SI). Additionally, a suboptimum detection method that does not need SI is introduced at the receiver side. In Clipping and Differential Scaling technique, the amplitude of complex OFDM signal is clipped and then scaled in such a way so that the PAPR is reduced without causing much degradation in bit error rate (BER). The threshold values for clipping and scaling is determined using Monte Carlo Simulations. Simulation results show that the SLM method and Clipping and Scaling method effectively reduce the PAPR. Keywords: Orthogonal frequency division multiplexing (OFDM), peak to average power ratio (PAPR), selected mapping (SLM), space frequency block coded (SFBC), Side information (SI), high power amplifiers (HPA), complementary cumulative density function (CCDF), inter-symbol interference (ISI).
The effect of rotational speed variation on the static pressure in the centri...IOSR Journals
The current investigation is aimed to simulate the three-dimensional complex internal flow in a
centrifugal pump impeller with five twisted blades by using specialized computational fluid dynamics (CFD)
software ANSYS /FLUENT 14code with a standard k-ε two-equation turbulence model.
A single blade passage will be modeled to give more accurate results for static pressure contours on (blade,
hub, and shroud). The potential consequences of static pressure associated with operating a centrifugal
compressor in variable rotation speed.
A numerical three-dimensional, through flow calculations to predict static pressure through a
centrifugal pump were presented to examined the effect of rotational speed variation on the static pressure of
the centrifugal pump . The contours of the static pressure of the blade, hub, and shroud indicates negative low
static pressure in the suction side at high rotational speed (over operation limits )and the static pressure
increases gradually until reach maximum value at the leading edge (6×105 Pa) of the blade.
Spectral Studies of Some Transition Metal Ion complexes with 4-[(E)-(Ferrocen...IOSR Journals
Several new complexes of some transition metal ions with organometallic compounds were derived from ferrocencecarboxylaldehyde and 4-amino-2-hydroxy pyridine. These organometallic complexes were investigated by using some analytical techniques like infrared, mass spectra, electronic spectra, electron spin resonance, thermal analysis, magnetic moment, conductivity and antimicrobial activity. From the obtained elemental analysis data, organometallic compounds complexes shows 1:2 [M: L] ratio and general formula of the complex is [ML2.2H2O]. These complexes revealed a non-electrolytic nature. The magnetic moment values of the complexes exhibited the paramagnetic as well as diamagnetic in nature. The coordination behavior of the metal ions towards to the investigated organometallic compounds takes place through >C=N- and –OH groups. The electronic spectral data shows that all the complexes are covalent in nature, octahedral structure with co-ordination number six. Organometallic compound complexes were loses two water molecules subjected to simultaneous thermo gravimetric analysis, to study their decomposition mechanism and thermal stability. Mass spectra of the organometallic compound and their complexes are matched with theoretical values of the masses. The prepared organometallic compounds and their metal complexes were screened for their antibacterial activity against some bacterial species, Escherichia coli, Pseudomonas aeruginosa and Staphylococcus Pyogones. The Antimicrobial activity data show the metal complexes to be more active than the parent organometallic compounds.
TECHNIQUES AND TOOLS FOR FORENSIC INVESTIGATION OF E-MAILIJNSA Journal
E-mail has emerged as the most important application on Internet for communication of messages, delivery of documents and carrying out of transactions and is used not only from computers but many other electronic gadgets like mobile phones. Over a period of year’s e-mail protocols have been secured through several security extensions and producers, however, cybercriminals continue to misuse it for illegitimate purposes by sending spam, phishing e-mails, distributing child pornography, and hate emails besides propagating viruses, worms, hoaxes and Trojan horses. Further, Internet infrastructure misuse through denial of service, waste of storage space and computational resources are costing every Internet user directly or indirectly. It is thus essential to identify and eliminate users and machines misusing e-mail service. E-mail forensic analysis is used to study the source and content of e-mail message as evidence, identifying the actual sender, recipient and date and time it was sent, etc. to collect credible evidence to bring criminals to justice. This paper is an attempt to illustrate e-mail architecture from forensics perspective. It describes roles and responsibilities of different e-mail actors and components, itemizes meta-data contained in e-mail headers, and lists protocols and ports used in it. It further describes various tools and techniques currently employed to carry out forensic investigation of an e-mail message.
The Crucial Role of SMTP Servers in Email Communication A Comprehensive Overv...teesoune
SMTP servers act as the postmen of the digital world, routing messages through a series of hops until they reach their intended destinations. This process involves communication between sender and recipient servers, ensuring that emails traverse the complex web of servers and networks seamlessly.
Through-Mail Feature: An Enhancement to Contemporary Email ServicesIRJESJOURNAL
ABSTRACT: - in many organisations where there exists several levels of hierarchy, there is often the need to route a request from one level to the next until it reaches the last level where a decision is ultimately taken. In contemporary email services, this will be usually achieved by composing a mail and either forwarding it from one intermediary to another, or carbon-copying to all intermediaries. Unfortunately, these options have several drawbacks one of which is that the content of the original request can be modified by any member in the route. In this paper, we add a through-mail feature by which a user may channel his request via a predetermined route of intermediaries entered via a purpose-built interface on the email client. The request will reside at transitbox of an intermediary for a user-specified transit time. Our transit server will have the task to monitor the transit time of a transit mail at an intermediary. Another task of the transit server is to relay a mail from one intermediary to another when former responds within the transit time or when the transit time expires. At his transitbox, the user may read the comments from past intermediaries as well as post his own. This process of email transiting is significantly more convenient, temper-proof and traceable, making it a very desired feature in an email service for many organisations.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
An Approach to Detecting Writing Styles Based on Clustering Techniquesambekarshweta25
An Approach to Detecting Writing Styles Based on Clustering Techniques
Authors:
-Devkinandan Jagtap
-Shweta Ambekar
-Harshit Singh
-Nakul Sharma (Assistant Professor)
Institution:
VIIT Pune, India
Abstract:
This paper proposes a system to differentiate between human-generated and AI-generated texts using stylometric analysis. The system analyzes text files and classifies writing styles by employing various clustering algorithms, such as k-means, k-means++, hierarchical, and DBSCAN. The effectiveness of these algorithms is measured using silhouette scores. The system successfully identifies distinct writing styles within documents, demonstrating its potential for plagiarism detection.
Introduction:
Stylometry, the study of linguistic and structural features in texts, is used for tasks like plagiarism detection, genre separation, and author verification. This paper leverages stylometric analysis to identify different writing styles and improve plagiarism detection methods.
Methodology:
The system includes data collection, preprocessing, feature extraction, dimensional reduction, machine learning models for clustering, and performance comparison using silhouette scores. Feature extraction focuses on lexical features, vocabulary richness, and readability scores. The study uses a small dataset of texts from various authors and employs algorithms like k-means, k-means++, hierarchical clustering, and DBSCAN for clustering.
Results:
Experiments show that the system effectively identifies writing styles, with silhouette scores indicating reasonable to strong clustering when k=2. As the number of clusters increases, the silhouette scores decrease, indicating a drop in accuracy. K-means and k-means++ perform similarly, while hierarchical clustering is less optimized.
Conclusion and Future Work:
The system works well for distinguishing writing styles with two clusters but becomes less accurate as the number of clusters increases. Future research could focus on adding more parameters and optimizing the methodology to improve accuracy with higher cluster values. This system can enhance existing plagiarism detection tools, especially in academic settings.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
Technical Drawings introduction to drawing of prisms
DSNs & X.400 assist in ensuring email reliability
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar – Apr. 2015), PP 11-14
www.iosrjournals.org
DOI: 10.9790/0661-17211114 www.iosrjournals.org 11 | Page
DSNs & X.400 assist in ensuring email reliability
Bassam Talib Sabri
(University of information Technology & Communications)
Abstract: While email is fairly reliable, messages do get lost. This can be due to the store-and-forward nature
of e- mail, which passes responsibility for delivering email from one mail server to another, but in doing so
exposes messages to loss, should a server not fulfil its responsibility. Some end users are more sensitive to
email unreliability than others, and seek tools with which they can detect and recover from email failures. This
paper describes tools that allow email sending software to automatically respond to reports of undeliverability
by persisting with retransmission or retransmitting to alternate recipients.
I. Introduction
Email is one of the most important network applications, with about 31 billion messages sent daily in
2003, a figure which was expected to double by 2006 [1]. However, messages can get lost, resulting in non-
delivery to intended receivers. Measurement studies suggest that about 0.69% of messages might be lost
silently (without the originator receiving a bounce message) [2], and while some servers offend more than
others, perhaps 6% of servers exhibit slight (0.03%) loss and 18% of servers exhibit higher loss rates [3]. Loss
can be caused by many points in the path that an email takes from originator to recipient. (In this paper we
emphasize the loss aspects of reliability, rather than other aspects such as whether messages are duplicated.) At
the ends, the originator may use an incorrect address for the recipient, or the recipient may have exceeded their
storage quota. Filtering, to defend against spam and malware such as worms and viruses, can also lead to loss
both at the recipient's end system or at mail servers en route from originator to recipient. Filters have mixed
impact on overall reliability, since they reduce the possibility of storage quotas being fully used, but at the risk
of misclassifying some messages as unwanted which can lead to them being disregarded. Such filters
particularly affect permission-based marketing messages which may somewhat resemble spam, and several
companies (e.g. Pivotal Veracity, Lyris, Return Path and Message Labs) monitor the deliverability of such
messages and guide sources of such messages as to how they can be tailored to maximize deliverability despite
filters. Garriss et al [4] show how such filters can be improved to reduce unreliability due to filtering. More
fundamentally, two intentional design features of email, the ability for servers to operate asynchronously and for
recipients to forward messages, can harm reliability by allowing loss from servers to evade detection by end-
users. First, email systems are intentionally designed to enable communication between entities that need not be
available simultaneously, i.e. they can operate asynchronously. This is achieved by mail servers operating in a
store-and-forward mode, whereby they accept messages from sources and attempt to relay them towards, or
deliver them to, the recipient. This is particularly useful at the end of a path, where a server can hold a message
in a mail store where it waits for a client to access the message. SMTP servers communicate with each other
through TCP, which includes a retransmission mechanism to ensure reliable transfer over the connection
between servers. However, it is still possible that messages may be lost within servers, and so the end-to-end
transfer from originator to recipient may not be reliable. The store-and-forward nature of SMTP is similar to
that of IP, and just as TCP needs to be superimposed on IP in order to ensure reliable transfer across a network,
so too something needs to be superimposed on a series of SMTP servers if there is to be end-to-end reliability
between mail originator and recipient. The SMTP specification states: “When the receiver-SMTP accepts a
piece of mail … it is accepting responsibility for delivering or relaying the message. It must take this
responsibility seriously. It MUST NOT lose the message for frivolous reasons, such as because the host later
crashes or because of a predictable resource shortage.” [5, Section 6.1]. While this recognises that servers have
the potential to contribute to unreliability, the caveats in the form of “frivolous reasons” and “predictable
resource shortage” (italics added) suggest that servers may not be able to completely avoid contributing to
unreliability. It is also important to note that it is one thing to mandate that a server “MUST NOT lose the
message”, but it is another to enforce this by checking whether an implementation of a server is losing any
messages. Just as the end-to-end arguments [6][7] require end-systems to implement error control (e.g. in
transport protocols such as TCP) because they cannot trust routers to be able to detect and recover from all
errors, so too end-users of email services need to implement error control because they cannot be certain of the
reliability of SMTP servers that their message will pass through. The second feature of email that can detract
from reliability is that recipients can automatically forward messages to (an)other recipient(s). This prevents the
originator from knowing the identity of the ultimate destination(s) of a message, and hence whether any positive
feedback that it may have received (such as Delivery Service Notifications) indicate delivery to the final
2. DSNs & X.400 assist in ensuring email reliability
DOI: 10.9790/0661-17211114 www.iosrjournals.org 12 | Page
destination or just delivery to some intermediary. Section 2 of this paper provides background about the main
protocol used for email transfer, SMTP, with emphasis on how SMTP addresses reliability. Section 3 describes
active source responses to known errors, such as automatically retransmitting a message, either later, or to an
alternate email address. Section 4 describes our implementation of these responses, and Section 5 concludes.
The authors apologise to readers for this version of this paper having very limited novelty. The version that was
submitted for review to the conference included many substantial novel ideas which filled the page limit stated
in the CFP of “20 double-spaced pages ... using 11-point type”. However the paper was accepted only as a short
paper of “4 pages using 10 point type”. More than halving the length of the paper has left little space for
substance. Readers who are interested in the more substantial ideas from the full paper should email the
authors.
II. SMTP background
Most email today is sent using the Simple Mail Transfer Protocol (SMTP) [5], although in Section 3.20
we will consider an idea from an alternative protocol, X.400, that is not yet supported by SMTP. SMTP is used
between Mail Transfer Agents (MTAs), also known as “mail servers”. An originating MTA (e.g. in an
originating mail client) uses SMTP to send a message to another MTA, usually to a local MTA charged with
forwarding messages out of the originating domain. Local MTAs may be used because they may be better
connected, and so can persist longer, than the originating MTA. A more recent reason for requiring transfer
through local MTAs is to control the flow of messages from a domain (e.g. to curb spam or the spread of
worms). SMTP servers cope with unreliable networks or unavailable peers by persisting in their attempts to
contact downstream servers. The most popular server implementation (sendmail, www.sendmail.org) retries
every 15 minutes to deliver messages, issues a warning message (with a status code beginning with 4) after
trying for 4 hours, and keeps trying for up to 4 days, after which it issues a permanent bounce message. We
return to this possibility of extensive delays (4 hours or 4 days) before the originator receives feedback when
considering retransmission by the originator in Section 3.1. Of the many fields [8] that can appear in message
headers, the most relevant to this paper are the From, Sender, To, CC, and BCC fields which are used for
addressing messages. SMTP provides several types of feedback, which can be used to detect problems,
including 3-digit numeric reply codes, enhanced dotted decimal codes, and finally Message Disposition
Notifications. These can be provided synchronously (when a client is connected to the server), or
asynchronously (after the SMTP session) in the form of a “bounce message”. For example, one server may
synchronously indicate that it accepts a message to be relayed to another server, but later find that it cannot
deliver the message to that server, and so asynchronously sends a bounce message. A source cannot equate no
negative feedback with no error, since the feedback may merely be slow to arrive, or may itself have been lost.
Delivery Status Notifications (DSNs) [9] extend these asynchronous responses by standardising their format and
providing for positive feedback. Servers that support DSN indicate so in response to an ESMTP EHLO
command, and allow the client to specify (with a “NOTIFY” parameter) when DSNs should be generated
(NEVER, or on SUCCESS, FAILURE or DELAY) and (with a “RET” parameter) whether the full message or
just headers should be included in the DSN. While the positive feedback provided by DSNs can assist in
ensuring email reliability, DSN is not yet widely deployed (e.g. at the time of writing, none of the major free
mail providers, Yahoo, Hotmail and Gmail support DSN). The preceding feedback has related to events in
servers. An originator may also be interested in whether a receiving mail client has processed a message. There
have been some attempts to provide Message Disposition notifications from user agents (e.g. RFC 3798 [10], or
by HTML messages covertly linking to message-specific images on servers that log when these images are
accessed), but these can compromise the privacy of end-users who do not wish to reveal when they read specific
messages.
III. Alternate recipients
If a message can’t be delivered to the preferred recipient, then it may be desirable to send it instead to
an alternate recipient. For example, when the destination mailbox is full, the message might be sent to an
alternate mailbox. While using an alternative is superficially obvious and simple, there are some subtleties that
are worth noting. First, there would often be some reason for preferring delivery to the initial address rather
than the alternate address, and delivering to the alternate address may prevent immediate loss but cause other
problems. For example, the alternate address may be for an email account that the recipient checks less often, in
which case using the alternate may introduce delay (before the human end-user reads the message) in order to
avoid immediate loss. Another example is that the alternate address may lead to receipt by people who are
peripheral to the intended recipient (e.g. to one or multiple peers of the intended recipient), which may cause
delay or increase load on others. Second, it is important that the sender be aware that delivery to the initial
address was unsuccessful so that they consider updating the preferred address for subsequent messages. Related
work: The dominance of Internet protocols over alternatives, such as OSI, has also led to SMTP being the
3. DSNs & X.400 assist in ensuring email reliability
DOI: 10.9790/0661-17211114 www.iosrjournals.org 13 | Page
dominant mail transfer protocol. However, email facilities in some alternate protocol suites provide features
that have not yet appeared in SMTP. X.400 [11] provided an “Alternate Recipient Assignment Service”, which
allowed an originator or recipient (or domain of the recipient) to specify (“assign”) an alternate recipient to
which messages would be sent if they could not be delivered to the “preferred recipient”. Originators could also
specify whether a message is permitted to be delivered to alternates. SMTP does not provide a corresponding
feature, even though this could be used to improve deliverability. (RFC 2156 does define a SMTP Alternate-
Recipient header field for interworking between SMTP and X.400.) Because in our implementation it is the
source that uses alternate addresses, our implementation does not need to modify SMTP or introduce a new
header field to indicate alternates to downstream servers.
IV. Implementation
These tools have been implemented in Java (for portability between operating systems) as a proxy.
The proxy would typically reside on an end-user’s computer, but could also be located on a separate machine
that serves multiple users. The use of a proxy eliminates the need to create plug-ins for separate mail user agent
programs – they need only be configured to use the localhost (127.0.0.1) as the mail server. The proxy needs
root/administrator access rights to run so that it can bind to reserved ports 25 (SMTP) and 110 (POP3), but
(when running on an end-user’s computer) it only accepts connections from the localhost to those ports, and so
does not open security problems from making more mail servers available to other machines. Figure 1 shows the
structure of the proxy software, with the interface to the client at the top, storage for messages being processed
in the central MailAccountHandler, and the interface to other mail servers on the bottom.
Figure 1: Structure of the proxy software
4. DSNs & X.400 assist in ensuring email reliability
DOI: 10.9790/0661-17211114 www.iosrjournals.org 14 | Page
V. Conclusion
This paper has described two ways by which end- systems, sources in the case of this paper, can
improve email reliability. Several more interesting techniques can be implemented at sources and receivers, and
will be the subject of a future paper.
References
[1]. P. Lyman and H. Varian: "How Much Information", http://www.sims.berkeley.edu/how-much-info-2003
[2]. T. Moors: “Email reliability”, http://uluru.ee.unsw.edu.au/~tim/dependable/email/
[3]. M. Afergan and R. Beverly: "The state of the email address", Computer Communication Review, 35(1):29- 35, Jan. 2005
[4]. S. Garriss, M. Kaminsky, M. Freedman, B. Karp, D. Mazihres and H. Yu: "RE: Reliable Email", Proc. NSDI, pp. 297-310, May
2006
[5]. J. Klensin: "Simple Mail Transfer Protocol," IETF, RFC 2821, Apr. 2001
[6]. J. Saltzer, D. Reed and D. Clark: "End-to-end arguments in system design", ACM Transactions on Computer Systems, 2(4):277-88,
Nov. 1984
[7]. T. Moors: "A critical review of "end-to-end arguments in system design"", Proc. IEEE Int'l Conf. on Comm. (ICC), pp. 1214-9,
Apr.-May 2002
[8]. G. Klyne and J. Palme: “Registration of Mail and MIME Header Fields”, IETF RFC 4021, Mar. 2005
[9]. K. Moore: "Simple Mail Transfer Protocol (SMTP) Service Extension for Delivery Status Notifications (DSNs)," IETF, RFC 3461,
Jan. 2003
[10]. T. Hansen: "Message Disposition Notification," IETF, RFC 3798, May 2004
[11]. ISO/IEC: "Information technology - Message Handling Systems (MHS) - Part 1: System and Service Overview," Standard 10021-1:
1997