Email-to-Blog How It Works. This Is The «Email-to-blog» System Architecture.

Slides:



Advertisements
Similar presentations
ETwinning Netiquette Central Support Service. Partner Finding Forums Choose the right forum (eTwinning/Comenius Partnership) Choose the right age group.
Advertisements

How to Use Stowe School District
.  The sender and recipient(s) of an message do not have to be online at the same time. When one person sends a message, it is stored on an.
“Mult- ” : Multi-Platform Electronic Organizer with Client “Mult- ” : Multi-Platform Electronic Organizer with Client  Kogan Daniel.
TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture.
Electronic Mail. Functionality First software allowed a user to send some text to another user connected to Internet; Current systems allow.
Understanding and Building Basic Networks Chapter 3 The Other Internet.
Exploring Microsoft Office Outlook Microsoft Outlook 2000 A Desktop Information Manager By Robert T. Grauer Maryann Barber.
Fundamentals of Electronic Mail From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Advantages.
Chapter 30 Electronic Mail Representation & Transfer
Esimerkki: Sähköposti. Lappeenranta University of Technology / JP, PH, AH Electronic Mail Three major components: user agents mail servers simple mail.
Understanding Basics Computer Concepts Unit A.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
Visit for Marketing and Deliverability Tips, Tools, & Trainingwww. Delivered.com.
WEBPAGE DESIGN Electronic Mail Anatomy of an Message Messages Contain Two Parts: HHeader AAddressing information To From Subject MMessage.
Presented By: Product Activation Group Syndication.
OCR Nationals – Unit 1 AO2 (Part 2) – s. Overview of AO2 (Part 2) To select and use tools and facilities to download files/information and to send.
WRITING AN . What equipment do I need if I want to write an ? A computer with installed appropriate software A computer with installed appropriate.
Review: –How do we address “a network end-point”? –What services are provided by the Internet? –What is the network logical topology observed by a network.
CIS 90 - Lesson 3 Mail Command. UNIX mail Benji sends message on Opus CIS 90 - Lesson 3 simmsben simmsmar Use. or Ctrl-D to end the.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
CPT 499 Internet Skills for Educators Electronic Mail Session Five.
CSCI3170 Introduction to Database Systems
1 Using Messages sent from machine to machine and stored for later reading. You will use a client to read –Type mail or pine in UNIX to read.
LOGO Server. Contents Introduction 1 Problem Definition 2 Proposed Solution 3 Architecture Diagram 4 Server Technology 5 Hardware and Software.
File Transfer Protocol (FTP)
 Subject: The topic you are talking about. So they understand what it is a about and explain to the point.  clients usually display it in a.
Internet Protocol B Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore
4BP1 Electronic & Computer Engineering Paul Gildea th Year Interim Project Presentation.
EVON TAN KA VUN THECLA JOSEPH NOR FAEEZA ISMALI JESSICCA TOKIROI.
Basic Features and Options Accessing  Means of communicating electronically via the Internet.  Used by individuals, businesses,
Concepts  messages are passed through the internet by using a protocol called simple mail transfer protocol.  The incoming messages are.
Etiquette UNT in partnership with TEA. Copyright©. All rights reserved.
1 E- Mail. 2 Electronic Mail ( ) is simply a means of sending messages via computer Business is using more and fax To access you must.
Let’s Talk About ! Instructor: Robert Griffiths Spring 2010 (original presentation developed by Jill Bond)
Learning Intentions: To understand what is required to achieve a Pass, Merit or Distinction for Task 3.
The Internet The Cloud Gmail in the Cloud.
A Quick Look At How Works Understanding the basics of how works can make life a lot easier for any user. Especially those who are interested.
(Electronic Mail) a message sent and received electronically via telecommunication links between computers.
Amanda Fristy Damara Thea Bayu Gerhana Yuda Evita Fitri Ila Uswatun Hasanah Putri Ayuning Kartika Presented by :
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Etiquette UNT in partnership with TEA. Copyright©. All rights reserved.
Do Now: Describe the steps used to access the comments tool in MS Word. ( review your notes for the answer) Ex: Step 1. Select the text or item you want.
Omnëmail Nicholas Allen Effie Goenawan Annie Liu Eric Orth Maetapong Upatising.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
CITA 310 Section 6 Providing Services (Textbook Chapter 8)
By Sarah Anderson and Tony Christensen. PARTS OF Header Body Attachments.
Lesson Objectives By the end of the lesson you will: 1.Be able to send, receive, reply and forward s in a suitable format. 2.Be able to use and explain.
Where does my go?. Scenario 1: Outlook to Outlook  When one person who is setup to use Outlook sends to another person who also is setup to use.
By Toby Reed.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Guide By Phoebi Stewart. has changed the way we communicate with each other. Being able to send information quickly across the internet.
@Yuan Xue A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
Spring 2006 CPE : Application Layer_ 1 Special Topics in Computer Engineering Application layer: Some of these Slides are Based on Slides.
How to students in your class using Owl Link Updated
Chapter 6 Electronic Mail. Copyright © 2005 Pearson Addison-Wesley. All rights reserved. Objectives To describe basic concepts and their specific.
Mail Server Mail is just a message in any form sends from sender to receiver. Mail Server is a computerized system that is equivalent to virtual post office.
Etiquette.
is short for electronic mail!
Social Media And Global Computing Sending
Training Presentation for McCormick’s Proficiency Sample Program Website Lesson 11 - How to contact the System Administrator [Instructor Notes, if any,
Unit – 4 Chap - 2 Mail Delivery System
s.
COMPUTER NETWORKS PRESENTATION
Basic Features and Options
Basic Features and Options
 Zone in name space  DNS IN THE INTERNET  Generic domains :There are fourteen generic domains, each specifying an organization type.
Google POP QUIZ Work with your table. Record your answers and put a checkmark in the box for each correctly answered question.
Presentation transcript:

-to-Blog How It Works

This Is The « -to-blog» System Architecture

Let’s Consider How It Works

1. How the Blog User posts a message to Blog Blog User composes an message and sends it to a special address, for instance to Each blog has its own pre-defined address but all the blog messages are forwarded to the same physical mailbox.

1. How the Blog User posts a message to Blog    From: To: Subject: My first blog …

1. How the Blog User posts a message to Blog  MailboxWatcher is a Java class that continuously (every 30 sec) checks the mailbox for new messages via POP3 protocol. So, there is a new message in mailbox and MailboxWatcher will detect it soon and start to process it.

1. How the Blog User posts a message to Blog 

 So, MailboxWatcher has dowloaded the message. Now it has to perform a series of checks.

1. How the Blog User posts a message to Blog  1) Is the recipient address ("To:" or "Cc:" header of the message) associated with a blog? MailboxWatcher uses BlogBean.getBlogIdBy ( ) method in order to check this condition. If the method has returned -1, the address is not associated with a blog. In this case the message is being skipped.

1. How the Blog User posts a message to Blog  BlogBean.getBlogIdBy ( ) performs a database query: SELECT ID FROM BLOGS WHERE Blog ID=1 And finds out that the associated blog ID = 1 So, the returned value is 1.

1. How the Blog User posts a message to Blog  2) Is the sender allowed to post messages to the specific blog (Blog ID = 1)? MailboxWatcher performs 3 kinds of tests in order to check this condition.

1. How the Blog User posts a message to Blog  2.1. Is the exact sender’s address ("From:" header of the message) listed in the "authorized users" table for this Blog?

1. How the Blog User posts a message to Blog  AuthorBean.getAuthorBy ( ) performs a database query: SELECT ID,NAME FROM AUTHORS WHERE And finds out that the sender is in the database. Now it’s time to check if the sender is allowed to post messages to the blog. MailboxWatcher calls blog.isAuthorAllowed(sender) method to check this condition. Allowed

1. How the Blog User posts a message to Blog  2.2. If the exact sender’s address is NOT listed in the "authorized users" table for this Blog, then MailboxWatcher will try to find so-called domain-wide user (a address like in the table. The existence of the domain-wide user allows to post messages from any address that belongs to the appropriate domain.

1. How the Blog User posts a message to Blog  2.3. If the domain-wide address is NOT listed in the "authorized users" table for this Blog, then MailboxWatcher will try to find so-called PUBLIC user in the table for the blog. The existence of PUBLIC user allows to post messages from any address.

1. How the Blog User posts a message to Blog  If the sender is allowed (according to at least one of the 3 tests) to post messages, MailboxWatcher calls MessageBean.addMessage() method to store the message in database.