SlideShare a Scribd company logo
26.1
ELECTRONIC MAILELECTRONIC MAIL
One of the mostOne of the most popular Internet services is electronicpopular Internet services is electronic
mail (e-mail). The designers of the Internet probablymail (e-mail). The designers of the Internet probably
never imagined the popularity of this applicationnever imagined the popularity of this application
program. Its architecture consists of severalprogram. Its architecture consists of several
components that we discuss in this chapter.components that we discuss in this chapter.
26.2
Figure 26.6 First scenario in electronic mail
26.3
When the sender and the receiver of an
e-mail are on the same system,
we need only two user agents.
Note
26.4
Figure 26.7 Second scenario in electronic mail
26.5
When the sender and the receiver of an
e-mail are on different systems, we
need two UAs and a pair of
MTAs (client and server).
Note
26.6
Figure 26.8 Third scenario in electronic mail
26.7
When the sender is connected to the
mail server via a LAN or a WAN,
we need two UAs and two pairs
of MTAs (client and server).
Note
26.8
Figure 26.9 Fourth scenario in electronic mail
26.9
Figure 26.10 Push versus pull in electronic email
26.10
When both sender and receiver are
connected to the mail server via
a LAN or a WAN, we need two
UAs, two pairs of MTAs
and a pair of MAAs.
This is the most common situation
today.
Note
26.11
Figure 26.11 Services of user agent
26.12
Some examples of command-driven
user agents are mail, pine,
and elm.
Note
26.13
Some examples of GUI-based user
agents are Eudora, Outlook, and
Netscape.
Note
26.14
Figure 26.12 Format of an e-mail
26.15
Figure 26.13 E-mail address
26.16
Figure 26.17 Commands and responses
26.17
Figure 26.18 Command format
26.18
Table 26.7 Commands
25.19
NAME SPACENAME SPACE
To be unambiguous, the names assigned to machinesTo be unambiguous, the names assigned to machines
must be carefully selected from a name space withmust be carefully selected from a name space with
complete control over the binding between the namescomplete control over the binding between the names
and IP addresses.and IP addresses.
25.20
DOMAIN NAME SPACEDOMAIN NAME SPACE
• In the postal system
• the country, state or province, city, street
address and name of the addressee.
• Hierarchical addressing ensures that there is NO
confusion between the
• Street no. 2 in Azad Nagar in Jalandhar,
Punjab and the Street no. 2 in Azad Nagar
in Ambala, Haryana.
• DNS works the same way.
25.21
Figure 25.1 Example of using the DNS service
25.22
Figure 25.2 Domain name space
25.23
Figure 25.3 Domain names and labels
Flat Name Space vs Hierarchical Name Space
 Flat Name Space: A name is assigned to an address. A
name in this space is a sequence of characters without
structure.
 Disadvantage: It cannot be used in a large system such as
the Internet because it must be centrally controlled to avoid
ambiguity and duplication.
 Hierarchical Name Space: Each name is made of several
parts. The first part can define the nature of the
organization, the second part can define the name of
an organization, the third part can define departments
in the organization, and so on. In this case, the
authority to assign and control the name spaces can be
decentralized.26.24
Fully Qualified Domain Name
 If a label is terminated by a null string, it is
called a FQDN.
 An FQDN is a domain name that contains
the full name of a host.
 It contains all labels, from the most
specific to the most general, that uniquely
define the name of the host.
 For example, the domain name
challenger.ate.tbda.edu
26.25
Partially Qualified Domain
Name If a label is not terminated by a null string, it is called a
PQDN.
 A PQDN starts from a node, but it does not reach the
root.
 It is used when the name to be resolved belongs to the
same site as the client.
 Here the resolver can supply the missing part, called the
suffix, to create an FQDN. For example, if a user at the
jhda.edu. site wants to get the IP address of the
challenger computer, he or she can define the partial
name
challenger The DNS client adds the suffix atc.jhda.edu.
before passing the address to the DNS server.
26.26
25.27
Figure 25.4 FQDN and PQDN
25.28
Figure 25.5 Domains
25.29
DISTRIBUTION OF NAME SPACEDISTRIBUTION OF NAME SPACE
The information contained in the domain name spaceThe information contained in the domain name space
must be stored. However, it is very inefficient and alsomust be stored. However, it is very inefficient and also
unreliable to have just one computer store such a hugeunreliable to have just one computer store such a huge
amount of information. In this section, we discuss theamount of information. In this section, we discuss the
distribution of the domain name space.distribution of the domain name space.
25.30
Hierarchy of name servers
26.31
25.32
Zones and domains
25.33
A primary server loads all information
from the disk file; the secondary server
loads all information from
the primary server.
When the secondary downloads
information from the primary, it is called
zone transfer.
Note
25.34
DNS IN THE INTERNETDNS IN THE INTERNET
DNS is a protocol that can be used in differentDNS is a protocol that can be used in different
platforms. In the Internet, the domain name spaceplatforms. In the Internet, the domain name space
(tree) is divided into three different sections:(tree) is divided into three different sections:
generic domainsgeneric domains
country domainscountry domains
inverse domain.inverse domain.
25.35
DNS IN THE INTERNET
25.36
Generic domains
25.37
Table 25.1 Generic domain labels
25.38
Figure 25.10 Country domains
25.39
Figure 25.11 Inverse domain
 The inverse domain is used to map an
address to a name.
 When a server has received a request
from a client to do a task.
 Server has a file that contains a list of
authorized clients, only the IP address of
the client (extracted from the received IP
packet) is listed.
 Server asks its resolver to send a query
to the DNS server to map an address to a
name to determine if the client is on the
authorized list.
 This type of query is called an inverse or
pointer (PTR) query.
25.40
RESOLUTIONRESOLUTION
Mapping a name to an address or an address to aMapping a name to an address or an address to a
name is called name-address resolution.name is called name-address resolution.
25.41
Figure 25.12 Recursive resolution
25.42
Figure 25.13 Iterative resolution

More Related Content

What's hot

Ftp
FtpFtp
COMPUTER NETWORKS UNIT 1
COMPUTER NETWORKS UNIT 1COMPUTER NETWORKS UNIT 1
COMPUTER NETWORKS UNIT 1
BON SECOURS COLLEGE FOR WOMEN
 
Lec6
Lec6Lec6
Lec6
amrnaser3
 
Email - Electronic Mail
Email - Electronic MailEmail - Electronic Mail
Email - Electronic Mail
Peter R. Egli
 
Internet technology unit 6
Internet technology unit 6Internet technology unit 6
Internet technology unit 6
WE-IT TUTORIALS
 
Chapeter 2
Chapeter 2Chapeter 2
Chapeter 2
Nazir Ahmed
 
COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2
BON SECOURS COLLEGE FOR WOMEN
 
Chapter 5 my_ppt
Chapter 5 my_pptChapter 5 my_ppt
Chapter 5 my_ppt
prachi thakor
 
OSI Transport Layer
OSI Transport LayerOSI Transport Layer
OSI Transport Layer
Sachii Dosti
 
Osi l ayers
Osi l ayersOsi l ayers
Osi l ayers
jyoti_lakhani
 
Internet mail server
Internet mail server Internet mail server
Internet mail server
Akasha Kumar Das
 
Mod2
Mod2Mod2
Smtp, pop3, imapv 4
Smtp, pop3, imapv 4Smtp, pop3, imapv 4
Smtp, pop3, imapv 4
Shwetanshu Gupta
 
Mail server using Linux(Ubuntu)
Mail server using Linux(Ubuntu)Mail server using Linux(Ubuntu)
Mail server using Linux(Ubuntu)
Navjot Navi
 
Data link layer
Data link layerData link layer
Data link layer
st2112
 
Dcn ppt on data link layer
Dcn ppt on data link layerDcn ppt on data link layer
Dcn ppt on data link layer
roma bora
 
Ccna day3
Ccna day3Ccna day3
Chap 03
Chap 03Chap 03
Chap 03
IGNOU
 
CN_Lec 5_OSI
CN_Lec 5_OSICN_Lec 5_OSI
CN_Lec 5_OSI
Rijutha Kumar
 
Week15 lec1
Week15 lec1Week15 lec1
Week15 lec1
syedhaiderraza
 

What's hot (20)

Ftp
FtpFtp
Ftp
 
COMPUTER NETWORKS UNIT 1
COMPUTER NETWORKS UNIT 1COMPUTER NETWORKS UNIT 1
COMPUTER NETWORKS UNIT 1
 
Lec6
Lec6Lec6
Lec6
 
Email - Electronic Mail
Email - Electronic MailEmail - Electronic Mail
Email - Electronic Mail
 
Internet technology unit 6
Internet technology unit 6Internet technology unit 6
Internet technology unit 6
 
Chapeter 2
Chapeter 2Chapeter 2
Chapeter 2
 
COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2COMPUTER NETWORKS UNIT 2
COMPUTER NETWORKS UNIT 2
 
Chapter 5 my_ppt
Chapter 5 my_pptChapter 5 my_ppt
Chapter 5 my_ppt
 
OSI Transport Layer
OSI Transport LayerOSI Transport Layer
OSI Transport Layer
 
Osi l ayers
Osi l ayersOsi l ayers
Osi l ayers
 
Internet mail server
Internet mail server Internet mail server
Internet mail server
 
Mod2
Mod2Mod2
Mod2
 
Smtp, pop3, imapv 4
Smtp, pop3, imapv 4Smtp, pop3, imapv 4
Smtp, pop3, imapv 4
 
Mail server using Linux(Ubuntu)
Mail server using Linux(Ubuntu)Mail server using Linux(Ubuntu)
Mail server using Linux(Ubuntu)
 
Data link layer
Data link layerData link layer
Data link layer
 
Dcn ppt on data link layer
Dcn ppt on data link layerDcn ppt on data link layer
Dcn ppt on data link layer
 
Ccna day3
Ccna day3Ccna day3
Ccna day3
 
Chap 03
Chap 03Chap 03
Chap 03
 
CN_Lec 5_OSI
CN_Lec 5_OSICN_Lec 5_OSI
CN_Lec 5_OSI
 
Week15 lec1
Week15 lec1Week15 lec1
Week15 lec1
 

Similar to Electronic mail and Domain Name System

DNS.ppt
DNS.pptDNS.ppt
DNS.ppt
SANDY4772
 
ch25.ppt
ch25.pptch25.ppt
ch25.ppt
ch25.pptch25.ppt
ch25.ppt
MannyAnacleto1
 
Ch25
Ch25Ch25
Ch25
Mothi R
 
DNS-DOmain name system DNS
DNS-DOmain name system                   DNSDNS-DOmain name system                   DNS
DNS-DOmain name system DNS
8lekha
 
Transport and Application Layer : Domain Name System
Transport and Application Layer : Domain Name SystemTransport and Application Layer : Domain Name System
Transport and Application Layer : Domain Name System
GopinathSamydurai
 
25-Domain Name System.ppt
25-Domain Name System.ppt25-Domain Name System.ppt
25-Domain Name System.ppt
thiru17270
 
Chapter 25
Chapter 25Chapter 25
Chapter 25
Faisal Mehmood
 
Ch25
Ch25Ch25
Chapter 26
Chapter 26Chapter 26
Chapter 26
Faisal Mehmood
 
Chapter06
Chapter06Chapter06
Chapter06
Muhammad Ahad
 
25 DNS
25 DNS25 DNS
25 DNS
Ahmar Hashmi
 
Ch 25
Ch 25Ch 25
Application Layer.pptx
Application Layer.pptxApplication Layer.pptx
Application layer
Application layerApplication layer
Application layer
Sisir Ghosh
 
Dns
Dns Dns
Chap 19
Chap 19Chap 19
Chap 19
Bayu Murti
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & Subnetting
Vivek chan
 
DNS_CN_CN_____________________-_____.ppt
DNS_CN_CN_____________________-_____.pptDNS_CN_CN_____________________-_____.ppt
DNS_CN_CN_____________________-_____.ppt
POOJITSAI1
 
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
RashidFaridChishti
 

Similar to Electronic mail and Domain Name System (20)

DNS.ppt
DNS.pptDNS.ppt
DNS.ppt
 
ch25.ppt
ch25.pptch25.ppt
ch25.ppt
 
ch25.ppt
ch25.pptch25.ppt
ch25.ppt
 
Ch25
Ch25Ch25
Ch25
 
DNS-DOmain name system DNS
DNS-DOmain name system                   DNSDNS-DOmain name system                   DNS
DNS-DOmain name system DNS
 
Transport and Application Layer : Domain Name System
Transport and Application Layer : Domain Name SystemTransport and Application Layer : Domain Name System
Transport and Application Layer : Domain Name System
 
25-Domain Name System.ppt
25-Domain Name System.ppt25-Domain Name System.ppt
25-Domain Name System.ppt
 
Chapter 25
Chapter 25Chapter 25
Chapter 25
 
Ch25
Ch25Ch25
Ch25
 
Chapter 26
Chapter 26Chapter 26
Chapter 26
 
Chapter06
Chapter06Chapter06
Chapter06
 
25 DNS
25 DNS25 DNS
25 DNS
 
Ch 25
Ch 25Ch 25
Ch 25
 
Application Layer.pptx
Application Layer.pptxApplication Layer.pptx
Application Layer.pptx
 
Application layer
Application layerApplication layer
Application layer
 
Dns
Dns Dns
Dns
 
Chap 19
Chap 19Chap 19
Chap 19
 
CyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & SubnettingCyberLab TCP/IP and IP Addressing & Subnetting
CyberLab TCP/IP and IP Addressing & Subnetting
 
DNS_CN_CN_____________________-_____.ppt
DNS_CN_CN_____________________-_____.pptDNS_CN_CN_____________________-_____.ppt
DNS_CN_CN_____________________-_____.ppt
 
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
Linux Systems Prograramming: Unix Domain, Internet Domain (TCP, UDP) Socket P...
 

Recently uploaded

Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
PuktoonEngr
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 

Recently uploaded (20)

Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 

Electronic mail and Domain Name System

  • 1. 26.1 ELECTRONIC MAILELECTRONIC MAIL One of the mostOne of the most popular Internet services is electronicpopular Internet services is electronic mail (e-mail). The designers of the Internet probablymail (e-mail). The designers of the Internet probably never imagined the popularity of this applicationnever imagined the popularity of this application program. Its architecture consists of severalprogram. Its architecture consists of several components that we discuss in this chapter.components that we discuss in this chapter.
  • 2. 26.2 Figure 26.6 First scenario in electronic mail
  • 3. 26.3 When the sender and the receiver of an e-mail are on the same system, we need only two user agents. Note
  • 4. 26.4 Figure 26.7 Second scenario in electronic mail
  • 5. 26.5 When the sender and the receiver of an e-mail are on different systems, we need two UAs and a pair of MTAs (client and server). Note
  • 6. 26.6 Figure 26.8 Third scenario in electronic mail
  • 7. 26.7 When the sender is connected to the mail server via a LAN or a WAN, we need two UAs and two pairs of MTAs (client and server). Note
  • 8. 26.8 Figure 26.9 Fourth scenario in electronic mail
  • 9. 26.9 Figure 26.10 Push versus pull in electronic email
  • 10. 26.10 When both sender and receiver are connected to the mail server via a LAN or a WAN, we need two UAs, two pairs of MTAs and a pair of MAAs. This is the most common situation today. Note
  • 12. 26.12 Some examples of command-driven user agents are mail, pine, and elm. Note
  • 13. 26.13 Some examples of GUI-based user agents are Eudora, Outlook, and Netscape. Note
  • 19. 25.19 NAME SPACENAME SPACE To be unambiguous, the names assigned to machinesTo be unambiguous, the names assigned to machines must be carefully selected from a name space withmust be carefully selected from a name space with complete control over the binding between the namescomplete control over the binding between the names and IP addresses.and IP addresses.
  • 20. 25.20 DOMAIN NAME SPACEDOMAIN NAME SPACE • In the postal system • the country, state or province, city, street address and name of the addressee. • Hierarchical addressing ensures that there is NO confusion between the • Street no. 2 in Azad Nagar in Jalandhar, Punjab and the Street no. 2 in Azad Nagar in Ambala, Haryana. • DNS works the same way.
  • 21. 25.21 Figure 25.1 Example of using the DNS service
  • 23. 25.23 Figure 25.3 Domain names and labels
  • 24. Flat Name Space vs Hierarchical Name Space  Flat Name Space: A name is assigned to an address. A name in this space is a sequence of characters without structure.  Disadvantage: It cannot be used in a large system such as the Internet because it must be centrally controlled to avoid ambiguity and duplication.  Hierarchical Name Space: Each name is made of several parts. The first part can define the nature of the organization, the second part can define the name of an organization, the third part can define departments in the organization, and so on. In this case, the authority to assign and control the name spaces can be decentralized.26.24
  • 25. Fully Qualified Domain Name  If a label is terminated by a null string, it is called a FQDN.  An FQDN is a domain name that contains the full name of a host.  It contains all labels, from the most specific to the most general, that uniquely define the name of the host.  For example, the domain name challenger.ate.tbda.edu 26.25
  • 26. Partially Qualified Domain Name If a label is not terminated by a null string, it is called a PQDN.  A PQDN starts from a node, but it does not reach the root.  It is used when the name to be resolved belongs to the same site as the client.  Here the resolver can supply the missing part, called the suffix, to create an FQDN. For example, if a user at the jhda.edu. site wants to get the IP address of the challenger computer, he or she can define the partial name challenger The DNS client adds the suffix atc.jhda.edu. before passing the address to the DNS server. 26.26
  • 29. 25.29 DISTRIBUTION OF NAME SPACEDISTRIBUTION OF NAME SPACE The information contained in the domain name spaceThe information contained in the domain name space must be stored. However, it is very inefficient and alsomust be stored. However, it is very inefficient and also unreliable to have just one computer store such a hugeunreliable to have just one computer store such a huge amount of information. In this section, we discuss theamount of information. In this section, we discuss the distribution of the domain name space.distribution of the domain name space.
  • 31. 26.31
  • 33. 25.33 A primary server loads all information from the disk file; the secondary server loads all information from the primary server. When the secondary downloads information from the primary, it is called zone transfer. Note
  • 34. 25.34 DNS IN THE INTERNETDNS IN THE INTERNET DNS is a protocol that can be used in differentDNS is a protocol that can be used in different platforms. In the Internet, the domain name spaceplatforms. In the Internet, the domain name space (tree) is divided into three different sections:(tree) is divided into three different sections: generic domainsgeneric domains country domainscountry domains inverse domain.inverse domain.
  • 35. 25.35 DNS IN THE INTERNET
  • 37. 25.37 Table 25.1 Generic domain labels
  • 39. 25.39 Figure 25.11 Inverse domain  The inverse domain is used to map an address to a name.  When a server has received a request from a client to do a task.  Server has a file that contains a list of authorized clients, only the IP address of the client (extracted from the received IP packet) is listed.  Server asks its resolver to send a query to the DNS server to map an address to a name to determine if the client is on the authorized list.  This type of query is called an inverse or pointer (PTR) query.
  • 40. 25.40 RESOLUTIONRESOLUTION Mapping a name to an address or an address to aMapping a name to an address or an address to a name is called name-address resolution.name is called name-address resolution.