SlideShare a Scribd company logo
Web Platform
Presented By
Priyanka Shinde (M - 3248)
What is a protocol after all?
 Protocol is a standard used to define a method of
exchanging data over a computer network such as local
area network, Internet, Intranet
 Protocols define how messages are sent and received, i.e.
the format and order of them, what happens when
messages are transmitted and received.
 Each protocol has its own method of how data is
formatted when sent and what to do with it once received,
how that data is compressed or how to check for errors in
data.
 The protocol can be implemented either in hardware or in
software.
Internet Protocol (IP)
It is a protocol by which data is sent from one
computer to another on the Internet.
Each computer (known as a host) on the Internet
has at least one IP address that uniquely
identifies it from all other computers on the
Internet.
When you send or receive data (for example, an
e-mail note or a Web page), the message gets
divided into little chunks called packets.
 Packets can arrive in a different order than the order they were
sent in. The Internet Protocol just delivers them. It's up to
another protocol, the Transmission Control Protocol (TCP) to
put them back in the right order.
 Each of these packets contains both the sender's Internet
address and the receiver's address
 Protocol version 4 (IPv4) standard that features IP addresses
four bytes (32 bits) in length.
 The newer Internet Protocol version 6 (IPv6) standard features
addresses 16 bytes (128 bits) in length.
Hypertext Transfer Protocol
(HTTP)
 HTTP is a set of standards that allow
users of the World Wide Web to
exchange information found on web
pages.
 The term HTTP was coined by Ted
Nelson
 HTTP commonly utilizes port 80, 8008,
or 8080
 When wanting to access any web page
enter http:// in front of the web
address, which tells the browser to
communicate over HTTP
Hypertext Transfer Protocol over
Secure (HTTPS)
 It is a secure method of accessing or sending information across
a web page.
 All data sent over HTTPS is encrypted before it is sent, this
prevents anyone from understanding that information if
intercepted.
 Because data is encrypted over HTTPS, it is slower than HTTP,
which is why HTTPS is only used when requiring login
information or with pages that contain sensitive information
such as an online bank web page.
 HTTPS uses port 443 to transfer its information.
 HTTPS is first used in HTTP/1.1
File Transfer Protocol (FTP)
File Transfer Protocol (FTP)
• Standard Internet protocol for transmitting files between
computers on the Internet.
• First proposed on April 16, 1971 by Abhay Bhushan
• Used to transfer Web page files from their creator to the
computer that acts as their server for everyone on the
Internet.
• It's also commonly used to download programs and other
files to your computer from other servers.
Contd…
• Your Web browser can also make FTP requests to
download programs you select from a Web page.
• Using FTP, you can also update (delete, rename,
move, and copy) files at a server.
• You need to logon to an FTP server.
• FTP is most commonly used to download a file
from a server using the Internet or to upload a file
to a server (e.g., uploading a Web page file to a
server).
Email Protocols
Interactions between email servers and
clients are governed by email protocols.
The most common email protocols are
POP - Post Office Protocol
IMAP - Internet Mail Access Protocol
SMTP - Simple Mail Transport Protocol
Post Office Protocol (POP3)
Most recent version of a standard protocol for
receiving e-mail.
Provides a simple, standardized way for users
to access mailboxes and download messages
to their computers.
When using the POP protocol all eMail
messages will be downloaded from the mail
server to your local computer
Most POP clients also provide an option to
leave copies of email on the server.
Advantage is that once messages are downloaded
you can cut the internet connection and read your
email at your leisure without incurring further
communication costs
protocol is built into most popular e-mail
products, such as Eudora and Outlook
Express.
It's also built into the Netscape and Microsoft
Internet Explorer browsers.
The conventional port number for POP3 is
110.
Internet Mail Access Protocol (IMAP)
 IMAP was developed at Stanford University in 1986
 Standard protocol for accessing e-mail from your local
server.
 The latest version, IMAP4, is similar to POP3 but
supports some additional features.
 For example, with IMAP4, you can search through
your e-mail messages for keywords while the
messages are still on mail server. You can then choose
which messages to download to your machine.
 Port - 143
Confused?????
Difference between POP3 & IMAP
IMAP POP3
It is a method of accessing
e-mail messages on a
server without having to
download them to your
local hard drive
POP3 requires users to
download messages to
their hard drive before
reading them
The advantage of using an IMAP mail server is that
users can check their mail from multiple computers
and always see the same messages.
This is because the messages stay on the server until
the user chooses to download them to his or her local
drive.
Simple Mail Transfer Protocol
(SMTP)
 SMTP was created in the early 1980's
 used by the Mail Transfer Agent (MTA) to deliver your eMail to the
recipient's mail server.
 only be used to send emails, not to receive them.
 This is why you need to specify both the POP or IMAP server and
the SMTP server when you configure your e-mail application.
 SMTP usually is implemented to operate over Internet port 25.
 An alternative to SMTP that is widely used in Europe is X.400.
 Many mail servers now support Extended Simple Mail Transfer
Protocol (ESMTP), which allows multimedia files to be delivered as
e-mail.
Multipurpose Internet Mail
Extensions (MIME)
Multipurpose Internet Mail
Extensions (MIME)
 MIME was defined in 1992 by the Internet Engineering Task
Force (IETF)
 Many e-mail clients now support MIME, which enables them to
send and receive graphics, audio, and video files via the
Internet mail system.
 There are many predefined MIME types, such as GIF graphics
files and PostScript files.
 In addition, MIME supports messages in character sets other
than ASCII.
 A new version, called S/MIME, supports encrypted messages.
Information on protocols-email protocols

More Related Content

What's hot

Smtp
SmtpSmtp
Smtp
Eri Alam
 
Ssl https
Ssl httpsSsl https
Ssl https
Andrada Boldis
 
FTP
FTPFTP
HTTPS
HTTPSHTTPS
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
selvakumar_b1985
 
FTP
FTPFTP
Http protocol
Http protocolHttp protocol
Http protocol
Arpita Naik
 
E mail protocols
E mail protocolsE mail protocols
E mail protocols
Archana Dwivedi
 
E mail protocol - SMTP
E mail protocol - SMTPE mail protocol - SMTP
E mail protocol - SMTP
Md Syed Ahamad
 
Introduction to Email
Introduction to EmailIntroduction to Email
Introduction to Email
Made Aditya
 
Application layer protocol - Electronic Mail
Application layer protocol - Electronic MailApplication layer protocol - Electronic Mail
Application layer protocol - Electronic Mail
AmishaSahu3
 
Domain Name System (DNS)
Domain Name System (DNS)Domain Name System (DNS)
Domain Name System (DNS)
Dhingani Harshil
 
Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layer
Serious_SamSoul
 
Email server system1.ppt
Email server system1.pptEmail server system1.ppt
Email server system1.ppt
Pooja Ladda
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
Shubham Srivastava
 
Electronic mail - Computer Networks
Electronic mail - Computer NetworksElectronic mail - Computer Networks
Electronic mail - Computer Networks
Umme Jamal
 
Email: Introduction
Email: IntroductionEmail: Introduction
Email: Introduction
GunjanSharma211
 
All about email
All about emailAll about email
All about email
estefana4
 
E mail flow
E mail flowE mail flow
E mail flow
Harish Kumar
 
Client Server Network By Usman Ihsan
Client Server Network By Usman IhsanClient Server Network By Usman Ihsan
Client Server Network By Usman Ihsan
Subhan_Virk_UAF
 

What's hot (20)

Smtp
SmtpSmtp
Smtp
 
Ssl https
Ssl httpsSsl https
Ssl https
 
FTP
FTPFTP
FTP
 
HTTPS
HTTPSHTTPS
HTTPS
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
 
FTP
FTPFTP
FTP
 
Http protocol
Http protocolHttp protocol
Http protocol
 
E mail protocols
E mail protocolsE mail protocols
E mail protocols
 
E mail protocol - SMTP
E mail protocol - SMTPE mail protocol - SMTP
E mail protocol - SMTP
 
Introduction to Email
Introduction to EmailIntroduction to Email
Introduction to Email
 
Application layer protocol - Electronic Mail
Application layer protocol - Electronic MailApplication layer protocol - Electronic Mail
Application layer protocol - Electronic Mail
 
Domain Name System (DNS)
Domain Name System (DNS)Domain Name System (DNS)
Domain Name System (DNS)
 
Lecture 6 -_presentation_layer
Lecture 6 -_presentation_layerLecture 6 -_presentation_layer
Lecture 6 -_presentation_layer
 
Email server system1.ppt
Email server system1.pptEmail server system1.ppt
Email server system1.ppt
 
Hypertext Transfer Protocol
Hypertext Transfer ProtocolHypertext Transfer Protocol
Hypertext Transfer Protocol
 
Electronic mail - Computer Networks
Electronic mail - Computer NetworksElectronic mail - Computer Networks
Electronic mail - Computer Networks
 
Email: Introduction
Email: IntroductionEmail: Introduction
Email: Introduction
 
All about email
All about emailAll about email
All about email
 
E mail flow
E mail flowE mail flow
E mail flow
 
Client Server Network By Usman Ihsan
Client Server Network By Usman IhsanClient Server Network By Usman Ihsan
Client Server Network By Usman Ihsan
 

Viewers also liked

Email ppt
Email pptEmail ppt
Email ppt
melgade
 
Mime powerpointt
Mime powerpointt Mime powerpointt
Mime powerpointt
Zara
 
Mime
MimeMime
Mime
pullel
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
guest029bcd
 
E Mail Ppt
E Mail PptE Mail Ppt
E Mail Ppt
kevpatel
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
Diwaker Pant
 
Online Marketing PPT
Online Marketing PPTOnline Marketing PPT
Online Marketing PPT
Priyanka Shinde
 
POP3
POP3POP3
Security consideration with e commerce
Security consideration with e commerceSecurity consideration with e commerce
Security consideration with e commerce
StudsPlanet.com
 
E mail transfer .74
E mail transfer .74E mail transfer .74
E mail transfer .74
myrajendra
 
N-tier Application Developement
N-tier Application DevelopementN-tier Application Developement
N-tier Application Developement
Detectivee Mirza
 
How email works
How email worksHow email works
How email works
Amandeep Kaur
 
Tier 1, 2 and 3 Capital based on the Basel II accord
Tier 1, 2 and 3 Capital based on the Basel II accordTier 1, 2 and 3 Capital based on the Basel II accord
Tier 1, 2 and 3 Capital based on the Basel II accord
Nahid Anjum
 
Web page analysis
Web page analysisWeb page analysis
Web page analysis
ibz10
 
Mime presentation
Mime presentationMime presentation
Mime presentation
abigail270595
 
E-Mail - Technical Overview
E-Mail - Technical OverviewE-Mail - Technical Overview
E-Mail - Technical Overview
Venkatesh Iyer
 
Computer Concepts Unit A PPT Lecture
Computer Concepts Unit A PPT LectureComputer Concepts Unit A PPT Lecture
Computer Concepts Unit A PPT Lecture
wsbaker
 
Bandwidth Presentation
Bandwidth PresentationBandwidth Presentation
Bandwidth Presentation
Grace=] Penda
 
Differences Between Architectures
Differences Between ArchitecturesDifferences Between Architectures
Differences Between Architectures
prasadsmn
 
Chap 20 smtp, pop, imap
Chap 20 smtp, pop, imapChap 20 smtp, pop, imap
Chap 20 smtp, pop, imap
Noctorous Jamal
 

Viewers also liked (20)

Email ppt
Email pptEmail ppt
Email ppt
 
Mime powerpointt
Mime powerpointt Mime powerpointt
Mime powerpointt
 
Mime
MimeMime
Mime
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
E Mail Ppt
E Mail PptE Mail Ppt
E Mail Ppt
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Online Marketing PPT
Online Marketing PPTOnline Marketing PPT
Online Marketing PPT
 
POP3
POP3POP3
POP3
 
Security consideration with e commerce
Security consideration with e commerceSecurity consideration with e commerce
Security consideration with e commerce
 
E mail transfer .74
E mail transfer .74E mail transfer .74
E mail transfer .74
 
N-tier Application Developement
N-tier Application DevelopementN-tier Application Developement
N-tier Application Developement
 
How email works
How email worksHow email works
How email works
 
Tier 1, 2 and 3 Capital based on the Basel II accord
Tier 1, 2 and 3 Capital based on the Basel II accordTier 1, 2 and 3 Capital based on the Basel II accord
Tier 1, 2 and 3 Capital based on the Basel II accord
 
Web page analysis
Web page analysisWeb page analysis
Web page analysis
 
Mime presentation
Mime presentationMime presentation
Mime presentation
 
E-Mail - Technical Overview
E-Mail - Technical OverviewE-Mail - Technical Overview
E-Mail - Technical Overview
 
Computer Concepts Unit A PPT Lecture
Computer Concepts Unit A PPT LectureComputer Concepts Unit A PPT Lecture
Computer Concepts Unit A PPT Lecture
 
Bandwidth Presentation
Bandwidth PresentationBandwidth Presentation
Bandwidth Presentation
 
Differences Between Architectures
Differences Between ArchitecturesDifferences Between Architectures
Differences Between Architectures
 
Chap 20 smtp, pop, imap
Chap 20 smtp, pop, imapChap 20 smtp, pop, imap
Chap 20 smtp, pop, imap
 

Similar to Information on protocols-email protocols

network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
nitashach22
 
internet protocol
internet protocolinternet protocol
internet protocol
Afeef Musthafa
 
Ways to-access-inetrnet-
Ways to-access-inetrnet-Ways to-access-inetrnet-
Ways to-access-inetrnet-
markgernale24
 
Introduction to internet.
Introduction to internet.Introduction to internet.
Introduction to internet.
Anish Thomas
 
Application Layer
Application LayerApplication Layer
Application Layer
Sweta Kumari Barnwal
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
ManishKumarH
 
Internet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptxInternet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptx
Ramesh S P Ramesh
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To Internet
Mohit Dhankher
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
Kathirvel Ayyaswamy
 
internet protocol
internet protocolinternet protocol
internet protocol
rajshreemuthiah
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
Himanshu Pathak
 
Network Protocols
Network ProtocolsNetwork Protocols
Network Protocols
Christopher Brown
 
Protocols
ProtocolsProtocols
Protocols
priya_trehan
 
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfTCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
anjaniar7gallery
 
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSSWeb Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
Kajal Singh
 
application layer
application layerapplication layer
application layer
BishalWosti1
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
uccwebcourses
 
Internet tools and services
Internet tools and servicesInternet tools and services
Internet tools and services
learnt
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
Anil Neupane
 
Web protocol.pptx
Web protocol.pptxWeb protocol.pptx
Web protocol.pptx
SindhuVelmukull
 

Similar to Information on protocols-email protocols (20)

network protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedinetwork protocol | Networking by Nitasha Chaturvedi
network protocol | Networking by Nitasha Chaturvedi
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Ways to-access-inetrnet-
Ways to-access-inetrnet-Ways to-access-inetrnet-
Ways to-access-inetrnet-
 
Introduction to internet.
Introduction to internet.Introduction to internet.
Introduction to internet.
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
 
Internet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptxInternet protocols and smart devices for better living.pptx
Internet protocols and smart devices for better living.pptx
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To Internet
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
 
Network Protocols
Network ProtocolsNetwork Protocols
Network Protocols
 
Protocols
ProtocolsProtocols
Protocols
 
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfTCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
 
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSSWeb Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
 
application layer
application layerapplication layer
application layer
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Internet tools and services
Internet tools and servicesInternet tools and services
Internet tools and services
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Web protocol.pptx
Web protocol.pptxWeb protocol.pptx
Web protocol.pptx
 

Recently uploaded

Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 

Recently uploaded (20)

Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 

Information on protocols-email protocols

  • 2. What is a protocol after all?  Protocol is a standard used to define a method of exchanging data over a computer network such as local area network, Internet, Intranet  Protocols define how messages are sent and received, i.e. the format and order of them, what happens when messages are transmitted and received.  Each protocol has its own method of how data is formatted when sent and what to do with it once received, how that data is compressed or how to check for errors in data.  The protocol can be implemented either in hardware or in software.
  • 3. Internet Protocol (IP) It is a protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet. When you send or receive data (for example, an e-mail note or a Web page), the message gets divided into little chunks called packets.
  • 4.  Packets can arrive in a different order than the order they were sent in. The Internet Protocol just delivers them. It's up to another protocol, the Transmission Control Protocol (TCP) to put them back in the right order.  Each of these packets contains both the sender's Internet address and the receiver's address  Protocol version 4 (IPv4) standard that features IP addresses four bytes (32 bits) in length.  The newer Internet Protocol version 6 (IPv6) standard features addresses 16 bytes (128 bits) in length.
  • 5. Hypertext Transfer Protocol (HTTP)  HTTP is a set of standards that allow users of the World Wide Web to exchange information found on web pages.  The term HTTP was coined by Ted Nelson  HTTP commonly utilizes port 80, 8008, or 8080  When wanting to access any web page enter http:// in front of the web address, which tells the browser to communicate over HTTP
  • 6. Hypertext Transfer Protocol over Secure (HTTPS)  It is a secure method of accessing or sending information across a web page.  All data sent over HTTPS is encrypted before it is sent, this prevents anyone from understanding that information if intercepted.  Because data is encrypted over HTTPS, it is slower than HTTP, which is why HTTPS is only used when requiring login information or with pages that contain sensitive information such as an online bank web page.  HTTPS uses port 443 to transfer its information.  HTTPS is first used in HTTP/1.1
  • 8. File Transfer Protocol (FTP) • Standard Internet protocol for transmitting files between computers on the Internet. • First proposed on April 16, 1971 by Abhay Bhushan • Used to transfer Web page files from their creator to the computer that acts as their server for everyone on the Internet. • It's also commonly used to download programs and other files to your computer from other servers.
  • 9. Contd… • Your Web browser can also make FTP requests to download programs you select from a Web page. • Using FTP, you can also update (delete, rename, move, and copy) files at a server. • You need to logon to an FTP server. • FTP is most commonly used to download a file from a server using the Internet or to upload a file to a server (e.g., uploading a Web page file to a server).
  • 10. Email Protocols Interactions between email servers and clients are governed by email protocols. The most common email protocols are POP - Post Office Protocol IMAP - Internet Mail Access Protocol SMTP - Simple Mail Transport Protocol
  • 12. Most recent version of a standard protocol for receiving e-mail. Provides a simple, standardized way for users to access mailboxes and download messages to their computers. When using the POP protocol all eMail messages will be downloaded from the mail server to your local computer Most POP clients also provide an option to leave copies of email on the server.
  • 13. Advantage is that once messages are downloaded you can cut the internet connection and read your email at your leisure without incurring further communication costs protocol is built into most popular e-mail products, such as Eudora and Outlook Express. It's also built into the Netscape and Microsoft Internet Explorer browsers. The conventional port number for POP3 is 110.
  • 14. Internet Mail Access Protocol (IMAP)
  • 15.  IMAP was developed at Stanford University in 1986  Standard protocol for accessing e-mail from your local server.  The latest version, IMAP4, is similar to POP3 but supports some additional features.  For example, with IMAP4, you can search through your e-mail messages for keywords while the messages are still on mail server. You can then choose which messages to download to your machine.  Port - 143
  • 17. Difference between POP3 & IMAP IMAP POP3 It is a method of accessing e-mail messages on a server without having to download them to your local hard drive POP3 requires users to download messages to their hard drive before reading them The advantage of using an IMAP mail server is that users can check their mail from multiple computers and always see the same messages. This is because the messages stay on the server until the user chooses to download them to his or her local drive.
  • 18. Simple Mail Transfer Protocol (SMTP)
  • 19.  SMTP was created in the early 1980's  used by the Mail Transfer Agent (MTA) to deliver your eMail to the recipient's mail server.  only be used to send emails, not to receive them.  This is why you need to specify both the POP or IMAP server and the SMTP server when you configure your e-mail application.  SMTP usually is implemented to operate over Internet port 25.  An alternative to SMTP that is widely used in Europe is X.400.  Many mail servers now support Extended Simple Mail Transfer Protocol (ESMTP), which allows multimedia files to be delivered as e-mail.
  • 21. Multipurpose Internet Mail Extensions (MIME)  MIME was defined in 1992 by the Internet Engineering Task Force (IETF)  Many e-mail clients now support MIME, which enables them to send and receive graphics, audio, and video files via the Internet mail system.  There are many predefined MIME types, such as GIF graphics files and PostScript files.  In addition, MIME supports messages in character sets other than ASCII.  A new version, called S/MIME, supports encrypted messages.