Message preparation Word processing Annotation Message sending User directory Timed delivery Multiple addressing Message priority Status information.

Slides:



Advertisements
Similar presentations
TOPIC : MIME (Multipurpose Internet Mail Extensions ) By: Cecilia Gomes COSC 541,DATA COMMUNICATION SYSTEMS & NETWORKS Instructor: Prof. Anvari (SEU)
Advertisements

1 Pertemuan 23 Layer Transport Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
How Clients and Servers Work Together. Objectives Web Server Protocols Examine how server and client software work Use FTP to transfer files Initiate.
Application Layer Pertemuan 25 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
The Internet Useful Definitions and Concepts About the Internet.
Chapter 6: Distributed Applications Business Data Communications, 5e.
Chapter 29 Structure of Computer Names Domain Names Within an Organization The DNS Client-Server Model The DNS Server Hierarchy Resolving a Name Optimization.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture.
CPSC 441: FTP & SMTP1 Application Layer: FTP & Instructor: Carey Williamson Office: ICT Class.
Electronic Mail and SMTP
Chapter 30 Electronic Mail Representation & Transfer
Esimerkki: Sähköposti. Lappeenranta University of Technology / JP, PH, AH Electronic Mail Three major components: user agents mail servers simple mail.
Simple Mail Transfer Protocol
Chapter 7: Internet-Based Applications Business Data Communications, 6e.
Architecture of SMTP, POP, IMAP, MIME.
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Mail Server Fitri Setyorini. Content SMTP POP3 How mail server works IMAP.
Electronic Mail (SMTP, POP, IMAP, MIME)
SMTP, POP3, IMAP.
1 Application Layer Lecture 5 Imran Ahmed University of Management & Technology.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
CSE401N: Computer Networks Lecture-5 Electronic Mail S. M. Hasibul Haque Lecturer Dept. of CSE, BUET.
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
Review: –How do we address “a network end-point”? –What services are provided by the Internet? –What is the network logical topology observed by a network.
Application Layer Protocols Simple Mail Transfer Protocol.
Chapter 7: Internet-Based Applications Business Data Communications, 6e.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Internet Applications  DNS   TELNET  FTP  Web browsing.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
1 Applications Electronic Mail. 2 Electronic Mail Many user applications use client-server architecture. Electronic mail client accepts mail.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
CSI315 Web Development Technologies Continued. Communication Layer information needs to get from one place to another –Computer- Computer –Software- Software.
CPT 499 Internet Skills for Educators Electronic Mail Session Five.
Simple Mail Transfer Protocol (SMTP)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
CIS-325: Data Communications 1 CIS-325 Data Communications Dr. L. G. Williams, Instructor.
Electronic Mail. Client Software and Mail Hosts –Client PC has client software that communicates with user’s mail host –Mail hosts deliver.
File Transfer Protocol (FTP)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Network Protocols Chapter 26 (Data Communication and Networking): Remote Logging, Electronic Mail, and.
1 SMTP - Simple Mail Transfer Protocol –RFC 821 POP - Post Office Protocol –RFC 1939 Also: –RFC 822 Standard for the Format of ARPA Internet Text.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Chapter 16: Distributed Applications Business Data Communications, 4e.
Lecture 6: Sun: 8/5/1435 Distributed Applications Lecturer/ Kawther Abas CS- 492 : Distributed system & Parallel Processing.
Application Layer Honolulu Community College Cisco Academy Training Center Semester 1 Version
CS 3830 Day 9 Introduction 1-1. Announcements r Quiz #2 this Friday r Demo prog1 and prog2 together starting this Wednesday 2: Application Layer 2.
TCP/IP (Transmission Control Protocol / Internet Protocol)
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
Internet Applications (Cont’d) Basic Internet Applications – World Wide Web (WWW) Browser Architecture Static Documents Dynamic Documents Active Documents.
Network and Internet Security Prepared by Dr. Lamiaa Elshenawy
Chapter 16: Distributed Applications Business Data Communications, 4e.
CS440 Computer Networks 1 Neil Tang 12/01/2008.
Slides based on Carey Williamson’s: FTP & SMTP1 File Transfer Protocol (FTP) r FTP client contacts FTP server at port 21, specifying TCP as transport protocol.
COMP 431 Internet Services & Protocols
1 Kyung Hee University Chapter 22 Simple Mail Transfer Protocol (SMTP)
Data and Computer Communications Tenth Edition by William Stallings Data and Computer Communications, Tenth Edition by William Stallings, (c) Pearson Education.
TCP/IP Services and Applications Chapter 14 Release 16/7/2009.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
© MMII JW RyderCS 428 Computer Networks1 Electronic Mail  822, SMTP, MIME, POP  Most widely used application service  Sometimes only way a person ever.
Networking Applications
Instructor Materials Chapter 5 Providing Network Services
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
Web Development & Design Chapter 1, Sections 4, 5 & 6
Chapter 6: Distributed Applications
ELECTRONIC MAIL SECURITY
ELECTRONIC MAIL SECURITY
William Stallings Data and Computer Communications
Chapter 7 Network Applications
Presentation transcript:

Message preparation Word processing Annotation Message sending User directory Timed delivery Multiple addressing Message priority Status information Interface to other facilities Message receiving Mailbox scanning Message selection Message notification Message reply Message rerouting

Defined in RFC 5598 At its most fundamental level consists of: User world In the form of message user agents (MUA) Transfer world In the form of the message handling service (MHS) Which is composed of message transfer agents (MTA)

Administrative management domain (ADMD) Internet provider Examples include: A department that operates a local mail relay (MTA) An IT department that operates an enterprise mail relay An ISP that operates a public shared service Domain name system (DNS) Directory lookup service that provides a mapping between the name of a host on the Internet and its numerical address

User agent enters a username and password to connect to the server to retrieve mail Post Office Protocol (POP) Provides stronger authentication and provides other functions not supported by POP Internet Mail Access Protocol (IMAP) Used for transfer of mail from a user agent to a MTA and from one MTA to another Simple Mail Transfer Protocol (SMTP) Supplements SMTP and allows the encapsulation of multimedia messages inside of a standard SMTP message Multipurpose Internet Mail Extensions (MIME)

Standard protocol for transferring mail between hosts in the TCP/IP suite Defined in RFC 821 Standardizes the message character set as 7-bit ASCII Adds log information to the start of the delivered message that indicates the path the message took

Defines a format for text messages that are sent using Used by SMTP as accepted mail format Messages are viewed as having an envelope and contents Envelope contains whatever information is needed to accomplish transmission and delivery Contents compose the object to be delivered to the recipient Content standard includes a set of header fields that may be used by the mail system to create the envelope, and the standard is intended to facilitate the acquisition of such information by programs

Consist of a sequence of lines of text and use a general “memo” framework A message consists of some number of header lines, which follow a rigid format, followed by a body portion consisting of arbitrary text A header line usually consists of a keyword, followed by a colon, followed by the keyword’s arguments The most frequently used keywords are From, To, Subject, and Date Also commonly found in the header is a Message-ID field which contains a unique identifier associated with the message

SMTP: Cannot transmit executable files or other binary objects Cannot transmit text data that include national language characteristics Servers may reject a mail message over a certain size Gateways that translate between ASCII and the character code EBCDIC do not use a consistent set of mappings, resulting in translation problems Gateways to X.400 networks cannot handle nontextual data included in X.400 messages Some implementations do not adhere completely to the SMTP standards defined in RFC 821

Intended to resolve problems with SMTP and RFC 822 Specifies five new message header fields which may be included in an RFC 822 header These fields provide information about the body of the message A number of content formats are defined, thus standardizing representations that support multimedia Transfer encodings are defined that enable the conversion of any content format into a form that is protected from alteration by the mail system

MIME-Version Must have the parameter value 1.0 Field indicates that the message conforms to the RFCs Content-Type Describes data in sufficient detail for receiver to pick method for representation Content-Transfer-Encoding Indicates type of transformation used to represent content Content-ID Used to uniquely identify MIME entities Content-Description Plain text description of the object with the body for use when object is not readable

Supports retrieval of mail between a client system (MUA) and a server that holds the mail for the client (MS) MUA establishes a TCP connection to the MS using port 110 POP3 (version 3 of POP) is an Internet standard defined in RFC 1939 Supports the basic functions of download and delete for retrieval States Authentication state Transaction state Update state

Defined by RFC 3501 Provides more functionality to users than the POP model Clients can have multiple remote mailboxes from which messages can be retrieved Clients can specify criteria for downloading messages Always keeps messages on the server and replicates copies to the clients Allows clients to make changes when connected and when disconnected

Table can be found on page 292 in text

Transaction oriented client/server protocol Most typical use is between a Web browser and a Web server Makes use of TCP to provide reliability Is a stateless protocol Each transaction is treated independently Flexible in the formats that it can handle

The Web is vulnerable to attacks on the Web servers over the Internet Reputations can be damaged and money can be lost if the Web servers are subverted A Web server can be exploited as a launching pad into the corporation’s or agency’s entire computer complex Web servers are relatively easy to configure and manage but the underlying software is extraordinarily complex and may hide potential security flaws Users are not necessarily aware of the security risks that exist and do not have the tools or knowledge to take effective countermeasures

Confidentiality All data that pass between the two applications are encrypted so that they cannot be eavesdropped on the Internet Message integrity SSL assures that the message is not altered or substituted for en route Authentication SSL can validate the identity of one or both partners to the exchange

Combination of HTTP and SSL to implement secure communication between a Web browser and a Web server Principal difference seen by a user of a Web browser is that URL addresses begin with Provides encrypted communication of: URL of the requested document Contents of the document Contents of the browser forms Cookies Contents of the HTTP Header

Media Refers to the form of information and includes text, still images, audio, and video Multimedia Human- computer interaction involving text, graphics, voice and video Also refers to storage devices that are used to store multimedia content Streaming media The media content is consumed as it is delivered from the server rather than waiting until an entire file is downloaded

Text Information that can be entered via a keyboard and is directly readable and printable Audio Encompasses two different ranges of sound Graphics Supports the communication of individual pictures, charts, or drawings Video Carries sequences of pictures in time

Widespread use of and the Internet by employees raises a number of concerns for employers Policy Issues: Business use only Policy scope Content ownership Privacy Standard of conduct Reasonable personal use Unlawful activity prohibited Security policy Company policy Company rights Disciplinary action

Electronic mail Internet mail architecture SMTP MIME POP and IMAP Web access and HTTP Web security Web traffic security approaches SSL HTTPS Chapter 10: Internet-Based Applications Multimedia applications Media types Multimedia applications Multimedia technologies Acceptable use policies Motivation Policy issues Guidelines for developing a policy