E-mail By Beth Lim Table of Contents Goals: Definition of Email The format of an Email The history of an Email How Email works Pros and cons of Email.

Slides:



Advertisements
Similar presentations
ALL ABOUT S .
Advertisements

Managing Incoming Chapter 3 Bit Literacy. Terminology client – program which retrieves s from a mail server, lets you read the mails,
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Introduction to Your Name Goes Here
Lesson 7: Business, , & Personal Information Management
Chapter 2: Application layer  2.1 Web and HTTP  2.2 FTP 2-1 Lecture 5 Application Layer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
Introduction 1 Lecture 7 Application Layer (FTP, ) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
-I CS-3505 Wb_ -I.ppt. 4 The most useful feature of the internet 4 Lots of different programs, but most of them can talk to each.
Introduction 1-1 Chapter 2 FTP & Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 IC322 Fall.
 ENGR 1110 Introduction to Engineering – Cyber Security Allison Holt, Adam Brown Auburn University.
E – Mail History of s What is an ? What happens when we sent an ? messages Folders Address Attachments Types of.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Application Layer Chapter
Electronic Mail (SMTP, POP, IMAP, MIME)
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
SMTP, POP3, IMAP.
Data Communications and Computer Networks Chapter 2 CS 3830 Lecture 9
IT 424 Networks2 IT 424 Networks2 Ack.: Slides are adapted from the slides of the book: “Computer Networking” – J. Kurose, K. Ross Chapter 2: Application.
The Linux Operating System Lecture 7: Tonga Institute of Higher Education.
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
IST346 – Servies Agenda  What is ?  Policies  The technical side of  Components  Protocols  architecture  Security.
思科网络技术学院理事会. 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
IT:Network:Applications.  How messaging servers work  Initial tips for success Exchange management  Server roles  Exchange Server Management  Message.
The Internet in Education Objectives Introduction Overview –The World Wide Web –Web Page v. Web Site v. Portal Unique and Compelling Characteristics Navigation.
WXET1143 Lecture7: , Chat and Messaging. Introduction  Electronic mail is everywhere.  Now many people in business, government, and education use.
CPT 499 Internet Skills for Educators Electronic Mail Session Five.
Chapter 8 The Internet: A Resource for All of Us.
Internet Application. understanding Addresses Routing of Instant Messaging Collaborative Computing Grid Social networking Forums Societies.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
and VOIP. Definitions Storage- the action or method of storing something for future use. Forward system- Address book- A book for recording the.
Network Services Networking for Home & Small Business.
CPT 123 [299] Internet Skills Overview of the Internet Session One Class Notes DMWilliamson 1998.
CS101 Introduction to Computing Lecture 7 Internet Services.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Electronic Mail. Client Software and Mail Hosts –Client PC has client software that communicates with user’s mail host –Mail hosts deliver.
1 Blackboard To Log In: Go To: Click On: Login Username: Firstname.Lastname Password: Last 4 digits of S.S. # View often for.
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
and its Protocols Hina Patel TCM
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Two Installing and Configuring Exchange Server 2003.
Communication, Networks, The internet and the Worldwide Web.
Introduction to Student Name Student Class.
Advantages Convenience Speed Inexpensive Saves on natural resources Reliable Not limited to text.
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
Chapter 20 - Electronic Mail Introduction Description Of Functionality –send a single message to many recipients. –send a message that includes text, voice,
  is a system of electronic communication that allows the user to exchange messages over the internet  Everyone’s address is unique  Two.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
A Quick Look At How Works Understanding the basics of how works can make life a lot easier for any user. Especially those who are interested.
Amanda Fristy Damara Thea Bayu Gerhana Yuda Evita Fitri Ila Uswatun Hasanah Putri Ayuning Kartika Presented by :
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
CITA 310 Section 6 Providing Services (Textbook Chapter 8)
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
By Toby Reed.
Md. Abdul Jalil MA (B Ed 1 st ) Assistant Teacher (English) Horipur High School Tanore –Rajshahi Resource Teacher (English) (SEQAEP) Master Trainer.
Different signs Laptop Device Today we will learn about – MEDIA AND COMMUNICATIONS English For Today Class –Nine Unit –Thirteen Lesson -One.
Week-2 (Lecture-1) An electronic message sent from one computer to another. contains account i.e. How does.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
– Purposes & Uses 20 – Purposes & Uses 20.
Contents Spelling Origin of Operation Message Format
Introduction to Your Name Goes Here
CIW Lesson 7 Part A Name: _______________________________________
has many aspects that work together to give people almost instant communication from any computer on the internet to any other computer There.
Introduction to Your Name Goes Here
Unit – 4 Chap - 2 Mail Delivery System
Electronic Communication and the Internet
 Zone in name space  DNS IN THE INTERNET  Generic domains :There are fourteen generic domains, each specifying an organization type.
Presentation transcript:

By Beth Lim

Table of Contents Goals: Definition of The format of an The history of an How works Pros and cons of Think Twice before hitting “Send”

Definition of A method of exchanging digital messages Short for Electronic Mail Based on a store- and- forward basis

History of Morse Code telegraph IBM radiotype, nicknamed a “high- speed substitute for the world of tomorrow”. Teleprinters were also used in Germany during World War s- Telex Network and a similar but compatible American TWX which remained important until the late 1980s AUTODIN network, providing message service between 1,350 terminals handling 30 million messages a month ARPANET computer network made a large contribution to the development of . In 1971, Ray Tomlinson initiated the use of sign to separate the names of the user and their machine. ARPANET significantly increased the popularity of , and it became the killer app of ARPANET. This again???

How Works The below explains what happens when Alice sends a message to Bob: 1.The message is sent to Alice’s MUA through SMTP, also called submission protocol. 2.The MUA sends it to the MSA through DNS. 3.The DNS server for the fully qualified domain name then responds with MX records (a mail exchange record explaining how the should be routed) listing the Mail Exchange Servers for that domain. 4.The server using SMTP then sends the message to the domain name. 5.The final MDA (Mail delivery agent) delivers it to the mailbox of Bob. 6.Bob presses the get mail button in his MUA, which picks up the message using POP3 or IMAP4.

Pros of using Much of the business world relies on It is free Allows asynchrony Allows participants to control their schedule independently Almost instant in delivery

Cons of using Flaming Bankruptcy Loss of context Information overload Inconsistenc y (duplication of information) Liability Attachment size limitation Spamming- Bombing Viruses e.g. worms Phishing- spoofing Privacy concerns Despite these disadvantages, has become the most widely used medium of communication within the business world. A study found that 83% of U.S. knowledge workers felt that played a crucial role in their lives.

Think Twice before Hitting “Send” Have something to say. While your daily musings are permissible on Twitter, your audience will be less forgiving. Make it digestible. doesn’t limit your word count, but you need to apply some editing of your own. Be regular. Set a schedule of s you know you can keep to. Be personal. Tailor your tone to the audience.

Sources Wikipedia Yahoo answers Smashing magazine