Agenda Discussion Content Other Messaging Services Wrap-Up.

Slides:



Advertisements
Similar presentations
WeeSan Lee
Advertisements

Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
-I CS-3505 Wb_ -I.ppt. 4 The most useful feature of the internet 4 Lots of different programs, but most of them can talk to each.
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
Mail Server Three major components MTA MUA MDA Mail Transfer Agent
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
IST346 – Servies Agenda  What is ?  Policies  The technical side of  Components  Protocols  architecture  Security.
Microsoft Outlook Uses and Features.
Securing Microsoft® Exchange Server 2010
Webmail. Agenda Why use webmail? Why use webmail? What is webmail What is webmail – basic » system MDA MDA MTA MTA MUA MUA »Protocol SMTP SMTP.
CSIE 1 Filtering mail Speaker: Chung yu Wu Adviser: Quincy Wu Date: 2005/12/07.
Section 4 – Computer Networks Setting up a small network.
1 Electronic Messaging Module - Electronic Messaging ♦ Overview Electronic messaging helps you exchange messages with other computer users anywhere in.
  is a system of electronic communication that allows the user to exchange messages over the internet  Everyone’s address is unique  Two.
INTERNET SAFETY.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
1 Architecture 2 User Agent 3 Message Transfer Agent 4 Message Access Agent 5 MIME 6 Web-Based Mail 7 Electronic Mail Security.
By: Derek Ton & Alex Pappas.  Most frequently used internet service that you will manage as network administrator.  You need to understand how they.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
CIS 170 MART Teaching Effectively/cis170mart.com FOR MORE CLASSES VISIT COM 285 AID Education Expert/com285aid.com FOR MORE CLASSES.
Spam, viruses, and phishing plague inboxes Organizations have difficulty staying ahead of messaging threats Rising Vulnerabilities Regulatory compliance.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Todays’ Agenda What is the Tenafly AUP? Answer the following: What do the letters AUP stand for? What is the definition of an AUP? What are the 2 main.
101 Derek Carter
Campus Networking Best Practices This Presentation and related materials will be available at: nsrc.org/tutorials/2008/sanog12 Help Desk Services.
Understanding POP3 / IMAP Created by : Ashish Shah, J. M. Patel College of Commerce 1.
 Introduction  Aim  Tools  Methodology  System architecture  Screenshot.
Contents Spelling Origin of Operation Message Format
concepts & protocols
APPLICATION LAYER BY, Parthasarathy.g.
3.1 Types of Servers.
Remote Logging, Electronic Mail, and File Transfer
Year 10 Network Security.
Networking CS 3470, Section 1 Sarah Diesburg
Everything You Wanted to Know About Encryption in Just 10 Minutes
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
CIW Lesson 7 Part A Name: _______________________________________
CIT 383: Administrative Scripting
Internet Safety and Acceptable Use Policies.
Internet Safety and Acceptable Use Policies.
has many aspects that work together to give people almost instant communication from any computer on the internet to any other computer There.
The Internet An Overview.
Communicating Through the Internet and Other Technologies
Remote Logging, Electronic Mail,
Unit – 4 Chap - 2 Mail Delivery System
IST346: Services: Monitoring and Logging
IST346: Scalability.
IST346: Internet of Things
IST346: Managing IT.
IST346: Namespaces, Identity Management
IST346: Data and Database Management, Backupa
IST346: Debugging and Troubleshooting
IST346: Servers and Data Centers
IST346: Services: Application Architecture
IST346: Mobile Services.
IST346: Ethics.
IST346: Information Security & Risk Management
IST346: Workstations & Clients
IST346: Web Services and API’s
IST346: Networking Fundamentals
IST346: Operating Systems / Command Line Interfaces
IST346: Virtualization and Containerization
IST346: Storage and File Systems
IST346: What Is IT?.
Chapter 7 Network Applications
IST346: Cloud Computing and DevOps
(Answer in complete sentences.)
 Zone in name space  DNS IN THE INTERNET  Generic domains :There are fourteen generic domains, each specifying an organization type.
Presentation transcript:

IST346: Email and Messaging

Agenda Discussion Content Email Other Messaging Services Wrap-Up

Discussion Questions List 3 technical challenges of email service? List 3 logistical / policy issues of email service? What are the 4 components of email? How does email scale vertically? Define a strategy for scaling an MTA like SMTP horizontally? What about a strategy for scaling an Access Agent like IMAP horizontally? Give students 1-2 minutes for each question. Its important to provide them with the opportunity to answer the questions based on the reading, labs, and assigned homework. 3. Vertically though MTA, MUA, MDA, AA

Lab Debrief Lab K

SMTP Protocol in Action The “S” in SMTP stands for “Simple”. 

Components at work –sending email syr.edu gmail.com Message Store MUA Outlook MTA sendmail internet MUA Phone MTA sendmail MDA exchange MDA procmail MUA iMail Example of sending an email from tajorgen@syr.edu to tim.jorgensen@gmail.com

Components at work –receiving email internet MUA Outlook syr.edu Message Store MUA Phone AA Exchange CAs Imaps, Mapi,EWS MDA Exchange hubs MTA sendmail MUA iMail Example of receiving an email from anywhere to tajorgen@syr.edu

Policy is so important! Acceptable Use Policy The company owns / pays for the technology Do they own the message? ECPA – Electronic Communications Privacy Act Employee privacy is protected Consent must be given – agreeing to the AUP use can be considered consent SA’s can see all communications (due to how the technology works), so this is why policy is so important.

Group Activity Syracuse University Acceptable Use Policy

Details of Group Activity Split into groups of 3-4, Read the SU AUP: https://policies.syr.edu/policies/free-speech/information- technology-resources-acceptable-use-policy/ Questions: Can you run an internet business out of your dorm? Can a professor request access to her student’s web browsing history on the campus network? Can the IT staff who maintain the campus network see your email? Can you run an internet business out of your dorm? - Are you profiting from the campus network or using campus resources? Then no. Can a professor request access to her student’s web browsing history on the campus network? - No. Can the IT staff who maintain the campus network see your email? - Yes, as part of the access they require to do their job, but they should not be snooping around in your messages.

Your To-Do List What to work on for next class ALWAYS CONSULT THE SYLLABUS What to work on for next class

Exit Ticket Share one thing you learned today that you didn’t know before class!

Questions?