Dr. Adil Yousif University of Alneelian – Master of CS - IT Electronic Mail.

Slides:



Advertisements
Similar presentations
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Advertisements

1 Electronic Mail u Three major components: u user agents u mail servers u simple mail transfer protocol: SMTP u User Agent u a.k.a. “mail reader” u composing,
2: Application Layer1 ECE5650 FTP, , DNS, and P2P.
Layer Aplikasi Risanuri Hidayat. Applications and application-layer protocols Application: communicating, distributed processes –e.g., , Web, P2P.
TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture.
CPSC 441: FTP & SMTP1 Application Layer: FTP & Instructor: Carey Williamson Office: ICT Class.
Chapter 2: Application layer  2.1 Web and HTTP  2.2 FTP 2-1 Lecture 5 Application Layer.
Electronic Mail and SMTP
Ftp: File Transfer Protocol  ftp specification: RFC 959 ( file transfer FTP server FTP user interface FTP client local.
Chapter 2: Application layer  2.1 Web, HTTP and HTML (We will continue…)  2.2 FTP  2.3 SMTP 9/22/2009 Lecture 7, MAT 279, Fall
Chapter 30 Electronic Mail Representation & Transfer
Esimerkki: Sähköposti. Lappeenranta University of Technology / JP, PH, AH Electronic Mail Three major components: user agents mail servers simple mail.
Simple Mail Transfer Protocol
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Mail Server Fitri Setyorini. Content SMTP POP3 How mail server works IMAP.
-I CS-3505 Wb_ -I.ppt. 4 The most useful feature of the internet 4 Lots of different programs, but most of them can talk to each.
1 Lecture #3 Electronic Mail Protocols HAIT Summer 2005 Shimrit Tzur-David.
Electronic Mail Three major components: SMTP user agents mail servers
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
Electronic Mail (SMTP, POP, IMAP, MIME)
SMTP, POP3, IMAP.
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
Trying out HTTP (client side) for yourself
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Lecture51 Administrative Things r Grader: Yona Raekow Office hours: Wed. 1pm-3pm or Th. 11am-1pm r Homeworks.
CSE401N: Computer Networks Lecture-5 Electronic Mail S. M. Hasibul Haque Lecturer Dept. of CSE, BUET.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
Communications and Networks Lecture 5 Instructor: Rina Zviel-Girshin.
Review: –How do we address “a network end-point”? –What services are provided by the Internet? –What is the network logical topology observed by a network.
Application Layer Protocols Simple Mail Transfer Protocol.
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
Lecturer: Maxim Podlesny Sep CSE 473 File Transfer and Electronic in Internet.
DNS,SMTP,MIME.
Fall 2005 By: H. Veisi Computer networks course Olum-fonoon Babol Chapter 7 The Application Layer.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
2: Application Layer1 Reminder r Homework 1 for Wednesday: m Problems #3-5,11,16,18-20 m Half of the problems will be graded r Feel free to send me .
TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Computer Networks26-1 Chapter 26. Remote Logging, Electronic Mail and File Transfer.
Simple Mail Transfer Protocol (SMTP)
Electronic Mail. Client Software and Mail Hosts –Client PC has client software that communicates with user’s mail host –Mail hosts deliver.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_c Application Protocols: HTTP, FTP, SMTP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
File Transfer Protocol (FTP)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Network Protocols Chapter 26 (Data Communication and Networking): Remote Logging, Electronic Mail, and.
1 Client Software and Mail Hosts Client PC has client software that communicates with user’s mail host Mail hosts deliver outgoing mail to.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
CS440 Computer Networks 1 Neil Tang 12/01/2008.
Slides based on Carey Williamson’s: FTP & SMTP1 File Transfer Protocol (FTP) r FTP client contacts FTP server at port 21, specifying TCP as transport protocol.
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Electronic Mail: SMTP, POP IMAP, and MIME.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
World Wide Web r Most Web pages consist of: m base HTML page, and m several referenced objects addressed by a URL r URL has two components: host name and.
COMP 431 Internet Services & Protocols
1 Kyung Hee University Chapter 22 Simple Mail Transfer Protocol (SMTP)
1 Chapter 10: Application Layer Reference: Chapter 7 - “Computer Networks”, Andrew S. Tanenbaum, 4th Edition, Prentice Hall, 2003.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
© 2010 Computer Science Faculty, Kabul University FTP AND ELECTRONICE MAIL 5 TH LECTURE 4, May, 2010 Baseer Ahmad Baheer.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
Dibyajit Computer Security Hacking dibyajit
Networking Applications
Remote Logging, Electronic Mail, and File Transfer
Application layer 1 Principles of network applications 2 Web and HTTP
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
SMTP, POP3, IMAP.
Chapter 2: Application layer
The Application Layer: SMTP, FTP
Chapter 2 Application Layer
Presentation transcript:

Dr. Adil Yousif University of Alneelian – Master of CS - IT Electronic Mail

 Just like ordinary mail, is asynchronous people send and read messages when it is convenient for them, without having to coordinate with other peoples' schedules.  Three major components: 1. user agents 2. mail servers 3. simple mail transfer protocol: SMTP Electronic Mail:

Electronic Mail Cont.

Alice's mail server transfers Alice's message to Bob's mail server.

User Agents (UA)  User agents allow users to read, reply to, forward, save, and compose messages.  When Alice is finished composing her message, her user agent sends the message to her mail server, where the message is placed in the mail server's outgoing message queue.  When Bob wants to read a message, his user agent obtains the message from his mailbox in his mail server.

 GUI (graphical user interface) user agents became popular, allowing users to view and compose multimedia messages.  Currently, Eudora, Microsoft's Outlook Express, and Netscape's Messenger are among the popular GUI user agents for . GUI user agents

 Mail servers form the core of the infrastructure.  Each recipient, such as Bob, has a mailbox located in one of the mail servers.  Bob's mailbox manages and maintains the messages that have been sent to him.  A typical message starts its journey in the sender's user agent, travels to the sender's mail server, and then travels to the recipient's mail server, where it is deposited in the recipient's mailbox. Mail Servers

 When Bob wants to access the messages in his mailbox, the mail server containing the mailbox authenticates Bob (with user names and passwords).  Alice's mail server must also deal with failures in Bob's mail server.  If Alice's server cannot deliver mail to Bob's server, Alice's server holds the message in a message queue and attempts to transfer the message later.  Reattempts are often done every 30 minutes or so; if there is no success after several days, the server removes the message and notifies the sender (Alice) with an message. Mail Servers Cont.

 SMTP uses the reliable data transfer service of TCP to transfer mail from the sender's mail server to the recipient's mail server on port 25.  SMTP has two sides: client side and server side  When a mail server sends mail (to other mail servers), it acts as an SMTP client.  When a mail server receives mail (from other mail servers) it acts as an SMTP server. Simple Mail Transfer Protocol (SMTP)

 SMTP has direct transfer from sending server to receiving server  command/response interaction  commands: ASCII text  response: status code and phrase  messages must be in 7-bit ASCII  SMTP uses persistent connections SMTP Cont.

1. Alice uses her UI to create her 2. Alice uses UA to compose message to 3. Alice’s UA sends message to her mail server; message placed in message queue 4. Client side of SMTP opens TCP connection with Bob’s mail server Scenario: Alice sends message to Bob (1)

4. SMTP client sends Alice’s message over the TCP connection 5. Bob’s mail server places the message in Bob ‘s mail box. 6. Bob invokes his user agent to read message (See next slides) Scenario: Alice sends message to Bob(2)

Scenario: Alice sends message to Bob(3)

Both protocols are used to transfer files from one host to another Both HTTP and SMTP use persistent connections Comparison with HTTP (The similarities)

HTTP is a pull protocol -- someone loads information on a Web server and users use HTTP to pull the information off the server. The TCP connection is initiated by the machine that wants to receive the file. On the other hand, SMTP is a push protocol -- the sending mail server pushes the file to the receiving mail server. The TCP connection is initiated by the machine that wants to send the file. Comparison with HTTP (The differences)

Mail message format

While the message headers described in RFC 822 are satisfactory for sending ordinary ASCII text, they are not sufficiently rich enough for multimedia messages (e.g., messages with images, audio and video) or for carrying non-ASCII text formats (e.g., characters used by languages other than English). The MIME Extension for Non-ASCII Data

To send content different from ASCII text, the sending user agent must include additional headers in the message. Two key MIME headers for supporting multimedia are the Content-Type: header and the Content-Transfer-Encoding: header. The Content-Type: header allows the receiving user agent to take an appropriate action on the message. The MIME Extension for Non-ASCII Data Cont.

For example, by indicating that the message body contains a JPEG image, the receiving user agent can direct the message body to a JPEG decompression routine. The MIME Extension for Non-ASCII Data Cont.

20 AL: Message format: multimedia extensions  MIME: multimedia mail extension, RFC 2045, 2056  additional lines in msg header declare MIME content type From: To: Subject: Picture of yummy crepe. MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Type: image/jpeg base64 encoded data base64 encoded data multimedia data type, subtype, parameter declaration method used to encode data MIME version encoded data

In the past the mail receiver reads his mail by logging onto the server (most likely through Telnet) host and then executes a mail reader on that host. Today a typical user reads mail with a user agent that executes on his or her local PC whether that PC be an office PC, a home PC, or a portable PC. Mail access protocols

By executing the user agent on a local PC, users enjoy a rich set of features, including the ability to view multimedia messages and attachments. Popular mail user agents that run on local PCs include Eudora, Microsoft's Outlook Express, and Netscape's Messenger. Receiver's PC would have to remain constantly on, and connected to the Internet, in order to receive new mail. Mail access protocols Cont.

This scenario impractical for the great majority of Internet users. Instead, a typical user runs a user agent on the local PC but accesses a mailbox from a shared mail server that is always running, that is always connected to the Internet, and that is shared with other users. The mail server is typically maintained by the user's ISP, which could be a residential or an institutional (university, company, etc.) ISP. Mail access protocols Cont.

With user agents running on users' local PCs and mail servers hosted by ISPs, a protocol is needed to allow the user agent and the mail server to communicate. Mail access protocols Cont.

25 Mail access protocols  SMTP: delivery/storage to receiver’s server  Mail access protocol: retrieval from server  POP: Post Office Protocol [RFC 1939] authorization (agent server) and download  IMAP: Internet Mail Access Protocol [RFC 1730] more features (more complex) manipulation of stored msgs on server  HTTP: Hotmail, Yahoo! Mail, etc. user agent sender’s mail server user agent SMTP POP3 or IMAP receiver’s mail server

26 Web based  More and more users today are using browser- based services such as Hotmail or Yahoo! Mail.  With these servers, the user agent is an ordinary Web browser and the user communicates with its mailbox on its mail server via HTTP.  When a recipient, such as Bob, wants to access the messages in his mailbox, the messages are sent from Bob's mail server to Bob's browser using the HTTP protocol rather than the POP3 or IMAP protocol.

27 Web based Cont.  When a sender with an account on an web- based server, wants to send a message, the message is sent from his browser to his mail server over HTTP rather than over SMTP.  The mail server, however, still sends messages to, and receives messages from, other mail servers using SMTP.  This solution to mail access is enormously convenient for the user on the go.

28 Web based Cont.  The user need only to be able to access a browser in order to send and receive messages. The browser can be in an Internet cafe, in a friend's house, in a hotel room with a Web TV,  Web-based is so convenient however, Its principle disadvantage is that it can be slow, as the server is typically far from the client and interaction with the server is done through CGI scripts.

Questions These slides are adapted from Computer Networking: A Top Down Approach Jim Kurose, Keith Ross Addison-Wesley March 2012