SlideShare a Scribd company logo
DATA COMMUNICATION
TOPIC:THE WHY,WHAT AND HOW OF EMAIL
Submitted by:
SHRADHA KANODIA[1MS13IS102]
VEERAVALLI HARIKA[1MS13IS121]
M.S RAMAIAH INSTITUTE OF
TECHNOLOGY
What is Electronic Mail?
• Electronic Mail - It is a facility that allows users to
transmit messages across the Internet.
• It is the most widely used application service offering
a fast conventional method of transferring information.
• It can accommodate large messages or voluminous
memos.
• It allows communication between groups or single
individuals.
HOW EMAIL IS SENT
MESSAGE ACCESS
PROTOCOLS
1) POP3
2) IMAP
Post Office Protocol
Version 3 (POP3)
• Post Office Protocol Version 3 has been the most popular protocol
has been the most popular protocol used to transfer messages from
a permanent mailbox to a local computer.
• When the user invokes a POP3 client, it establishes a TCP
connection and contacts a POP3 server on the mailbox computer.
The user sends a login and a password to authenticate the session.
If login was successful, the client sends commands to retrieve
copies of messages and to delete messages from the permanent
mailbox.
• Both SMTP servers and POP3 servers must synchronize access to
the mailbox.
POP3 Commands
• USER name: User name for authentication
• PASS password: Password used for
authentication
• STAT: Get number and total size of message
• LIST: [msg] get size of message
• RETR: msg Send message to client
• DELE: msg Delete message from mailbox
• RSET: Cancel previous delete requests.
• QUIT: Updates mailbox (deletes messages) and
quits.
Internet Message Access
Protocol (IMAP)
• An alternative to POP3 is IMAP version 4. It defines an
abstraction known as a MAILBOX. Mailboxes are located on
the same computer as a server.
• IMAP4 is a method for accessing electronic mail messages
that are kept on a mail server. It permits a client
e-mail program to view and manipulate those messages.
• Electronic mail stored on an IMAP server can be viewed
or manipulated from a desktop computer at home,
a notebook computer, or at a workstation. We can also say
that mail messages can be accessed from multiple
locations.
What are the functions
of IMAP4?
Includes operations for:
• creating mailboxes
• deleting mailboxes
• renaming mailboxes
• checking for new messages
• permanently removing messages
• setting and clearing flags
• searching
• fetching of message attributes texts, and
portions.
• IMAP provides extended functionality for
message retrieval and processing.
• Users can obtain information about a
message or examine header fields without
retrieving the entire message.
• Users can search for a specified string and
retrieve portions of a message. This is
useful for slow-speed dialup connections
since they wont need to download useless
information.
MESSAGE TRANSFER
AGENT
(SMTP)
Introduction to SMTP
• The TCP/IP Protocol specifies a standard for the
exchange of mail between machines. This
standard specifies the exact format of messages
a client on a single machine uses to transfer
mail to a server on another.
• This standard transfer protocol is known as the
Simple Mail Transfer Protocol. (SMTP) The main
objective of SMTP is to provide the reliability and
efficiency of mail transfer.
• SMTP basically focuses on how the underlying
mail delivery
system passes messages across an internet
from machine to
machine.
• SMTP does not specify how the mail system
accepts mail
from a user or how the user interface presents
messages.
• An important feature of SMTP is "mail relaying."
Mail relaying is SMTP's capability of transporting
across
networks.
• Through SMTP, a process can transfer mail to
another
process using the same or other networks via a
relay
process accessible to both networks.
• Mail messages can be passed through a
number of intermediate
relay or gateways hosts from sender to ultimate
destination.
Basic SMTP Design
User
File System
Client SMTP Server SMTP
File System
OPERATION
Simple Mail Transfer Protocol (SMTP) is an Internet standard for
electronic mail (email) transmission. Although electronic mail
servers and other mail transfer agents use SMTP to send and
receive mail messages, user-level client mail applications
typically use SMTP only for sending messages to a mail server
for relaying. For receiving messages, client applications usually
use either POP3 or IMAP.
A message transfer agent receives mail from either another MTA,
a mail submission agent (MSA), or a mail user agent (MUA).
The transmission details are specified by the Simple Mail
Transfer Protocol (SMTP). When a recipient mailbox of a
message is not hosted locally, the message is relayed, that is,
forwarded to another MTA.
Every time an MTA receives an email message, it adds
a received trace header field to the top of the header of the
message,thereby building a sequential record of MTAs handling
the message. The process of choosing a target MTA for the next
hop is also described in SMTP, but can usually be overridden by
configuring the MTA software with specific route
Security
Considerations
Mail security and spoofing
• SMTP is not a secure protocol.
• A user may spoof, which means they may trick the
protocol to send a message posing as someone else.
• Usually a user will prove that they are authentic in the
message body with a digital signature or SPF (sender
policy framework) records.
• SPF records work by telling people which machines you
send email from, and if the sender is not one of those
machines then they are lying.
• If relay is on, no authentication possible.
• Spam was a huge problem early on because early
defaults had relay on and people didn't know how to turn
it off.
Scope of operation of SMTP
servers
• An SMTP server may refuse to accept mail for any operational or
technical reason that makes sense to the site providing the server.
• If sites take excessive advantage of the right to reject traffic, the
ubiquity of email availability (one of the strengths of the Internet) will
be threatened.
• Considerable care should be taken and balance maintained if a site
decides to be selective about the traffic it will accept and process.
• In recent years, use of the relay function through arbitrary sites has
been used as part of hostile efforts to hide the actual origins of mail.
• Some sites have decided to limit the use of the relay function to
known or identifiable sources, and implementations should provide
the capability to perform this type of filtering.
• When mail is rejected for these or other policy reasons, a 550 code
should be used in response to EHLO, MAIL, or RCPT as
appropriate.

More Related Content

What's hot

Email
EmailEmail
Smtp protocol
Smtp protocolSmtp protocol
Smtp protocol
alibefkani
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
Ahmad Zahid
 
Electronic mail
Electronic mailElectronic mail
History of Email PowerPoint presentation
History of Email PowerPoint presentationHistory of Email PowerPoint presentation
History of Email PowerPoint presentation
Saad Zeeshan
 
E mail protocols
E mail protocolsE mail protocols
E mail protocols
Archana Dwivedi
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
Abid Fakhre Alam
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
Harhar Caparida
 
Spam
SpamSpam
Introduction to Email
Introduction to EmailIntroduction to Email
Introduction to Email
Made Aditya
 
Email
EmailEmail
Email - electronic mail
Email - electronic mailEmail - electronic mail
Email - electronic mail
kundana
 
Internet communication
Internet communicationInternet communication
Internet communication
Karwan Jacksi
 
pop3-imap.ppt
pop3-imap.pptpop3-imap.ppt
pop3-imap.ppt
BilalYounssi
 
Spoofing
SpoofingSpoofing
SpoofingSanjeev
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharyasankhadeep
 

What's hot (20)

Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Email
EmailEmail
Email
 
Smtp protocol
Smtp protocolSmtp protocol
Smtp protocol
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
History of Email PowerPoint presentation
History of Email PowerPoint presentationHistory of Email PowerPoint presentation
History of Email PowerPoint presentation
 
E mail protocols
E mail protocolsE mail protocols
E mail protocols
 
Basic Email
Basic EmailBasic Email
Basic Email
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Spam
SpamSpam
Spam
 
Mail server
Mail serverMail server
Mail server
 
Introduction to Email
Introduction to EmailIntroduction to Email
Introduction to Email
 
Email
EmailEmail
Email
 
Email - electronic mail
Email - electronic mailEmail - electronic mail
Email - electronic mail
 
Internet communication
Internet communicationInternet communication
Internet communication
 
pop3-imap.ppt
pop3-imap.pptpop3-imap.ppt
pop3-imap.ppt
 
Spoofing
SpoofingSpoofing
Spoofing
 
Smtp, pop3, imapv 4
Smtp, pop3, imapv 4Smtp, pop3, imapv 4
Smtp, pop3, imapv 4
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharya
 

Viewers also liked

Implementation of secure email server in cloud environment copy1
Implementation of secure email server in cloud environment   copy1Implementation of secure email server in cloud environment   copy1
Implementation of secure email server in cloud environment copy1
Solmaz Salehian
 
MPS_CV_MO_10-26-2015_Photograph_Signed_Highlighted
MPS_CV_MO_10-26-2015_Photograph_Signed_HighlightedMPS_CV_MO_10-26-2015_Photograph_Signed_Highlighted
MPS_CV_MO_10-26-2015_Photograph_Signed_HighlightedMichael Sherman
 
Fin de año
Fin de añoFin de año
Fin de año
Poleth13
 
Fabmeetup vol.23
Fabmeetup vol.23Fabmeetup vol.23
Fabmeetup vol.23
esquisse
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Marite Rojas Ojeda
 
Tugas 1 kelompok 1
Tugas 1 kelompok 1Tugas 1 kelompok 1
Tugas 1 kelompok 1
stevialdyani7
 
Best Foods For Dry Skin
Best Foods For Dry SkinBest Foods For Dry Skin
Best Foods For Dry Skin
Nurturing Health
 
Email Marketing Tools
Email Marketing ToolsEmail Marketing Tools
Email Marketing Tools
Andrea Garcia
 
Bahasan 1 lingkup alat media pendidikan
Bahasan 1 lingkup alat media pendidikanBahasan 1 lingkup alat media pendidikan
Bahasan 1 lingkup alat media pendidikan
stevialdyani7
 
Search Results in Alive Web Directory
Search Results in Alive Web DirectorySearch Results in Alive Web Directory
Search Results in Alive Web Directory
Yuri Thacker
 
Informatica aplicada
Informatica aplicadaInformatica aplicada
Informatica aplicada
Andreavimel
 
Tik kelompok 1(1)
Tik kelompok 1(1)Tik kelompok 1(1)
Tik kelompok 1(1)
stevialdyani7
 
In Ukraine at that time there was no institutions that could provide complex ...
In Ukraine at that time there was no institutions that could provide complex ...In Ukraine at that time there was no institutions that could provide complex ...
In Ukraine at that time there was no institutions that could provide complex ...
urii1969
 
Unidad educativa municipal oswaldo lombeyda
Unidad educativa municipal oswaldo lombeydaUnidad educativa municipal oswaldo lombeyda
Unidad educativa municipal oswaldo lombeyda
Poleth13
 
Teaching international students
Teaching international studentsTeaching international students
Teaching international students
Emma Kennedy
 
Influencia de las t.i.c en la gestion y reingenieria de procesos
Influencia de las t.i.c en la gestion y reingenieria de procesosInfluencia de las t.i.c en la gestion y reingenieria de procesos
Influencia de las t.i.c en la gestion y reingenieria de procesos
katy1694
 
Introdução à redes neurais artificiais
Introdução à redes neurais artificiaisIntrodução à redes neurais artificiais
Introdução à redes neurais artificiais
Robson Gomes
 
Storyboard presentation
Storyboard presentationStoryboard presentation
Storyboard presentation
georgiedownton1
 
Student Engagement and Learning Needs: helping your students learn in the cla...
Student Engagement and Learning Needs: helping your students learn in the cla...Student Engagement and Learning Needs: helping your students learn in the cla...
Student Engagement and Learning Needs: helping your students learn in the cla...
Emma Kennedy
 

Viewers also liked (20)

Implementation of secure email server in cloud environment copy1
Implementation of secure email server in cloud environment   copy1Implementation of secure email server in cloud environment   copy1
Implementation of secure email server in cloud environment copy1
 
MPS_CV_MO_10-26-2015_Photograph_Signed_Highlighted
MPS_CV_MO_10-26-2015_Photograph_Signed_HighlightedMPS_CV_MO_10-26-2015_Photograph_Signed_Highlighted
MPS_CV_MO_10-26-2015_Photograph_Signed_Highlighted
 
Fin de año
Fin de añoFin de año
Fin de año
 
Fabmeetup vol.23
Fabmeetup vol.23Fabmeetup vol.23
Fabmeetup vol.23
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Tugas 1 kelompok 1
Tugas 1 kelompok 1Tugas 1 kelompok 1
Tugas 1 kelompok 1
 
Best Foods For Dry Skin
Best Foods For Dry SkinBest Foods For Dry Skin
Best Foods For Dry Skin
 
Email Marketing Tools
Email Marketing ToolsEmail Marketing Tools
Email Marketing Tools
 
Bahasan 1 lingkup alat media pendidikan
Bahasan 1 lingkup alat media pendidikanBahasan 1 lingkup alat media pendidikan
Bahasan 1 lingkup alat media pendidikan
 
Search Results in Alive Web Directory
Search Results in Alive Web DirectorySearch Results in Alive Web Directory
Search Results in Alive Web Directory
 
Informatica aplicada
Informatica aplicadaInformatica aplicada
Informatica aplicada
 
Tik kelompok 1(1)
Tik kelompok 1(1)Tik kelompok 1(1)
Tik kelompok 1(1)
 
In Ukraine at that time there was no institutions that could provide complex ...
In Ukraine at that time there was no institutions that could provide complex ...In Ukraine at that time there was no institutions that could provide complex ...
In Ukraine at that time there was no institutions that could provide complex ...
 
iX_POV_FinalDraft
iX_POV_FinalDraftiX_POV_FinalDraft
iX_POV_FinalDraft
 
Unidad educativa municipal oswaldo lombeyda
Unidad educativa municipal oswaldo lombeydaUnidad educativa municipal oswaldo lombeyda
Unidad educativa municipal oswaldo lombeyda
 
Teaching international students
Teaching international studentsTeaching international students
Teaching international students
 
Influencia de las t.i.c en la gestion y reingenieria de procesos
Influencia de las t.i.c en la gestion y reingenieria de procesosInfluencia de las t.i.c en la gestion y reingenieria de procesos
Influencia de las t.i.c en la gestion y reingenieria de procesos
 
Introdução à redes neurais artificiais
Introdução à redes neurais artificiaisIntrodução à redes neurais artificiais
Introdução à redes neurais artificiais
 
Storyboard presentation
Storyboard presentationStoryboard presentation
Storyboard presentation
 
Student Engagement and Learning Needs: helping your students learn in the cla...
Student Engagement and Learning Needs: helping your students learn in the cla...Student Engagement and Learning Needs: helping your students learn in the cla...
Student Engagement and Learning Needs: helping your students learn in the cla...
 

Similar to how email works

retrieving the mail
retrieving the mailretrieving the mail
retrieving the mail
tumetr1
 
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLSMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
Vidhu Arora
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
Anagha Ghotkar
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - IT
Deepraj Bhujel
 
Email
EmailEmail
window server 2008 mail configuration
window server 2008 mail configurationwindow server 2008 mail configuration
window server 2008 mail configuration
anwarkade1
 
Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit v
JAIGANESH SEKAR
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
YouTubeCONTRA
 
Imap(internet massege access protocaols)
Imap(internet massege access protocaols)Imap(internet massege access protocaols)
Imap(internet massege access protocaols)
shashikant pabari
 
E mail forensics
E mail forensicsE mail forensics
E mail forensics
saddamhusain hadimani
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
Online
 
SNMP/SMTP/MIME
SNMP/SMTP/MIMESNMP/SMTP/MIME
SNMP/SMTP/MIME
Shantanu Hinge
 
DSNs & X.400 assist in ensuring email reliability
DSNs & X.400 assist in ensuring email reliabilityDSNs & X.400 assist in ensuring email reliability
DSNs & X.400 assist in ensuring email reliability
IOSR Journals
 
DSNs & X.400 assist in ensuring email reliability
DSNs & X.400 assist in ensuring email reliabilityDSNs & X.400 assist in ensuring email reliability
DSNs & X.400 assist in ensuring email reliability
IOSR Journals
 
B017211114
B017211114B017211114
B017211114
IOSR Journals
 
Introduction to basics command in linux, and working in linux
Introduction to basics command in linux, and working in linuxIntroduction to basics command in linux, and working in linux
Introduction to basics command in linux, and working in linuxGracia Marcom
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
Maitree Patel
 
Application layer
Application layerApplication layer
Application layer
Mukesh Chinta
 

Similar to how email works (20)

retrieving the mail
retrieving the mailretrieving the mail
retrieving the mail
 
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLSMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - IT
 
Email
EmailEmail
Email
 
window server 2008 mail configuration
window server 2008 mail configurationwindow server 2008 mail configuration
window server 2008 mail configuration
 
Ch22 system administration
Ch22 system administration Ch22 system administration
Ch22 system administration
 
Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit v
 
Mail server
Mail serverMail server
Mail server
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
 
Imap(internet massege access protocaols)
Imap(internet massege access protocaols)Imap(internet massege access protocaols)
Imap(internet massege access protocaols)
 
E mail forensics
E mail forensicsE mail forensics
E mail forensics
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
 
SNMP/SMTP/MIME
SNMP/SMTP/MIMESNMP/SMTP/MIME
SNMP/SMTP/MIME
 
DSNs & X.400 assist in ensuring email reliability
DSNs & X.400 assist in ensuring email reliabilityDSNs & X.400 assist in ensuring email reliability
DSNs & X.400 assist in ensuring email reliability
 
DSNs & X.400 assist in ensuring email reliability
DSNs & X.400 assist in ensuring email reliabilityDSNs & X.400 assist in ensuring email reliability
DSNs & X.400 assist in ensuring email reliability
 
B017211114
B017211114B017211114
B017211114
 
Introduction to basics command in linux, and working in linux
Introduction to basics command in linux, and working in linuxIntroduction to basics command in linux, and working in linux
Introduction to basics command in linux, and working in linux
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Application layer
Application layerApplication layer
Application layer
 

Recently uploaded

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 

Recently uploaded (20)

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 

how email works

  • 1. DATA COMMUNICATION TOPIC:THE WHY,WHAT AND HOW OF EMAIL Submitted by: SHRADHA KANODIA[1MS13IS102] VEERAVALLI HARIKA[1MS13IS121] M.S RAMAIAH INSTITUTE OF TECHNOLOGY
  • 2. What is Electronic Mail? • Electronic Mail - It is a facility that allows users to transmit messages across the Internet. • It is the most widely used application service offering a fast conventional method of transferring information. • It can accommodate large messages or voluminous memos. • It allows communication between groups or single individuals.
  • 5. Post Office Protocol Version 3 (POP3) • Post Office Protocol Version 3 has been the most popular protocol has been the most popular protocol used to transfer messages from a permanent mailbox to a local computer. • When the user invokes a POP3 client, it establishes a TCP connection and contacts a POP3 server on the mailbox computer. The user sends a login and a password to authenticate the session. If login was successful, the client sends commands to retrieve copies of messages and to delete messages from the permanent mailbox. • Both SMTP servers and POP3 servers must synchronize access to the mailbox.
  • 6. POP3 Commands • USER name: User name for authentication • PASS password: Password used for authentication • STAT: Get number and total size of message • LIST: [msg] get size of message • RETR: msg Send message to client • DELE: msg Delete message from mailbox • RSET: Cancel previous delete requests. • QUIT: Updates mailbox (deletes messages) and quits.
  • 7. Internet Message Access Protocol (IMAP) • An alternative to POP3 is IMAP version 4. It defines an abstraction known as a MAILBOX. Mailboxes are located on the same computer as a server. • IMAP4 is a method for accessing electronic mail messages that are kept on a mail server. It permits a client e-mail program to view and manipulate those messages. • Electronic mail stored on an IMAP server can be viewed or manipulated from a desktop computer at home, a notebook computer, or at a workstation. We can also say that mail messages can be accessed from multiple locations.
  • 8. What are the functions of IMAP4? Includes operations for: • creating mailboxes • deleting mailboxes • renaming mailboxes • checking for new messages • permanently removing messages • setting and clearing flags • searching • fetching of message attributes texts, and portions.
  • 9. • IMAP provides extended functionality for message retrieval and processing. • Users can obtain information about a message or examine header fields without retrieving the entire message. • Users can search for a specified string and retrieve portions of a message. This is useful for slow-speed dialup connections since they wont need to download useless information.
  • 10.
  • 12. Introduction to SMTP • The TCP/IP Protocol specifies a standard for the exchange of mail between machines. This standard specifies the exact format of messages a client on a single machine uses to transfer mail to a server on another. • This standard transfer protocol is known as the Simple Mail Transfer Protocol. (SMTP) The main objective of SMTP is to provide the reliability and efficiency of mail transfer.
  • 13. • SMTP basically focuses on how the underlying mail delivery system passes messages across an internet from machine to machine. • SMTP does not specify how the mail system accepts mail from a user or how the user interface presents messages.
  • 14. • An important feature of SMTP is "mail relaying." Mail relaying is SMTP's capability of transporting across networks. • Through SMTP, a process can transfer mail to another process using the same or other networks via a relay process accessible to both networks. • Mail messages can be passed through a number of intermediate relay or gateways hosts from sender to ultimate destination.
  • 15. Basic SMTP Design User File System Client SMTP Server SMTP File System
  • 16. OPERATION Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission. Although electronic mail servers and other mail transfer agents use SMTP to send and receive mail messages, user-level client mail applications typically use SMTP only for sending messages to a mail server for relaying. For receiving messages, client applications usually use either POP3 or IMAP. A message transfer agent receives mail from either another MTA, a mail submission agent (MSA), or a mail user agent (MUA). The transmission details are specified by the Simple Mail Transfer Protocol (SMTP). When a recipient mailbox of a message is not hosted locally, the message is relayed, that is, forwarded to another MTA.
  • 17. Every time an MTA receives an email message, it adds a received trace header field to the top of the header of the message,thereby building a sequential record of MTAs handling the message. The process of choosing a target MTA for the next hop is also described in SMTP, but can usually be overridden by configuring the MTA software with specific route
  • 19.
  • 20. Mail security and spoofing • SMTP is not a secure protocol. • A user may spoof, which means they may trick the protocol to send a message posing as someone else. • Usually a user will prove that they are authentic in the message body with a digital signature or SPF (sender policy framework) records. • SPF records work by telling people which machines you send email from, and if the sender is not one of those machines then they are lying. • If relay is on, no authentication possible. • Spam was a huge problem early on because early defaults had relay on and people didn't know how to turn it off.
  • 21. Scope of operation of SMTP servers • An SMTP server may refuse to accept mail for any operational or technical reason that makes sense to the site providing the server. • If sites take excessive advantage of the right to reject traffic, the ubiquity of email availability (one of the strengths of the Internet) will be threatened. • Considerable care should be taken and balance maintained if a site decides to be selective about the traffic it will accept and process. • In recent years, use of the relay function through arbitrary sites has been used as part of hostile efforts to hide the actual origins of mail. • Some sites have decided to limit the use of the relay function to known or identifiable sources, and implementations should provide the capability to perform this type of filtering. • When mail is rejected for these or other policy reasons, a 550 code should be used in response to EHLO, MAIL, or RCPT as appropriate.