Applications:Electronic Mail (SMTP, POP, IMAP, MIME) (Chapter 27) : Presented By : Subhendu Mahanta. Purvi Shah. Jenni Bhatia. Della Nair. Nafiza Islam.

Slides:



Advertisements
Similar presentations
Application: Electronic Mail Linda Wu (CMPT )
Advertisements

Application Layer Pertemuan 25 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Chapter 6: Distributed Applications Business Data Communications, 5e.
Chapter 29 Structure of Computer Names Domain Names Within an Organization The DNS Client-Server Model The DNS Server Hierarchy Resolving a Name Optimization.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture.
Electronic Mail. Functionality First software allowed a user to send some text to another user connected to Internet; Current systems allow.
CPSC 441: FTP & SMTP1 Application Layer: FTP & Instructor: Carey Williamson Office: ICT Class.
Electronic Mail and SMTP
COS 420 DAY 25. Agenda Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due May 10 Today we will discuss.
POP3 Post Office Protocol v.3. Intro The Post Office Protocol (POP) is currently the most popular TCP/IP access and retrieval protocol. It implements.
Chapter 30 Electronic Mail Representation & Transfer
Esimerkki: Sähköposti. Lappeenranta University of Technology / JP, PH, AH Electronic Mail Three major components: user agents mail servers simple mail.
Dave Roberts.  Dynamic Host Configuration Protocol  DHCP  Simple Mail Transport Protocol  SMTP 2.
Applications:Electronic Mail (SMTP,POP,IMAP,MIME) Presented by-Tarun Lall Badrinath Sai Kumar Praveen.
Simple Mail Transfer Protocol
Architecture of SMTP, POP, IMAP, MIME.
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
Lesson 26 - (1 of 41) , SMTP, and MIME types.
Electronic Mail (SMTP, POP, IMAP, MIME)
SMTP, POP3, IMAP.
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
1 Chapter Internet Applications (DNS, )
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
CSE401N: Computer Networks Lecture-5 Electronic Mail S. M. Hasibul Haque Lecturer Dept. of CSE, BUET.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
Intro to Computer Networks Bob Bradley The University of Tennessee at Martin.
Review: –How do we address “a network end-point”? –What services are provided by the Internet? –What is the network logical topology observed by a network.
Application Layer Protocols Simple Mail Transfer Protocol.
Chapter 7: Internet-Based Applications Business Data Communications, 6e.
Fall 2005 By: H. Veisi Computer networks course Olum-fonoon Babol Chapter 7 The Application Layer.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Application Protocols: ELECTRONIC MAIL (SMTP, POP) CSNB534 Semester 2, 2007/2008 Asma Shakil.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
1 Applications Electronic Mail. 2 Electronic Mail Many user applications use client-server architecture. Electronic mail client accepts mail.
Simple Mail Transfer Protocol (SMTP)
Electronic Mail. Client Software and Mail Hosts –Client PC has client software that communicates with user’s mail host –Mail hosts deliver.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
File Transfer Protocol (FTP)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Network Protocols Chapter 26 (Data Communication and Networking): Remote Logging, Electronic Mail, and.
1 SMTP - Simple Mail Transfer Protocol –RFC 821 POP - Post Office Protocol –RFC 1939 Also: –RFC 822 Standard for the Format of ARPA Internet Text.
Lecture 6: Sun: 8/5/1435 Distributed Applications Lecturer/ Kawther Abas CS- 492 : Distributed system & Parallel Processing.
SIMPLE MAIL TRANSFER PROTOCOL. Introduction Simple Mail Transfer Protocol is the standard protocol on the Internet and part of the TCP/IP protocol.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
Chapter 20 - Electronic Mail Introduction Description Of Functionality –send a single message to many recipients. –send a message that includes text, voice,
Internet Applications (Cont’d) Basic Internet Applications – World Wide Web (WWW) Browser Architecture Static Documents Dynamic Documents Active Documents.
SMTP - Simple Mail Transfer Protocol RFC 821
Chapter 16: Distributed Applications Business Data Communications, 4e.
CS440 Computer Networks 1 Neil Tang 12/01/2008.
Slides based on Carey Williamson’s: FTP & SMTP1 File Transfer Protocol (FTP) r FTP client contacts FTP server at port 21, specifying TCP as transport protocol.
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Electronic Mail: SMTP, POP IMAP, and MIME.
COMP 431 Internet Services & Protocols
1 Kyung Hee University Chapter 22 Simple Mail Transfer Protocol (SMTP)
26.1 Electronic Mail Sending/Receiving Mail Addresses User Agent MIME Mail Transfer Agent Mail Access Protocols.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
© MMII JW RyderCS 428 Computer Networks1 Electronic Mail  822, SMTP, MIME, POP  Most widely used application service  Sometimes only way a person ever.
SMTP - Simple Mail Transfer Protocol POP - Post Office Protocol
Applications:Electronic Mail (SMTP,POP,IMAP,MIME)
Networking Applications
Instructor Materials Chapter 5 Providing Network Services
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Chapter 6: Distributed Applications
Chapter 2: Application layer
William Stallings Data and Computer Communications
Chapter 7 Network Applications
Chapter 2 Application Layer
Presentation transcript:

Applications:Electronic Mail (SMTP, POP, IMAP, MIME) (Chapter 27) : Presented By : Subhendu Mahanta. Purvi Shah. Jenni Bhatia. Della Nair. Nafiza Islam. Debasish Bhowmick Instructor : Dr. Sharon Hall Course : Advanced Network Protocols. Date : 16 th November, 2000.

Introduction to Electronic Mail:  It allows users to send memos across an internet.  It is one of the most widely used application services.  Some users rely on for normal business activities.  It offers a fast, convenient method of transferring information.  It accommodates small notes or large voluminous memos with a single mechanism.  Files can also be sent as attachment with .  To handle delayed delivery, mail systems use a technique known as “spooling”.

Components of Electronic Mail: User Interface Outgoing Mail Spool Area Mailboxes for Incoming Mail Client (Background Transfer) Server (to accept mail) User Sends Mail User Reads Mail TCP connection for outgoing mail TCP connection for incoming mail Conceptual Components of Electronic Mail System:

Spooling:  When user sends a mail, the system places a copy in its private storage (spool area).  The system then initiates transfer to remote machine as a background activity.  The background mail transfer process becomes client.  If it succeeds, the transfer process passes a copy of the message to remote server.  It it fails, the transfer process records the time delivery was attempted and terminates.  The background transfer process sweeps through the spool area periodically (typically every 30 mins).

Spooling (contd):  Whenever it finds a message or whenever user deposits new outgoing mail, it attempts delivery.  If mail message cannot be delivered after an extended time, the mail software returns the mail message to sender.

Mailbox Names & Aliases:  Three Important ideas in simplistic description of mail delivery are:  Users specify recipients by giving pairs of strings that identify the mail destination machine name & mailbox address on that machine.  The names used in such specifications are independent of other names assigned to machines.  Usually a mailbox address is same as user’s login id.  Destination machine name is the same as the machine’s domain name, but not necessary.  Our simplistic description fails to account for mail processing and mail forwarding.

Alias Expansion & Mail Forwarding:  Most systems provide mail forwarding software that includes a mail alias expansion mechanism.  A mail forwarder allows the local site to map identifiers used in mail addresses to a set of one or more new mail addresses.  Usually after a user composes a message and names a recipient, the mail interface program consults the local aliases to replace the recipient with the mapped version before passing the message to the delivery system.  Recipients for which no mapping has been provided remain unchanged.  Aliases increase mail system functionality and convenience substantially.

Alias Expansion & Mail Forwarding (contd):  The alias mappings can be many-one or one-many.  The system also allows a site to associate groups of recipients with a single identifier.  Using aliases that maps an identifier to a list of identifiers makes it possible to establish a mail exploder that accepts one incoming message and sends it to a large set of recipients.  The set of recipients associated with an identifier is called an electronic mailing list.  Not all recipients on the list need to be local.  Expanding a mail alias into a large set of recipients is a popular technique used widely.

An extension of Mail System that supports mail aliases & forwarding: User Inter- face Mailboxes for Incoming mail Alias expan- sion & forwarding Alias Database Outgoing mail Spool area Client (Background Transfer) Server(to Accept Mail) User sends mail User reads mail

Relationship of Internetworking & Mail:  TCP/IP internet makes possible universal delivery service.  TCP/IP provides universal interconnection among machines.  All machines attached to an internet behave as if attached to a single, vendor independent network.  Electronic mail systems built on TCP/IP are inherently more reliable than those built from arbitary networks.  TCP provides end-to-end connectivity.  Mail systems that use end-to-end delivery can guarantee that each mail message remains in sender’s machine until it has successfully been copied to the recipient’s machine.

Application Gateway Approach:  This is an alternative form of mail delivery system.  The message is transferred through a series of mail gateways, sometimes called mail bridges, mail relays, or intermediate mail stops.  The sender’s machine does not contact the recipient’s machine directly.  Instead, a complete mail message is sent from the original sender to first gateway, then forwarded to second gateway and so on.  Disadvantage : Unreliability, Delay.  Advantage: Interoperability.  Users who do not have Internet access depend on gateways.

TCP/IP Standards For Electronic Mail Service:  TCP/IP divides its mail standards into two sets.  One standard specifies the format for mail messages.  Other specifies the details of electronic mail exchange between two computers.  Each memo is divided into two parts – a header and a body, separated by a blank line.  TCP/IP specifies that the header must contain “From” and “To” fields.  It leaves the format of the body to the sender.

Electronic Mail Addresses:  Within the global Internet, addresses have a form where domain- name is the domain name of a mail destination and local-part is the address of a mailbox on that  In mail gateways, someone outside the Internet must either address the mail to the nearest mail gateway or have the software automatically does so.  Some mail gateways require the local par to contain addresses of the form user%domain- name, while others require user:domain-name.

Pseudo Domain Addresses:  A site can use domain-style names for all addresses, even if the site does not use the domain name system.  Advantage:  All addresses have the same general format independent of the underlying communication network.  Disadvantage:  Such addresses only work where local mailers have been instructed to map them into appropriate forms and only when the appropriate transport mechanisms are available.  They can only be used with electronic mail.

Simple Mail Transfer Protocol(SMTP):  SMTP is the standard transfer protocol for mail exchange.  The SMTP protocol focuses specifically on how the underlying mail delivery system passes messages across an internet from one machine to another.  It does not specify  How the mail system accepts mail from a user  How the user interface presents the user with incoming mail.  How mail is stored or how frequently the mail system attempts to send messages.

Simple Mail Transfer Protocol(SMTP):  The client establishes a reliable stream connection to the server and waits for the server to send a ‘220 READY FOR MAIL’ message.  The client sends the ‘HELLO’ command.  The server responds by identifying itself.  Once communication has been established, the sender can transmit one or more mail messages, terminate the connection etc.

Simple Mail Transfer Protocol(SMTP):  Mail transactions begin with a ‘MAIL’ command that gives the sender identification and a FROM field.  A recipient prepares its data structures to receive a new mail message, and replies by a 250 OK command.  After a successful ‘MAIL’ command, the sender issues a series of RCPT commands.  The receiver must acknowledge each ‘RCPT’ command by sending ‘250 OK’ or ‘550 No such user here’.

Simple Mail Transfer Protocol(SMTP):  After all ‘RCPT’ commands have been acknowledged, the sender issues a ‘DATA’ command informing the receiver that the sender is ready to transfer a complete mail message.  The receiver responds with message ‘354 Start mail input’ and the sequence of characters used to terminate the mail message.  The termination sequence consists of 5 characters – carriage return, line feed, period, carriage return and line feed.

Simple Mail Transfer Protocol(SMTP):  Once a client has finished sending all the mail messages to a particular destination, the client issues ‘TURN’ command to turn the connection around.  If it does, the receiver responds ‘250 OK’.  Whichever side controls the interaction can choose to terminate by issuing a ‘QUIT’.  The other side responds with command ‘221’, which means it agrees to terminate.

Mail Retrieval And Mailbox Manipulation Protocol:  SMTP transfer scheme needs a server must remain ready to accepts at all times when the client attempts to send a message as soon as a user enters it.  It does work well if the server runs on a computer that has a permanent internet connection.  It does not work well for a computer that has intermittent connectivity.

Mail Retrieval And Mailbox Manipulation Protocol (contd):  A two-stage delivery process solves the problem of receiving by a user without a permanent internet connection.  Each user is assigned a mailbox on a computer that has a permanent internet connection. The computer runs a conventional STMP server.  The remote user forms a dailup connection then runs a protocol that retrieves messages from the permanent mailbox. Protocols to retrieve messages are:  Post office protocol  Internet message access protocol

Post Office Protocol:  The most popular protocol used to transfer e- mail messages is version3 of Post Office Protocol (POP3).  User invokes a POP3 client to create TCP connection to a POP3 server on the mailbox computer.  User sends login and password to authenticate the session.  Then user client sends commands to retrieve a copy of one or more messages and to delete the message from the permanent mailbox.  Messages are stored and transferred as text file in 822 standard format.

Internet Message Access Protocol:  Version 4 of Internet Message Access Protocol (IMAP4) is similar to POP3 with extended functionality:  Allows a user to dynamically create, delete, or rename mailboxes.  User can obtain information about a message or examine header fields without retrieving the entire message.  Allows partial retrieval of specified portion of a message.

The MIME Extension For Non- ASCII Data (contd):  The seven basic content types are Content TypeUsed When Data In The Message Is textTextual(e.g. a document) imageA still or computer-generated image audioA sound recording videoA video recording that includes motion applicationRaw data for a program multipartMultipart messages that each have a separate content type and encoding messageAn entire message or an external reference to a message.

The MIME Extension For Non- ASCII Data:  The Multipurpose Internet Mail Extension (MIME) were defined to allow transmission of non-ASCII data through .  MIME does not change or replace STMP or POP3.  It allows arbitrary data to be encoded in ASCII and then transmitted in a standard message.

The MIME Extension For Non- ASCII Data:  Each MIME message includes the following information which resides in the 822mail header.  The version of MIME used.  The type of data being sent.  The encoding used to convert the data to ASCII.  The Content-Type in the header has two identifiers:  Content Type  Subtype.

MIME Multipart Messages:  MIME multipart content type adds flexibility and provides important functionality.  There are four possible types of subtype in multipart content  Subtype mixed - allows a single message to content multiple, independent submessages that each can have an independent type and encoding.  Subtype alternative - allows a single message to include multiple representations of the same data.

MIME Multipart Messages(contd):  Subtype parallel - permits a single message to include subpart that should be viewed together.  Subtype digest - permits a single message to contain a set other messages.  The keyword Boundary = following the multipart content type declaration in the header defines the string used to separate parts of the message.

Summary:  Electronic mail is the most widely available application services.  Like most TCP/IP services, it uses the client-server paradigm.  The TCP/IP protocol suite provides separate standards for mail message format and mail transfer.  The mail message format, called 822, uses a blank line to separate a message header and the body.  The Simple Mail Transfer Protocol (SMPT) defines how a mail system on one machine transfers mail to a server on another.

Summary:  Post Office Protocol (POP3) as well as Internet Message Access Protocol (IMAP4) specifies how a user can retrieve the contents of a mailbox.  The Multipurpose internet Mail Extensions (MIME) provides a mechanism that allows arbitrary data to be transferred using STMP.  MIME adds lines to the header of an message to define the type of the data and the encoding used.  MIME’s mixed multipart type permits a single message to contain multiple datatype.