D. CrockerMail Addresses1 Structure and Scope of Internet Mail Addresses  = = *( “.” )  and “.” are global syntax  is global semantic  is globally.

Slides:



Advertisements
Similar presentations
Moving Towards Internationalized Domain Names Paul Hoffman Internet Mail Consortium September 7, 2000.
Advertisements

Programming Languages and Paradigms
The Application Layer Chapter 7. Where are we now?
Application: Electronic Mail Linda Wu (CMPT )
Chapter 29 Structure of Computer Names Domain Names Within an Organization The DNS Client-Server Model The DNS Server Hierarchy Resolving a Name Optimization.
TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture.
Introduction to Management Information Systems Chapter 5 Data Communications and Internet Technology HTM 304 Fall 07.
1 IP Multicasting. 2 IP Multicasting: Motivation Problem: Want to deliver a packet from a source to multiple receivers Applications: –Streaming of Continuous.
The OSI Model A layered framework for the design of network systems that allows communication across all types of computer systems regardless of their.
Architecture of SMTP, POP, IMAP, MIME.
1 ecompany/amani Amani M. Bin Sewaif Senior Engineer Services Operations & Maintenance Etisalat – Intenet & e Solution November 22,
Simple Mail Transfer Protocol (SMTP) Kanika Thapar CISC 856 TCP/IP and Upper Layer Protocols 11/8/2007 (Some slides provided by Ezra Kissel, some figures.
COMPUTER FUNDAMENTALS David Samuel Bhatti
1 © 2000, Cisco Systems, Inc. DNSSEC IDN Patrik Fältström
Electronic Mail (SMTP, POP, IMAP, MIME)
Chapter 7: Internet-Based Applications Business Data Communications, 6e.
Lecturer: Maxim Podlesny Sep CSE 473 File Transfer and Electronic in Internet.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
Chapter 3 Representing Numbers and Text in Binary Information Technology in Theory By Pelin Aksoy and Laura DeNardis.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Computer Networks26-1 Chapter 26. Remote Logging, Electronic Mail and File Transfer.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Java Programming Constructs 1 MIS 3023 Business Programming Concepts II The University of Tulsa Professor: Akhilesh Bajaj All slides in this presentation.
Simple Mail Transfer Protocol (SMTP)
Protocols and the TCP/IP Suite
Personalizing the web for multilingual web sources Anil Goud V Lalith Krishna L Dinesh Kumar D.R.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.6 UDP Principles (Chapter 24) (User Datagram Protocol)
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
CSE5803 Advanced Internet Protocols and Applications (2) Universal Identifier In general, addressing in a network is closely linked with the issue.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Network Protocols Chapter 26 (Data Communication and Networking): Remote Logging, Electronic Mail, and.
1 SMTP - Simple Mail Transfer Protocol –RFC 821 POP - Post Office Protocol –RFC 1939 Also: –RFC 822 Standard for the Format of ARPA Internet Text.
Universal Identifier UNIVERSAL IDENTIFIER Universal network = globally accepted method for identifying each computer. Host identifier = host is identify.
©Brooks/Cole, 2003 Model and protocol  A model is the specification set by a standards organization as a guideline for designing networks.  A protocol.
CSC 600 Internetworking with TCP/IP Unit 7: IPv6 (ch. 33) Dr. Cheer-Sun Yang Spring 2001.
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
Prepared by Engr.Jawad Ali BSc(Hons)Computer Systems Engineering University of Engineering and Technology Peshawar.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
Domain and Host Names Mark Andrews
SMTP - Simple Mail Transfer Protocol RFC 821
MIPS assembly syntax Home Assignment 3 Assigned. Deadline 2016 February 14, Sunday.
1 Kyung Hee University Chapter 22 Simple Mail Transfer Protocol (SMTP)
Globally Identifiable Number (GIN) Registration Adam Roach draft-martini-roach-gin-01 IETF 77 – Anaheim, CA, USA March 22, 2010.
Universal Acceptance: APNIC system readiness Byron Ellacott Senior Software Architect.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
ADDRESS INTERNATIONALIZATION ( EAI ) ICANN-55 Mar 06, 2016 TF-AIDN Member 35+ Min : 10- Min ( Q & A )
Network Layer IP Address.
Network Models. 2.1 what is the Protocol? A protocol defines the rules that both the sender and receiver and all intermediate devices need to follow,
Network Models. 2.1 what is the Protocol? A protocol defines the rules that both the sender and receiver and all intermediate devices need to follow,
Etisalat/I&eS/SOM/Amani PAGE 1 Amani M. Bin Sewaif Senior Engineer Services Operations & Maintenance Etisalat – Intenet & e Solution
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
SMTP - Simple Mail Transfer Protocol POP - Post Office Protocol
Networking Applications
Binary 1 Basic conversions.
THE OSI MODEL By: Omari Dasent.
© 2003, Cisco Systems, Inc. All rights reserved.
MIPS assembly syntax Comments
TOPICS Information Representation Characters and Images
Advanced Programming Behnam Hatami Fall 2017.
Internet Protocol INTERNET PROTOCOL.
Objective 4.01: Compose effective correspondence
IDN – behind scenes Душан Стојичевић UA ambassador ( Гранси (
William Stallings Data and Computer Communications
Unit – 4 Chap - 2 Mail Delivery System
Fundamental Programming
 Zone in name space  DNS IN THE INTERNET  Generic domains :There are fourteen generic domains, each specifying an organization type.
Protocol Layering - Introduction
Connecting the unconnected
TCP/IP Sockets in Java: Practical Guide for Programmers
UDP Principles (Chapter 24) (User Datagram Protocol)
Presentation transcript:

D. CrockerMail Addresses1 Structure and Scope of Internet Mail Addresses  = = *( “.” )  and “.” are global syntax  is global semantic  is globally opaque   Local to cited domain – local MTA(s) and local MUA(s)  No one else’s business!

D. CrockerMail Addresses2 Address Handling  Sender  Copy an opaque string  Senders do not construct addresses!  Source/Relay MTAs  Move message to  is opaque; ie., ignorant of local structure  Target Domain  Interpret  might follow local structuring conventions Multiple MX References  Distributed MTA  Must share syntax and semantics  Forward to master MTA  Same as “intermediate”

D. CrockerMail Addresses3 Conventions Conventions  Mailbox assignment  User vs. System chosen  Login-specific, or not  Structuring  Function of target MTA  May include MUA  Encoding  No global standards (well, almost none)  May be layers of encoding  May have significantly different presentation style

D. CrockerMail Addresses4 IEA Goals  Expand permitted range of characters  Global enhancement  Must not break installed base  Must not break local conventions(!)  Approach: Reserve “unused” bits  Outside current ASCII range, or  Special ASCII-based “framing”

D. CrockerMail Addresses5 Tidbits  Unicode representation vs. encoding  UTF-8 is merely one of several encodings  ACE is merely another encoding  strings are short  Intermediary MTAs do not interpret  Using non-ASCII bits changes this  Adoption times  New, endpoint-only protocol: 3+ years  Existing protocol: 10+ years  “transition” is forever  Existing multi-step infrastructure is worse

D. CrockerMail Addresses6 Enhancement Enhancement  Must respect local conventions  Without knowing them  Create Unicode segments  Flag start and flag end  IDN could rely on “.”, to flag end  IEA cannot  must define global segment end