SlideShare a Scribd company logo
SHISHPAL VISHNOI
NIT SRINAGAR
ORIGIN
The birth of electronic mail(e-mail) occurred in the 1965 at Massachusetts Institute of Technology was “mailbox”. Mailbox is a file in a
user’s home directory that was readable by only that user. After that another program designed called “SNGMSG” to send messages on
came computer. With the advancement of network’s technology, an electronic mail message file to place in 1971 when a computer
engineer named Ray Tomlinson sent a test message between two machines via ARPANET – the precursor to the internet.
He use “@” symbol from keyboard to denote sending messages from one to another computers. Larry Robert invented “Email folder”.
In 1975, John Vittal developed software to organized Email. Then further develop into “offline mode” for “offline readers”. After that
email had really taken off and commercial packages began appear.
MAIL SERVERS
Simple mail transfer protocol (SMTP)
Post Office protocol(POP3)
Internet Mail Access Protocol(IMAP)
Types of E-mail
E-mail are broadly categories into three types:-
1. Marketing Emails
2. Notification Emails
3. Transactional Emails
IMPORTANCE
 Saves Money
 Saves Time
 Instant Response
 Regular Communication
 Going Viral
 No need to speak to recipient
 Messages can be marked as urgent
 Messages can be read as convenient
 Incoming messages are saved
Email reduces volume of paper
HTTP AND HTTPS
INTRO
 The Hyper Text Transfer Protocol(HTTP) is a client-server
network protocol.
 In use by the World-Wide Web since 1990.
 It is based on Request – Response Paradigm.
WHAT IS A PROTOCOL AND HTTP
• A Protocol is a standard procedure for defining and regulating communication. For
example TCP,UDP,HTTP etc.
• HTTP is the foundation of data communication for the World Wide Web.
• The HTTP is the Web’s application-layer protocol for transferring various forms of
data between server and client like plaintext , hypertext ,image , videos and sounds.
HTTPS
 HTTPS stands for Hypertext Transfer Protocol over Secure Socket Layer, or
HTTP over SSL.
 SSL acts like a sub layer under regular HTTP application layering .
 HTTPS encrypts an HTTP message prior to transmission and decrypts a message
upon arrival.
HTTPS by default used port 443 as opposed to the standard HTTP port of 8o.
FILE TRANSFER PROTOCOL
FILE TRANSFER PROTOCOL
• Allows two computers , a client and server, to connect over the internet.
• During this connection the server and client are able to then transfer various
files.
• This is done through converting files into binary and then transmitting files
into binary and then transmitting the data, this concise process allows
someone to download or upload a file to the internet.
FEATURES
• FTP operates in a client and server environment , meaning that the
remote machine is configured as a server, and consequently waits for
the other machine (client) to request a service from it.
• In UNIX , the service is provided by what is called a daemon, a small
task that runs in the background . The FTP daemon is called ftpd.
EXAMPLE
• Downloading MP3.
• Online games rely heavily on FTP.
• Other events like auctions and online trading use FTP to transact
business.
• FTP is commonly used to transfer Web page files from their
creator to the computer that acts as their server for everyone on
the internet.
THANKS

More Related Content

What's hot

Http Introduction
Http IntroductionHttp Introduction
Http Introduction
Akshay Dhole
 
internet protocol
internet protocolinternet protocol
internet protocol
rajshreemuthiah
 
Tcp vs udp difference and comparison diffen
Tcp vs udp   difference and comparison   diffenTcp vs udp   difference and comparison   diffen
Tcp vs udp difference and comparison diffen
Harikiran Raju
 
IGMP
IGMPIGMP
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
Anagha Ghotkar
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
JoshuaKimmich1
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
guest029bcd
 
Electronic mail - Computer Networks
Electronic mail - Computer NetworksElectronic mail - Computer Networks
Electronic mail - Computer Networks
Umme Jamal
 
Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp) Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp)
RochakSrivastava3
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
Shimona Agarwal
 
Network protocals
Network protocalsNetwork protocals
Network protocals
reddivarihareesh
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
selvakumar_b1985
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
Dulith Kasun
 
Topic: ISDN (Integrated Services Digital Network)
Topic: ISDN (Integrated Services Digital Network)Topic: ISDN (Integrated Services Digital Network)
Topic: ISDN (Integrated Services Digital Network)
Dr Rajiv Srivastava
 
HTTP Protocol Basic
HTTP Protocol BasicHTTP Protocol Basic
HTTP Protocol Basic
Chuong Mai
 
Delay , Loss & Throughput
Delay , Loss & ThroughputDelay , Loss & Throughput
Delay , Loss & Throughput
Tutor in Tuition Classes
 
POP3 Post Office Protocol
POP3 Post Office ProtocolPOP3 Post Office Protocol
POP3 Post Office Protocol
Samreen Reyaz Ansari
 
Ftp: a slideshow on File transfer protocol
Ftp: a slideshow on File transfer protocol Ftp: a slideshow on File transfer protocol
Ftp: a slideshow on File transfer protocol
Lina Guha Roy
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptx
DRREC
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
TheGodfather HA
 

What's hot (20)

Http Introduction
Http IntroductionHttp Introduction
Http Introduction
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Tcp vs udp difference and comparison diffen
Tcp vs udp   difference and comparison   diffenTcp vs udp   difference and comparison   diffen
Tcp vs udp difference and comparison diffen
 
IGMP
IGMPIGMP
IGMP
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
Electronic mail - Computer Networks
Electronic mail - Computer NetworksElectronic mail - Computer Networks
Electronic mail - Computer Networks
 
Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp) Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp)
 
Hypertext transfer protocol (http)
Hypertext transfer protocol (http)Hypertext transfer protocol (http)
Hypertext transfer protocol (http)
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
 
Internet protocol (ip) ppt
Internet protocol (ip) pptInternet protocol (ip) ppt
Internet protocol (ip) ppt
 
Topic: ISDN (Integrated Services Digital Network)
Topic: ISDN (Integrated Services Digital Network)Topic: ISDN (Integrated Services Digital Network)
Topic: ISDN (Integrated Services Digital Network)
 
HTTP Protocol Basic
HTTP Protocol BasicHTTP Protocol Basic
HTTP Protocol Basic
 
Delay , Loss & Throughput
Delay , Loss & ThroughputDelay , Loss & Throughput
Delay , Loss & Throughput
 
POP3 Post Office Protocol
POP3 Post Office ProtocolPOP3 Post Office Protocol
POP3 Post Office Protocol
 
Ftp: a slideshow on File transfer protocol
Ftp: a slideshow on File transfer protocol Ftp: a slideshow on File transfer protocol
Ftp: a slideshow on File transfer protocol
 
IOT PROTOCOLS.pptx
IOT PROTOCOLS.pptxIOT PROTOCOLS.pptx
IOT PROTOCOLS.pptx
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 

Similar to Email HTTP And FTP

Application Layer
Application LayerApplication Layer
Application Layer
Sweta Kumari Barnwal
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocols
Lexume1
 
Ways to-access-inetrnet-
Ways to-access-inetrnet-Ways to-access-inetrnet-
Ways to-access-inetrnet-
markgernale24
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
Tallat Satti
 
Module 1 Basic.pptx
Module 1 Basic.pptxModule 1 Basic.pptx
Module 1 Basic.pptx
reddragon32
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocols
Priyanka Shinde
 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
nitashach22
 
Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)
IMRAN KHAN
 
How the internet works
How the internet worksHow the internet works
How the internet works
ftcim
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Works
ftz 420
 
Services provided by the internet
Services provided by the internetServices provided by the internet
Services provided by the internet
University of Gujrat
 
Internet and web by Gulshan K Maheshwari(QAU)
Internet and web by Gulshan  K Maheshwari(QAU)Internet and web by Gulshan  K Maheshwari(QAU)
Internet and web by Gulshan K Maheshwari(QAU)
GulshanKumar368
 
INTERNET APPLICATION AND EMAIL:
INTERNET APPLICATION AND EMAIL:INTERNET APPLICATION AND EMAIL:
INTERNET APPLICATION AND EMAIL:
shahzadebaujiti
 
How the Internet Works
How the Internet WorksHow the Internet Works
How the Internet Works
Sharique Masood
 
internet protocol
internet protocolinternet protocol
internet protocol
Afeef Musthafa
 
Unit 4
Unit 4Unit 4
Unit 4
elhabib5050
 
Internet.
Internet.Internet.
Internet ok ok (1)
Internet ok ok (1)Internet ok ok (1)
Internet ok ok (1)
asanchez123
 
Internet.
Internet. Internet.
Internet.
Mariasg7
 
E business internet_basics
E business internet_basicsE business internet_basics
E business internet_basics
Radiant Minds
 

Similar to Email HTTP And FTP (20)

Application Layer
Application LayerApplication Layer
Application Layer
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocols
 
Ways to-access-inetrnet-
Ways to-access-inetrnet-Ways to-access-inetrnet-
Ways to-access-inetrnet-
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
Module 1 Basic.pptx
Module 1 Basic.pptxModule 1 Basic.pptx
Module 1 Basic.pptx
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocols
 
network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
 
Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)
 
How the internet works
How the internet worksHow the internet works
How the internet works
 
Internet And How It Works
Internet And How It WorksInternet And How It Works
Internet And How It Works
 
Services provided by the internet
Services provided by the internetServices provided by the internet
Services provided by the internet
 
Internet and web by Gulshan K Maheshwari(QAU)
Internet and web by Gulshan  K Maheshwari(QAU)Internet and web by Gulshan  K Maheshwari(QAU)
Internet and web by Gulshan K Maheshwari(QAU)
 
INTERNET APPLICATION AND EMAIL:
INTERNET APPLICATION AND EMAIL:INTERNET APPLICATION AND EMAIL:
INTERNET APPLICATION AND EMAIL:
 
How the Internet Works
How the Internet WorksHow the Internet Works
How the Internet Works
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Unit 4
Unit 4Unit 4
Unit 4
 
Internet.
Internet.Internet.
Internet.
 
Internet ok ok (1)
Internet ok ok (1)Internet ok ok (1)
Internet ok ok (1)
 
Internet.
Internet. Internet.
Internet.
 
E business internet_basics
E business internet_basicsE business internet_basics
E business internet_basics
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

Email HTTP And FTP

  • 2.
  • 3. ORIGIN The birth of electronic mail(e-mail) occurred in the 1965 at Massachusetts Institute of Technology was “mailbox”. Mailbox is a file in a user’s home directory that was readable by only that user. After that another program designed called “SNGMSG” to send messages on came computer. With the advancement of network’s technology, an electronic mail message file to place in 1971 when a computer engineer named Ray Tomlinson sent a test message between two machines via ARPANET – the precursor to the internet. He use “@” symbol from keyboard to denote sending messages from one to another computers. Larry Robert invented “Email folder”. In 1975, John Vittal developed software to organized Email. Then further develop into “offline mode” for “offline readers”. After that email had really taken off and commercial packages began appear.
  • 4. MAIL SERVERS Simple mail transfer protocol (SMTP) Post Office protocol(POP3) Internet Mail Access Protocol(IMAP) Types of E-mail E-mail are broadly categories into three types:- 1. Marketing Emails 2. Notification Emails 3. Transactional Emails
  • 5. IMPORTANCE  Saves Money  Saves Time  Instant Response  Regular Communication  Going Viral  No need to speak to recipient  Messages can be marked as urgent  Messages can be read as convenient  Incoming messages are saved Email reduces volume of paper
  • 7. INTRO  The Hyper Text Transfer Protocol(HTTP) is a client-server network protocol.  In use by the World-Wide Web since 1990.  It is based on Request – Response Paradigm.
  • 8. WHAT IS A PROTOCOL AND HTTP • A Protocol is a standard procedure for defining and regulating communication. For example TCP,UDP,HTTP etc. • HTTP is the foundation of data communication for the World Wide Web. • The HTTP is the Web’s application-layer protocol for transferring various forms of data between server and client like plaintext , hypertext ,image , videos and sounds.
  • 9. HTTPS  HTTPS stands for Hypertext Transfer Protocol over Secure Socket Layer, or HTTP over SSL.  SSL acts like a sub layer under regular HTTP application layering .  HTTPS encrypts an HTTP message prior to transmission and decrypts a message upon arrival. HTTPS by default used port 443 as opposed to the standard HTTP port of 8o.
  • 11. FILE TRANSFER PROTOCOL • Allows two computers , a client and server, to connect over the internet. • During this connection the server and client are able to then transfer various files. • This is done through converting files into binary and then transmitting files into binary and then transmitting the data, this concise process allows someone to download or upload a file to the internet.
  • 12. FEATURES • FTP operates in a client and server environment , meaning that the remote machine is configured as a server, and consequently waits for the other machine (client) to request a service from it. • In UNIX , the service is provided by what is called a daemon, a small task that runs in the background . The FTP daemon is called ftpd.
  • 13. EXAMPLE • Downloading MP3. • Online games rely heavily on FTP. • Other events like auctions and online trading use FTP to transact business. • FTP is commonly used to transfer Web page files from their creator to the computer that acts as their server for everyone on the internet.