TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of email architecture.

Slides:



Advertisements
Similar presentations
1 Electronic Mail u Three major components: u user agents u mail servers u simple mail transfer protocol: SMTP u User Agent u a.k.a. “mail reader” u composing,
Advertisements

TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 23 Electronic Mail: SMTP,
Application: Electronic Mail Linda Wu (CMPT )
Application Layer Pertemuan 25 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
CPSC 441: FTP & SMTP1 Application Layer: FTP & Instructor: Carey Williamson Office: ICT Class.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 23 Electronic Mail: SMTP,
Electronic Mail and SMTP
Simple Mail Transfer Protocol (SMTP) CS-328 Dick Steflik.
Chapter 30 Electronic Mail Representation & Transfer
Esimerkki: Sähköposti. Lappeenranta University of Technology / JP, PH, AH Electronic Mail Three major components: user agents mail servers simple mail.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Simple Mail Transfer Protocol
Architecture of SMTP, POP, IMAP, MIME.
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Mail Server Fitri Setyorini. Content SMTP POP3 How mail server works IMAP.
Electronic Mail: SMTP, POP, and IMAP
Simple Mail Transfer Protocol (SMTP) Kanika Thapar CISC 856 TCP/IP and Upper Layer Protocols 11/8/2007 (Some slides provided by Ezra Kissel, some figures.
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
2: Application Layer1 Chapter 2 Application Layer These slides derived from Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross.
Electronic Mail (SMTP, POP, IMAP, MIME)
Simple Mail Transfer Protocol
SMTP, POP3, IMAP.
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
CSE401N: Computer Networks Lecture-5 Electronic Mail S. M. Hasibul Haque Lecturer Dept. of CSE, BUET.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
Intro to Computer Networks Bob Bradley The University of Tennessee at Martin.
Review: –How do we address “a network end-point”? –What services are provided by the Internet? –What is the network logical topology observed by a network.
Application Layer Protocols Simple Mail Transfer Protocol.
Chapter 7: Internet-Based Applications Business Data Communications, 6e.
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
4-Traditional Internet Applications Dr. John P. Abraham Professor UTPA.
Lecturer: Maxim Podlesny Sep CSE 473 File Transfer and Electronic in Internet.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
1 Applications Electronic Mail. 2 Electronic Mail Many user applications use client-server architecture. Electronic mail client accepts mail.
TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Computer Networks26-1 Chapter 26. Remote Logging, Electronic Mail and File Transfer.
Simple Mail Transfer Protocol (SMTP)
Electronic Mail. Client Software and Mail Hosts –Client PC has client software that communicates with user’s mail host –Mail hosts deliver.
SMTP( 简单邮件传输协议 ) SIMPLE MAIL TRANSFER PROTOCOL RFC 2812.
File Transfer Protocol (FTP)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Network Protocols Chapter 26 (Data Communication and Networking): Remote Logging, Electronic Mail, and.
1 SMTP - Simple Mail Transfer Protocol –RFC 821 POP - Post Office Protocol –RFC 1939 Also: –RFC 822 Standard for the Format of ARPA Internet Text.
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
SMTP - Simple Mail Transfer Protocol RFC 821
CS440 Computer Networks 1 Neil Tang 12/01/2008.
Slides based on Carey Williamson’s: FTP & SMTP1 File Transfer Protocol (FTP) r FTP client contacts FTP server at port 21, specifying TCP as transport protocol.
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Electronic Mail: SMTP, POP IMAP, and MIME.
COMP 431 Internet Services & Protocols
1 Kyung Hee University Chapter 22 Simple Mail Transfer Protocol (SMTP)
1 Architecture 2 User Agent 3 Message Transfer Agent 4 Message Access Agent 5 MIME 6 Web-Based Mail 7 Electronic Mail Security.
26.1 Electronic Mail Sending/Receiving Mail Addresses User Agent MIME Mail Transfer Agent Mail Access Protocols.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
Dr. Adil Yousif University of Alneelian – Master of CS - IT Electronic Mail.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
SMTP - Simple Mail Transfer Protocol POP - Post Office Protocol
Networking Applications
Remote Logging, Electronic Mail, and File Transfer
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Chapter 2: Application layer
William Stallings Data and Computer Communications
Remote Logging, Electronic Mail,
Chapter 7 Network Applications
Chapter 2 Application Layer
Presentation transcript:

TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture Understand the functions and formats of a user agent Understand MIME and its capabilities and data types Understand the functions and commands of an MTA Understand the function of POP3 and IMAP4 Objectives

TCP/IP Protocol Suite ARCHITECTURE To explain the architecture of , we give four scenarios. We begin with the simplest situation and add complexity as we proceed. The fourth scenario is the most common in the exchange of . User Agent - software program that composes, reads, replies to, and forwards messages. It also handles mailboxes. Message Transfer Agent - the actual mail transfer is done through message transfer agents. SMTP is an example of an MTA. Message Access Agent - the software that pulls messages out of a mailbox. POP3 and IMAP4 are examples of MAAs.

TCP/IP Protocol Suite 3 Figure 20.1 First and second scenario First scenario: sender and receiver on same system so need only two UAs. Second scenario: sender and receiver on different systems so need two UAs and pair of MTAs

TCP/IP Protocol Suite 4 Figure 20.3 Third scenario

TCP/IP Protocol Suite 5 Figure 20.4 Fourth scenario When both sender and receiver are connected to the mail server via a LAN or a WAN, we need two UAs, two pairs of MTAs (client and server),and a pair of MAAs (client and server). This is the most common situation today.

TCP/IP Protocol Suite USER AGENT The user agent (UA) provides service to the user to make the process of sending and receiving a message easier. The topics discussed in this section include: Services Provided by a User Agent User Agent Types Sending Mail Receiving Mail Addresses Mailing List MIME

TCP/IP Protocol Suite 7 Figure 20.6 User agent Like many applications, programs can be command driven or GUI-based.

TCP/IP Protocol Suite 8 Figure 20.7 Format of an

TCP/IP Protocol Suite 9 Figure address also allows one name, an alias, to represent several different addresses: this is called a mailing list. Every time an is sent, the system checks the recipient’s name against the alias database.

TCP/IP Protocol Suite 10 Figure 20.9 MIME can only send messages composed of 7-bit NVT ASCII. (NVT = network virtual terminal) What if you tried to send a file that was not in 7-bit ASCII? MIME (Multipurpose Internet Mail Extensions) allows an system to send non-ASCII data.

TCP/IP Protocol Suite 11 Figure MIME header MIME defines 5 headers that can be added to the original header section to define the transformation parameters: MIME version is currently 1.1

TCP/IP Protocol Suite 12 Table 20.1 Data types and subtypes in MIME MIME allows seven different types of data (five of those have subtypes). Text: the original message is in 7-bit ASCII and no transformation by MIME is needed.

TCP/IP Protocol Suite 13 Multipart: the body contains multiple, independent parts. Some type of boundary is defined and this boundary is used to separate the parts. For example: Content-Type: multipart/mixed; boundary=xxxx --xxxx Content-type: text/plain; ……………………. --xxxx Content-type: image/gif; ……………………. --xxxx--

TCP/IP Protocol Suite 14 Table 20.1 Data types and subtypes in MIME (Continued) Video: MPEG - if the video includes sound, then the sound must be sent separately using the audio content type Application: Octet-stream - used for binary files

TCP/IP Protocol Suite 15 Table 20.2 Content-transfer-encoding The next header defines the method used to encode the messages into 0s and 1s for transport.

TCP/IP Protocol Suite 16 Figure Base64 These values here come from the table on the next slide.

TCP/IP Protocol Suite 17 Table 20.3 Base64 encoding table

TCP/IP Protocol Suite 18 Figure Quoted-printable Base-64 has a 25% overhead. If the data has a high percentage of ASCII characters already, then use this technique. (Not as common as Base-64.) = sign (not a 5) 9D is ASCII rep of hex data

TCP/IP Protocol Suite MESSAGE TRANSFER AGENT: SMTP The actual mail transfer requires message transfer agents (MTAs). The protocol that defines the MTA client and server in the Internet is called Simple Mail Transfer Protocol (SMTP). The topics discussed in this section include: Commands and Responses Mail Transfer Phases

TCP/IP Protocol Suite 20 Figure SMTP range SMTP is used once between Sender and Sender’s mail server, and then again between the two mail servers.

TCP/IP Protocol Suite 21 Figure Commands and responses Commands are sent from client to server; responses vice versa. Commands consist of keyword followed by zero or more arguments. 14 different commands. First 5 are required by all institutions. Next 3 are often used and highly recommended. Last 6 are seldom used. And the commands are……

TCP/IP Protocol Suite 22 Table 20.4 Commands

TCP/IP Protocol Suite 23 Table 20.4 Commands HELO - used by client to identify himself. The argument is the domain name of the client host. HELO: cs.depaul.edu MAIL FROM - Used to identify the sender of the message MAIL RCPT TO - used by client to identify the intended recipient of the message. If multiple recipients, the command is repeated. RCPT TO: DATA - all lines that follow the DATA command are treated as the mail message. The message is terminated by a line containing just one period. QUIT - this command terminates the message

TCP/IP Protocol Suite 24 Table 20.4 Commands RSET - aborts the current mail transaction. The stored information about the sender and recipient is deleted. VRFY - used to verify the address of the recipient, which is sent as the argument. VRFY: NOOP - used by the client to check the status of the recipient. It requires an answer from the recipient.

TCP/IP Protocol Suite 25 Table 20.5 Responses Responses are 3-digit codes Codes that begin with a 2 are positive completions etc.

TCP/IP Protocol Suite 26 Table 20.5 Responses (Continued)

TCP/IP Protocol Suite 27 Figure Connection establishment The process of transferring a mail message occurs in three phases: connection establishment, mail transfer, and connection termination.

TCP/IP Protocol Suite 28 Figure Message transfer

TCP/IP Protocol Suite 29 Figure Connection termination

TCP/IP Protocol Suite 30 Example 1 $ telnet mail.adelphia.net 25 Trying Connected to mail.adelphia.net ( ). Let us see how we can directly use SMTP to send an and simulate the commands and responses we described in this section. We use TELNET to log into port 25 (the well-known port for SMTP). We then use the commands directly to send an . In this example, is sending an to himself. The first few lines show TELNET trying to connect to the adelphia mail server. After connection, we can type the SMTP commands and then receive the responses as shown below. We have shown the commands in black and the responses in color. Note that we have added for clarification some comment lines, designated by the “=” sign. These lines are not part of the procedure.

TCP/IP Protocol Suite 31 Example 1 (Continued) ================== Connection Establishment ================ 220 mta13.adelphia.net SMTP server ready Fri, 6 Aug HELO mail.adelphia.net 250 mta13.adelphia.net ===================== Envelope =================== MAIL FROM: 250 Sender Ok RCPT TO: 250 Recipient Ok =================== Header and Body ================== DATA 354 Ok Send data ending with. From: Forouzan TO: Forouzan This is a test message to show SMTP in action..

TCP/IP Protocol Suite 32 Example 1 (Continued) ============= Connection Termination=============== 250 Message received: QUIT 221 mta13.adelphia.net SMTP server closing connection Connection closed by foreign host.

TCP/IP Protocol Suite MESSAGE ACCESS AGENT: POP AND IMAP The third stage of mail delivery uses a message access agent; the client must pull messages from the server. Currently two message access protocols are available: Post Office Protocol, version 3 (POP3) and Internet Mail Access Protocol, version 4. The topics discussed in this section include: POP3IMAP4

TCP/IP Protocol Suite 34 Figure POP3 and IMAP4

TCP/IP Protocol Suite 35 Figure POP3 and IMAP4 POP3 is simple and limited in functionality. Need POP3 client on user machine and POP3 server on the mail server machine. The client opens a connection to the server on TCP port 110. It then sends its user name and password to access the mailbox. User can then access the . Example on next slide:

TCP/IP Protocol Suite 36 Figure POP3

TCP/IP Protocol Suite 37 Figure POP3 and IMAP4 IMAP is more powerful and more complex than POP3. In particular, with IMAP: A user can check the header prior to downloading A user can search the contents of the for a specific string of characters prior to downloading A user can partially download (helpful if contains huge attachments and connection is slow A user can create, delete, or rename mailboxes on the mail server A user can create a hierarchy of mailboxes in a folder for storage

TCP/IP Protocol Suite WEB-BASED MAIL Some websites such as Hotmail and Yahoo provide service to anyone who accesses the site. Mail transfer and retrieval requires the use of HTTP, instead of POP3 or IMAP4.