ITIS 1210 Introduction to Web-Based Information Systems

Slides:



Advertisements
Similar presentations
Computer networks Fundamentals of Information Technology Session 6.
Advertisements

Internet Hardware Connected ‘Servers’ Servers provide: – Web pages – – File downloads.
Introduction 1-1 Chapter 3 Transport Layer Intro and Multiplexing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Network Layer and Transport Layer.
Computer Networks An Overview. A Computer Network!
Introduction to Transport Layer. Transport Layer: Motivation A B R1 R2 r Recall that NL is responsible for forwarding a packet from one HOST to another.
We are Network Engineers
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
Networks. ProtocolMeaningApplication DNSDomain Name System (Server)Translates domain names such as ocr.org.uk into IP Addresses TLS/SSLTransport Layer.
The internet and the WWW
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
IS 247 Introduction to Web Application Development Tim Wu.
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Presentation on Osi & TCP/IP MODEL
1 Chapter 2 (Continued) Section 2.2 Section 2.2. Internet Service Provider (ISP) ISP - a company that connects you through your communications line to.
THE OSI MODEL AND THE TCP/IP PROTOCOL SUITE CS 1202 Lectur3 part2.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 4. Understanding the Internet’s Software Structure.
Networks QUME 185 Introduction to Computer Applications.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 23 How Web Host Servers Work.
The OSI Model and the TCP/IP Protocol Suite Outline: 1.Protocol Layers 2.OSI Model 3.TCP/IP Model 4.Addressing 1.
Introduction to Technology Infrastructure Chapter 1.
TCP/IP Transport and Application (Topic 6)
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
Basics of Web Design Objectives: Learn the definition of what the Internet is Understand the concept of the World Wide Web Gain insight into Web Vocabulary.
What are mailing lists? A list of names and addresses for a group of people who share a common interest. Messages are automatically forwarded to.
Chapter 4 Communicating on the Internet. How Works? Most used Feature TCP breaks & reassembles messages into packets IP delivers packets to the.
TCP/IP (Transmission Control Protocol / Internet Protocol)
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
TCP =Transmission Control Protocol IP = Internet Protocol TCP/IP Protocol.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 3. How TCP/IP Works.
How the Internet Works Most people use the internet but do not know how it works.
Mr C Johnston ICT Teacher G055 - Lecture 10 Network Protocols.
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
CIW LESSON 7 PART A. INTRODUCTION TO BUSINESS ELECTRONIC MAIL The use of has given rise to the term ______________________, which is a slang term.
Data and Computer Communications Chapter 21 – Network SecurityChapter 21 – Network Security.
Electronic Newsletter Options
Introduction to Networks
Chapter 5 Network and Transport Layers
Application layer tcp/ip
The OSI Model and the TCP/IP Protocol Suite
Working at a Small-to-Medium Business or ISP – Chapter 7
Introduction to Networks
Web Development & Design Chapter 1, Sections 4, 5 & 6
Working at a Small-to-Medium Business or ISP – Chapter 7
COMPUTER PRIVACY.
The OSI Model and the TCP/IP Protocol Suite
Working at a Small-to-Medium Business or ISP – Chapter 7
Web Design & Development
(free certificate not available)
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
The OSI Model and the TCP/IP Protocol Suite
The University of Adelaide, School of Computer Science
Lecture 6: TCP/IP Networking 1nd semester By: Adal ALashban.
The OSI Model and the TCP/IP Protocol Suite
Part of Chapter 1 Key Concepts Networks
Protocols 2 Key Revision Points.
Internet Applications & Programming
46 to 1500 bytes TYPE CODE CHECKSUM IDENTIFIER SEQUENCE NUMBER OPTIONAL DATA ICMP Echo message.
Protocol Application TCP/IP Layer Model
Unit 8 Network Security.
The OSI Model and the TCP/IP Protocol Suite
Go to the page Set here the address for receiving the s sent to the mailing lists to which you are subscribing.
IS 4506 Configuring the FTP Service
Presentation transcript:

ITIS 1210 Introduction to Web-Based Information Systems Chapter 11 How Email Works

How Email Works Same technology as rest of the Internet TCP breaks message into packets IP delivers packets to correct address TCP reassembles Mailing lists send same message to multiple parties Moderated lists are screened

How Email Works Can subscribe to mailing lists Directories are common List server or listserv manager Directories are common White pages Yellow pages Email is not secure Can be read by snoopers Encryption necessary to ensure privacy

Simple Encryption Letter ASCII Quotient Remain Send H 72 6 60 E 69 5 9 60 E 69 5 9 59 L 76 4 64 O 79 7 67 Key = 12

Simple Encryption Received Quotient Remain ASCII Letter 60 6 78 N 59 5 78 N 59 5 9 74 J 64 4 82 R 67 7 85 U Key = 13