Higher-level Internet Protocols:
Making the Internet Work
Lacanilao, Olvida, Sevilleja
 a system for sending messages from one
individual to another via telecommunications
links between computers or terminals using
dedicated software (Dictionary.com)
 More than 3.8 billion email users in 2018. To
reach 4.2 billion in 2022. (Radicati Group Inc.,
2018)
EMAIL
 Invented by Ray Tomlinson in 1960’s
with limited use.
 ‘STORE – AND – FORWARD’ model.
 Email was a generic term for any
electronically transmitted documents.
 Fax
EMAIL
 Has existed since BITNET
 Was given a title of “Killer App” of the
Internet
 Was seen as a ‘not so high-tech’, but ironically
is being passed through generations
 Too slow and not spontaneous
 SPAM
EMAIL
 In 2018, 52% of e-mail users see spam as on of the
major problems in the internet.
 14.5 billion spam messages per day are being sent
globally, 45% of all e-mails being sent daily.
 36% are advertising-related, 31% are adult-related, 26%
are related to financial stability and freedom.
 USA is the number one contributor of SPAM e-mails,
number two is Korea.
SPAM
Email is used by (almost)
everybody.
 Half of the population in 2018 are e-
mail users.
 Users have an average of ~2 active
email accounts in 2018 (Radicati, 2018)
EMAIL AS THE ‘KILLER APP’
 Email is adaptable and dynamic.
 Users can easily customize, personalize, and
sort their emails and the contents that they
are receiving.
Recent internet searches
Location
Latest purchases
EMAIL AS THE ‘KILLER APP’
 Email is mobile friendly
 Early access to electronic mail was often through a
shell account on a mainframe or other large-scale
computer, which was not a very user-friendly
environment. (Miller, 2014)
 Email services now have Web-based interface
 Hotmail, Outlook, YahooMail, Gmail
 Transitioned to mobile apps
EMAIL AS THE KILLER APP
Email is cheap.
EMAIL AS THE ‘KILLER APP’
Simple Mail Transfer Protocol
(SMTP)
Post Office Protocol (POP)
Internet Message Access Protocol
(IMAP)
EMAIL PROTOCOLS
 the standard protocol for email services on a
TCP/IP network.
 provides the ability to send and receive email
messages.
 provides a set of codes that simplify the
communication of email messages between email
servers.
 IETF standardized the codes so that it may be
recognized by other systems.
Simple Mail Transfer Protocol (SMTP)
Components:
 Mail User Agent (MUA)
 Mail Submission Agent (MSA)
 Mail Transfer Agent (MTA)
 Mail Delivery Agent (MDA)
Simple Mail Transfer Protocol (SMTP)
 Designed to transmit ASCII text data only
 wasn't able to handle fonts, graphics, attachments,
etc.
 Different encoding schemes are needed to
allow for attachments of binary files
 Multipurpose Internet Mail Extensions (MIME)
 UUENCODE
Simple Mail Transfer Protocol (SMTP)
Unix – to – Unix code/coding
Forwarding a binary file via email
might cause it to be corrupted.
Largely replaced by MIME
UUENCODE
 an Internet standard that helps extend the
limited capabilities of email by allowing
insertion of images, sounds and text in a
message.
 extends the format of email to support non-
ASCII characters, attachments other than text
format, and message bodies which contain
multiple parts.
Multipurpose Internet Mail
Extensions (MIME)
 Features offered by MIME
 Support for multiple attachments in a single message
 Support for non-ASCII characters
 Support for layouts, fonts and colors which are
categorized as rich text.
 Support for attachments which may contain executable
files, audio, images and video files, etc.
 Support for unlimited message length.
Multipurpose Internet Mail
Extensions (MIME)
 Since the scheme allows users to
exchange data in all formats, it can also
allow easy dissemination of viruses,
Worms, Trojans, and other malwares.
Multipurpose Internet Mail
Extensions (MIME)
 a type of computer networking and
Internet standard protocol that extracts
and retrieves email from a remote mail
server for access by the host machine.
 POP3 clients connect, retrieve all messages,
store them on the client computer, and
finally delete them from the server.
Post Office Protocol (POP)
 an Internet standard protocol used by email
clients to retrieve email messages from a mail
server over a TCP/IP connection.
 designed with the goal of permitting complete
management of an email box by multiple email
clients, therefore clients generally leave messages
on the server until the user explicitly deletes them.
Internet Message Access Protocol
(IMAP)
 For librarians, email provides options for
reference service, interlibrary loan requests,
and professional development.
 For early users, discussion groups and
communities emerged as they used email to
share ideas, questions, and answers to one
another.
EMAIL TECHNOLOGY AND ITS
APPLICATION
 a collection of user-submitted notes or
messages on various subjects that are
posted to servers on a worldwide
network.
 Each subject collection of posted notes
is known as a newsgroup.
 LISTSERV and majordomo are some hosting
sites
USENET

Higher level internet protocols (ppt)

  • 1.
    Higher-level Internet Protocols: Makingthe Internet Work Lacanilao, Olvida, Sevilleja
  • 2.
     a systemfor sending messages from one individual to another via telecommunications links between computers or terminals using dedicated software (Dictionary.com)  More than 3.8 billion email users in 2018. To reach 4.2 billion in 2022. (Radicati Group Inc., 2018) EMAIL
  • 3.
     Invented byRay Tomlinson in 1960’s with limited use.  ‘STORE – AND – FORWARD’ model.  Email was a generic term for any electronically transmitted documents.  Fax EMAIL
  • 4.
     Has existedsince BITNET  Was given a title of “Killer App” of the Internet  Was seen as a ‘not so high-tech’, but ironically is being passed through generations  Too slow and not spontaneous  SPAM EMAIL
  • 5.
     In 2018,52% of e-mail users see spam as on of the major problems in the internet.  14.5 billion spam messages per day are being sent globally, 45% of all e-mails being sent daily.  36% are advertising-related, 31% are adult-related, 26% are related to financial stability and freedom.  USA is the number one contributor of SPAM e-mails, number two is Korea. SPAM
  • 6.
    Email is usedby (almost) everybody.  Half of the population in 2018 are e- mail users.  Users have an average of ~2 active email accounts in 2018 (Radicati, 2018) EMAIL AS THE ‘KILLER APP’
  • 7.
     Email isadaptable and dynamic.  Users can easily customize, personalize, and sort their emails and the contents that they are receiving. Recent internet searches Location Latest purchases EMAIL AS THE ‘KILLER APP’
  • 8.
     Email ismobile friendly  Early access to electronic mail was often through a shell account on a mainframe or other large-scale computer, which was not a very user-friendly environment. (Miller, 2014)  Email services now have Web-based interface  Hotmail, Outlook, YahooMail, Gmail  Transitioned to mobile apps EMAIL AS THE KILLER APP
  • 9.
    Email is cheap. EMAILAS THE ‘KILLER APP’
  • 10.
    Simple Mail TransferProtocol (SMTP) Post Office Protocol (POP) Internet Message Access Protocol (IMAP) EMAIL PROTOCOLS
  • 11.
     the standardprotocol for email services on a TCP/IP network.  provides the ability to send and receive email messages.  provides a set of codes that simplify the communication of email messages between email servers.  IETF standardized the codes so that it may be recognized by other systems. Simple Mail Transfer Protocol (SMTP)
  • 12.
    Components:  Mail UserAgent (MUA)  Mail Submission Agent (MSA)  Mail Transfer Agent (MTA)  Mail Delivery Agent (MDA) Simple Mail Transfer Protocol (SMTP)
  • 13.
     Designed totransmit ASCII text data only  wasn't able to handle fonts, graphics, attachments, etc.  Different encoding schemes are needed to allow for attachments of binary files  Multipurpose Internet Mail Extensions (MIME)  UUENCODE Simple Mail Transfer Protocol (SMTP)
  • 14.
    Unix – to– Unix code/coding Forwarding a binary file via email might cause it to be corrupted. Largely replaced by MIME UUENCODE
  • 15.
     an Internetstandard that helps extend the limited capabilities of email by allowing insertion of images, sounds and text in a message.  extends the format of email to support non- ASCII characters, attachments other than text format, and message bodies which contain multiple parts. Multipurpose Internet Mail Extensions (MIME)
  • 16.
     Features offeredby MIME  Support for multiple attachments in a single message  Support for non-ASCII characters  Support for layouts, fonts and colors which are categorized as rich text.  Support for attachments which may contain executable files, audio, images and video files, etc.  Support for unlimited message length. Multipurpose Internet Mail Extensions (MIME)
  • 17.
     Since thescheme allows users to exchange data in all formats, it can also allow easy dissemination of viruses, Worms, Trojans, and other malwares. Multipurpose Internet Mail Extensions (MIME)
  • 18.
     a typeof computer networking and Internet standard protocol that extracts and retrieves email from a remote mail server for access by the host machine.  POP3 clients connect, retrieve all messages, store them on the client computer, and finally delete them from the server. Post Office Protocol (POP)
  • 19.
     an Internetstandard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection.  designed with the goal of permitting complete management of an email box by multiple email clients, therefore clients generally leave messages on the server until the user explicitly deletes them. Internet Message Access Protocol (IMAP)
  • 20.
     For librarians,email provides options for reference service, interlibrary loan requests, and professional development.  For early users, discussion groups and communities emerged as they used email to share ideas, questions, and answers to one another. EMAIL TECHNOLOGY AND ITS APPLICATION
  • 21.
     a collectionof user-submitted notes or messages on various subjects that are posted to servers on a worldwide network.  Each subject collection of posted notes is known as a newsgroup.  LISTSERV and majordomo are some hosting sites USENET

Editor's Notes

  • #2 Higher-level protocols defined within the TCP/IP standard enable users to do activities such as email, chat, file transfer, Web browsing, or VoIP. These higher-level protocols support the utility of the Internet and allow access to the said services and content.
  • #3 Email has been one of the most popular Internet applications. according to The Radicati Group Inc., there are more than 3.8 billion email users all around the world in 2018. The number of email users is increasing by around 4 percent and is expected to reach 4.2 billion in 2022. (Email Statistics Report 2018-2022)
  • #4 Store and forward – the servers accept, forward, deliver, and store messages. The term email was interchangeable, so it was difficult to track the first citation for the use that it is known today.
  • #5 BITNET was one the oldest network in New York established in 1981. Killer App is a jargon which means that the app is so necessary or desirable that you will be forced to access or avail its service. Users complaint about e-mails for not being spontaneous like cellphone texting, computer IM, and other media forums. A lot of unwanted and unsolicited emails were sent to users. 52% worry about their information being used in malicious activities.
  • #6 The term spam was derived from the classic Monty Python restaurant skit where all the breakfast options included varying amounts of the processed meat known as SPAM™, whether the customer wanted it or not. All information were referred from SpamLaws.com
  • #8 1. This old dog can learn new tricks. A change that email was able to adapt is being functional and integrated with other applications. Users may also receive emails based on their activities in the internet.
  • #9 1. With the fast and ever-moving world, everything needs to be handy anytime and anywhere. Email has been adapting to the essential changes required by different generations, and one of the greatest change that email was able to adapt was being mobile.
  • #12 SMTP is part of the application layer of the TCP/IP protocol. Using a process called "store and forward," SMTP moves your email on and across networks.  It's a kind of shorthand that allows a server to break up different parts of a message into categories the other server can understand. Internet Engineering Task Force standardized the codes so that it may be recognized by other systems. SMTP was formally introduced in 1982 by the virtue of Request for Comments 821
  • #13 The users of the email – sender Servers of the email – fully qualified domain address Software responsible for routing email from the sender to the receiver – storage of the domain address Software component responsible for the delivery of email to the recipient's mailbox – mailman Before, MTAs accept any emails from anyone from the internet because of what was called ‘Open Mail Relays’. But since this was exploited, relays were regulated in 1990s.
  • #15 The idea of using a safe encoding to transfer Unix files from one Unix system to another Unix system but without guarantee that the intervening links would all be Unix systems. Since an email message might be forwarded through or to computers with different character sets or through transports which are not 8-bit clean, or handled by programs that are not 8-bit clean; forwarding a binary file via email might cause it to be corrupted
  • #16 The MIME standard defines the content types which are of prime importance in communication protocols like HTTP for the World Wide Web.
  • #19 1. This design of POP and its procedures was driven by the need of users having only temporary Internet connections, such as dial-up access, allowing these users to retrieve e-mail when connected, and subsequently to view and manipulate the retrieved messages when offline.
  • #20 Incoming e-mail messages are sent to an e-mail server that stores messages in the recipient's e-mail box.  This extension also enabled email to transition to a web-based access, then to mobile access.
  • #21 These functions are now incorporated in blogs and social networks.