SlideShare une entreprise Scribd logo
1  sur  29
Télécharger pour lire hors ligne
Name: Shwetanshu Gupta
MBA- 1st Sem- 49
E- mail ?
One of the most important services of internet
is electronic- mail.
Electronic mail, commonly referred to as e-
mail since 1993, is a method of exchanging
digital messages from a user to one or more
recipients.
Some early email systems required both the
users to be online at the same time.
Cont’d
Today's email systems are based on a store-
and-forward model.
Requires an account on a mail server and
supporting software on your PC
The username and password will allow you
to access your account
All e-mail programs allow you to Send,
Compose, Reply, and Forward mail
E-mail format
An Internet email message consists of
three components: Envelope, Header and
Body.
Architecture
User Agent -Software program that
composes, reads, replies to, and
forwards messages. It also handles
mailboxes.
Message Transfer Agent - The actual mail
transfer is done through message
transfer agents. SMTP is an example of
an MTA.
Message Access Agent - The software
that pulls messages out of a mailbox.
SCENARIORS IN E-MAIL
When the sender and the receiver
of an e-mail are on the same mail
server, we need only two user
agents.
When the sender and the receiver
of an e-mail are on different mail
servers, we need two UAs and a
pair of MTAs (client and server).
When the sender is connected to
the mail server via a LAN or a
WAN, we need two UAs and two
pairs of MTAs (client and server).
When both sender and receiver are
connected to the mail server via a LAN
or a WAN, we need two UAs, two pairs of
MTAs (client and server), and a pair of
MAAs (client and server). This is the
most common situation today.
SMTP, POP 3, IMAPV4
For exchanging of e-
mail, protocols are
required. These are:
SMTP
SMTP is short for Simple Mail Transfer Protocol. It is
a standard for sending electronic mail over internet
and part of the TCP/IP protocol suite.
SMTP defines the message format and the message
transfer agent (MTA), which stores and forwards the
mail.
SMTP is a relatively simple, text-based
protocol, where one or more recipients of a message
are specified and then the message text is
transferred.
The direction of the bulk data (messages) is from the
client to the server.
SMTP ARCHITECTURE
Commands and Responses
Commands are sent from client to
server; responses vice versa.
Keywords; argument(s)
Commands format
Commands
14 different
commands.
First 5 are
required by
all
institutions.
Next 3 are
often
used, but
highly
recommended
.
Responses
Responses
are3-digit
codes
Codes that
begin with
a 2 are
positive
completion
s
LIMITATIONS OF SMTP:
Security matters for SMTP are worse.
Its usefulness is limited by its
simplicity.
Transmission of binary files using SMTP
is not possible without converting into
text files. Use MIME to send mail in
other format.
It is limited to 7-bit ASCII characters
only.
SMTP servers may reject mail messages
beyond some specific length.
POP3 AND IMAPV4
The first and the second stages of mail
delivery use SMTP. However, SMTP is not
involved in the third stage because SMTP is a
push protocol; it pushes the message from the
client to the server.
In other words, the direction of the bulk data
(messages) is from the client to the server.
On the other hand, the third stage needs a pull
protocol; the client must pull messages from
the server. The direction of the bulk data are
from the server to the client. The third stage
uses a message access agent.
There are 3 stages in Mail Delivery:
The first and the second stages of mail
delivery use SMTP( push messages)
The third stage of mail delivery use
POP3 or IMAP4(pull messages)
Stages of Mail
Delivery
POP3 is simple and limited in functionality.
Need POP3 client on user machine and POP3
server on the mail server machine.
It is a pull protocol; the client must pull
messages from the server.
The direction of the bulk data are from the
server to the client.
It is a message access agent.
Pop 3
POP 3
Pop3 has two modes: keep mode and
delete mode
In delete mode mail is deleted from
mailbox after each retrieval.
In keep mode, mail remains in mailbox
after each retrieval.
Advantages:
Simple protocol
Easier to
implement
Copies all
messages when
connection is
made.
Disadvantages:
Don’t allow user
to organize mails
on server.
Don’t allow user
to partially
check the
contents of mail
before
downloading.
IMAPV4
As its name implies, IMAP allows us to access
email messages wherever we are .
Basically, email messages are stored on
servers. Whenever we heck inbox, our email
client contacts the server to connect with
messages.
When we read an email message using IMAP, we
aren't actually downloading or storing it on
computer; instead, we are reading it off of
the server.
As a result, it's possible to email from
several different devices without missing a
thing.
It as an intermediary between email
client and email server.
When you sign into an email client like
Microsoft Outlook, it contacts the
email server using IMAP.
The headers of all of your email
messages are then displayed.
If you choose to read a message, it is
quickly downloaded so that you can
see it - emails are not downloaded
unless you need to open them.
POP works by contacting email server and
downloading all new messages from it. Once
they are downloaded, they disappear from
the server.
If we decide to check email from a different
device, the messages that have been
downloaded previously will not be
available.
POP works fine for those who generally
only check their email messages from a
single device; those who travel or need to
access their email from various devices are
much better off with IMAP-based email
Unlike POP, IMAP allows us to access, organize,
read and sort email messages without having
to download them first.
As a result, IMAP is very fast and efficient.
The server also keeps a record of all of the
messages that we send, allowing us to access
sent messages from anywhere.
IMAP does not move messages from the server
to computer; instead, it synchronizes the
email that's on computer with the email that's
on the server.
POP3 VS IMAPV4
Advantages of imapv4
A user can check the email header prior to
downloading
A user can search the contents of the email
for a specific string of characters prior to
downloading
A user can partially download email
(helpful if email contains huge attachments
and connection is slow)
A user can create, delete, or rename
mailboxes on the mail server
A user can create a hierarchy of mailboxes in
a folder for email storage
It allows us to access email messages from
anywhere, and from many different devices as we
want.
It only downloads a message when we click on it. As a
result, you do not have to wait for all of your new
messages to download from the server before you
can read them.
Attachments are not automatically downloaded with
IMAP. As a result, you're able to check your messages a
lot more quickly and have greater control over
which attachments are opened.
Finally, IMAP can be used offline just like POP - you
can basically enjoy the benefits of both protocols in
one.
CONCLUSION
As the world becomes more mobile
than ever, IMAP is becoming more and
more popular. The proliferation of
smartphones, laptops, tablets and
other devices is making the demand
for IMAP stronger than ever.
While POP will remain popular with
people who only access their email via
one or two devices - and those who
have slow connections to the Internet -
IMAP is sure to remain the protocol of
choice for most of today's busy
people.
Smtp, pop3, imapv 4

Contenu connexe

Tendances (20)

Application Layer
Application LayerApplication Layer
Application Layer
 
SNMP/SMTP/MIME
SNMP/SMTP/MIMESNMP/SMTP/MIME
SNMP/SMTP/MIME
 
HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
 
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLSMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Introduction to Application layer
Introduction to Application layerIntroduction to Application layer
Introduction to Application layer
 
Email and DNS
Email and DNSEmail and DNS
Email and DNS
 
TCP/ IP
TCP/ IP TCP/ IP
TCP/ IP
 
message communication protocols in IoT
message communication protocols in IoTmessage communication protocols in IoT
message communication protocols in IoT
 
E mail protocols
E mail protocolsE mail protocols
E mail protocols
 
IGMP
IGMPIGMP
IGMP
 
SMS
SMSSMS
SMS
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
Tcp/ip model
Tcp/ip  modelTcp/ip  model
Tcp/ip model
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Imap server
Imap server Imap server
Imap server
 
Application layer in network system
Application layer in network systemApplication layer in network system
Application layer in network system
 
TCP - IP Presentation
TCP - IP PresentationTCP - IP Presentation
TCP - IP Presentation
 
Tcp
TcpTcp
Tcp
 

Similaire à Smtp, pop3, imapv 4

Pop (post office protocol)e mail (electronic mail)
Pop (post office protocol)e mail (electronic mail)Pop (post office protocol)e mail (electronic mail)
Pop (post office protocol)e mail (electronic mail)MDSHABBIR12
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptxYouTubeCONTRA
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mailtumetr1
 
window server 2008 mail configuration
window server 2008 mail configurationwindow server 2008 mail configuration
window server 2008 mail configurationanwarkade1
 
CFIMAP & CFPOP
CFIMAP & CFPOPCFIMAP & CFPOP
CFIMAP & CFPOPisummation
 
Introduction to basics command in linux, and working in linux
Introduction to basics command in linux, and working in linuxIntroduction to basics command in linux, and working in linux
Introduction to basics command in linux, and working in linuxGracia Marcom
 
Electronic mail protocols and operations
 Electronic mail protocols and operations Electronic mail protocols and operations
Electronic mail protocols and operationsVivekRajawat9
 
Powerpoint Preentation
Powerpoint PreentationPowerpoint Preentation
Powerpoint Preentationsubhamanu1990
 
Application layer
Application layerApplication layer
Application layerAnithaRaj31
 
Final year project report on Internet And Interanet Emailing server
Final year project report on Internet And Interanet Emailing serverFinal year project report on Internet And Interanet Emailing server
Final year project report on Internet And Interanet Emailing serversachin993
 

Similaire à Smtp, pop3, imapv 4 (20)

Smtp
SmtpSmtp
Smtp
 
Mail server
Mail serverMail server
Mail server
 
Mail server
Mail serverMail server
Mail server
 
Pop (post office protocol)e mail (electronic mail)
Pop (post office protocol)e mail (electronic mail)Pop (post office protocol)e mail (electronic mail)
Pop (post office protocol)e mail (electronic mail)
 
Electronic Mail.ppt
Electronic Mail.pptElectronic Mail.ppt
Electronic Mail.ppt
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
 
how email works
how email workshow email works
how email works
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mail
 
window server 2008 mail configuration
window server 2008 mail configurationwindow server 2008 mail configuration
window server 2008 mail configuration
 
CFIMAP & CFPOP
CFIMAP & CFPOPCFIMAP & CFPOP
CFIMAP & CFPOP
 
Spam Filter
Spam FilterSpam Filter
Spam Filter
 
Introduction to basics command in linux, and working in linux
Introduction to basics command in linux, and working in linuxIntroduction to basics command in linux, and working in linux
Introduction to basics command in linux, and working in linux
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Email
EmailEmail
Email
 
Electronic mail protocols and operations
 Electronic mail protocols and operations Electronic mail protocols and operations
Electronic mail protocols and operations
 
Powerpoint Preentation
Powerpoint PreentationPowerpoint Preentation
Powerpoint Preentation
 
Application layer
Application layerApplication layer
Application layer
 
Final year project report on Internet And Interanet Emailing server
Final year project report on Internet And Interanet Emailing serverFinal year project report on Internet And Interanet Emailing server
Final year project report on Internet And Interanet Emailing server
 

Plus de Shwetanshu Gupta

project report on FITNESS HUB
project report on FITNESS HUBproject report on FITNESS HUB
project report on FITNESS HUBShwetanshu Gupta
 
Sales training: program, execution and evaluation
Sales training: program, execution and evaluationSales training: program, execution and evaluation
Sales training: program, execution and evaluationShwetanshu Gupta
 
Legal & ethical issues in retailing
Legal & ethical issues in retailingLegal & ethical issues in retailing
Legal & ethical issues in retailingShwetanshu Gupta
 
basic Anchoring script for buiness quiz competition
basic Anchoring script for buiness quiz competitionbasic Anchoring script for buiness quiz competition
basic Anchoring script for buiness quiz competitionShwetanshu Gupta
 
barriers and use case study of mobile internet for the age group above 40-- A...
barriers and use case study of mobile internet for the age group above 40-- A...barriers and use case study of mobile internet for the age group above 40-- A...
barriers and use case study of mobile internet for the age group above 40-- A...Shwetanshu Gupta
 
barriers and use case study for mobile internet for the age group above 40- A...
barriers and use case study for mobile internet for the age group above 40- A...barriers and use case study for mobile internet for the age group above 40- A...
barriers and use case study for mobile internet for the age group above 40- A...Shwetanshu Gupta
 
Adaptibility: the new competitive advantage
Adaptibility: the new competitive advantageAdaptibility: the new competitive advantage
Adaptibility: the new competitive advantageShwetanshu Gupta
 
Supply and demand management in services
Supply and demand management in servicesSupply and demand management in services
Supply and demand management in servicesShwetanshu Gupta
 
M naraSIMHAM COMMITEE ON FINANCIAL AND BANKING SECTOR REFORM pdf
M naraSIMHAM COMMITEE ON FINANCIAL AND BANKING SECTOR REFORM pdfM naraSIMHAM COMMITEE ON FINANCIAL AND BANKING SECTOR REFORM pdf
M naraSIMHAM COMMITEE ON FINANCIAL AND BANKING SECTOR REFORM pdfShwetanshu Gupta
 
M Narasinhan committee on banking sector reforms
M Narasinhan committee on banking sector reformsM Narasinhan committee on banking sector reforms
M Narasinhan committee on banking sector reformsShwetanshu Gupta
 
management information system in elections
management information system in electionsmanagement information system in elections
management information system in electionsShwetanshu Gupta
 

Plus de Shwetanshu Gupta (20)

project report on FITNESS HUB
project report on FITNESS HUBproject report on FITNESS HUB
project report on FITNESS HUB
 
Sales training: program, execution and evaluation
Sales training: program, execution and evaluationSales training: program, execution and evaluation
Sales training: program, execution and evaluation
 
Films , music and sports
Films , music and sportsFilms , music and sports
Films , music and sports
 
Brand and brand equity
Brand and brand equityBrand and brand equity
Brand and brand equity
 
Introduction to law
Introduction to lawIntroduction to law
Introduction to law
 
Trade pattern
Trade patternTrade pattern
Trade pattern
 
Legal & ethical issues in retailing
Legal & ethical issues in retailingLegal & ethical issues in retailing
Legal & ethical issues in retailing
 
Crm technology
Crm technologyCrm technology
Crm technology
 
basic Anchoring script for buiness quiz competition
basic Anchoring script for buiness quiz competitionbasic Anchoring script for buiness quiz competition
basic Anchoring script for buiness quiz competition
 
Just in time concept
Just in time conceptJust in time concept
Just in time concept
 
barriers and use case study of mobile internet for the age group above 40-- A...
barriers and use case study of mobile internet for the age group above 40-- A...barriers and use case study of mobile internet for the age group above 40-- A...
barriers and use case study of mobile internet for the age group above 40-- A...
 
barriers and use case study for mobile internet for the age group above 40- A...
barriers and use case study for mobile internet for the age group above 40- A...barriers and use case study for mobile internet for the age group above 40- A...
barriers and use case study for mobile internet for the age group above 40- A...
 
Adaptibility: the new competitive advantage
Adaptibility: the new competitive advantageAdaptibility: the new competitive advantage
Adaptibility: the new competitive advantage
 
STP STRATEGIES
STP STRATEGIESSTP STRATEGIES
STP STRATEGIES
 
Supply and demand management in services
Supply and demand management in servicesSupply and demand management in services
Supply and demand management in services
 
M naraSIMHAM COMMITEE ON FINANCIAL AND BANKING SECTOR REFORM pdf
M naraSIMHAM COMMITEE ON FINANCIAL AND BANKING SECTOR REFORM pdfM naraSIMHAM COMMITEE ON FINANCIAL AND BANKING SECTOR REFORM pdf
M naraSIMHAM COMMITEE ON FINANCIAL AND BANKING SECTOR REFORM pdf
 
M Narasinhan committee on banking sector reforms
M Narasinhan committee on banking sector reformsM Narasinhan committee on banking sector reforms
M Narasinhan committee on banking sector reforms
 
Financial services
Financial servicesFinancial services
Financial services
 
management information system in elections
management information system in electionsmanagement information system in elections
management information system in elections
 
Final research
Final researchFinal research
Final research
 

Dernier

Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 

Dernier (20)

Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 

Smtp, pop3, imapv 4

  • 2. E- mail ? One of the most important services of internet is electronic- mail. Electronic mail, commonly referred to as e- mail since 1993, is a method of exchanging digital messages from a user to one or more recipients. Some early email systems required both the users to be online at the same time.
  • 3. Cont’d Today's email systems are based on a store- and-forward model. Requires an account on a mail server and supporting software on your PC The username and password will allow you to access your account All e-mail programs allow you to Send, Compose, Reply, and Forward mail
  • 4. E-mail format An Internet email message consists of three components: Envelope, Header and Body.
  • 5. Architecture User Agent -Software program that composes, reads, replies to, and forwards messages. It also handles mailboxes. Message Transfer Agent - The actual mail transfer is done through message transfer agents. SMTP is an example of an MTA. Message Access Agent - The software that pulls messages out of a mailbox.
  • 6. SCENARIORS IN E-MAIL When the sender and the receiver of an e-mail are on the same mail server, we need only two user agents.
  • 7. When the sender and the receiver of an e-mail are on different mail servers, we need two UAs and a pair of MTAs (client and server).
  • 8. When the sender is connected to the mail server via a LAN or a WAN, we need two UAs and two pairs of MTAs (client and server).
  • 9. When both sender and receiver are connected to the mail server via a LAN or a WAN, we need two UAs, two pairs of MTAs (client and server), and a pair of MAAs (client and server). This is the most common situation today.
  • 10. SMTP, POP 3, IMAPV4 For exchanging of e- mail, protocols are required. These are:
  • 11. SMTP SMTP is short for Simple Mail Transfer Protocol. It is a standard for sending electronic mail over internet and part of the TCP/IP protocol suite. SMTP defines the message format and the message transfer agent (MTA), which stores and forwards the mail. SMTP is a relatively simple, text-based protocol, where one or more recipients of a message are specified and then the message text is transferred. The direction of the bulk data (messages) is from the client to the server.
  • 13. Commands and Responses Commands are sent from client to server; responses vice versa. Keywords; argument(s) Commands format
  • 14. Commands 14 different commands. First 5 are required by all institutions. Next 3 are often used, but highly recommended .
  • 16. LIMITATIONS OF SMTP: Security matters for SMTP are worse. Its usefulness is limited by its simplicity. Transmission of binary files using SMTP is not possible without converting into text files. Use MIME to send mail in other format. It is limited to 7-bit ASCII characters only. SMTP servers may reject mail messages beyond some specific length.
  • 17. POP3 AND IMAPV4 The first and the second stages of mail delivery use SMTP. However, SMTP is not involved in the third stage because SMTP is a push protocol; it pushes the message from the client to the server. In other words, the direction of the bulk data (messages) is from the client to the server. On the other hand, the third stage needs a pull protocol; the client must pull messages from the server. The direction of the bulk data are from the server to the client. The third stage uses a message access agent.
  • 18. There are 3 stages in Mail Delivery: The first and the second stages of mail delivery use SMTP( push messages) The third stage of mail delivery use POP3 or IMAP4(pull messages) Stages of Mail Delivery
  • 19. POP3 is simple and limited in functionality. Need POP3 client on user machine and POP3 server on the mail server machine. It is a pull protocol; the client must pull messages from the server. The direction of the bulk data are from the server to the client. It is a message access agent. Pop 3
  • 20. POP 3 Pop3 has two modes: keep mode and delete mode In delete mode mail is deleted from mailbox after each retrieval. In keep mode, mail remains in mailbox after each retrieval.
  • 21. Advantages: Simple protocol Easier to implement Copies all messages when connection is made. Disadvantages: Don’t allow user to organize mails on server. Don’t allow user to partially check the contents of mail before downloading.
  • 22. IMAPV4 As its name implies, IMAP allows us to access email messages wherever we are . Basically, email messages are stored on servers. Whenever we heck inbox, our email client contacts the server to connect with messages. When we read an email message using IMAP, we aren't actually downloading or storing it on computer; instead, we are reading it off of the server. As a result, it's possible to email from several different devices without missing a thing.
  • 23. It as an intermediary between email client and email server. When you sign into an email client like Microsoft Outlook, it contacts the email server using IMAP. The headers of all of your email messages are then displayed. If you choose to read a message, it is quickly downloaded so that you can see it - emails are not downloaded unless you need to open them.
  • 24. POP works by contacting email server and downloading all new messages from it. Once they are downloaded, they disappear from the server. If we decide to check email from a different device, the messages that have been downloaded previously will not be available. POP works fine for those who generally only check their email messages from a single device; those who travel or need to access their email from various devices are much better off with IMAP-based email
  • 25. Unlike POP, IMAP allows us to access, organize, read and sort email messages without having to download them first. As a result, IMAP is very fast and efficient. The server also keeps a record of all of the messages that we send, allowing us to access sent messages from anywhere. IMAP does not move messages from the server to computer; instead, it synchronizes the email that's on computer with the email that's on the server. POP3 VS IMAPV4
  • 26. Advantages of imapv4 A user can check the email header prior to downloading A user can search the contents of the email for a specific string of characters prior to downloading A user can partially download email (helpful if email contains huge attachments and connection is slow) A user can create, delete, or rename mailboxes on the mail server A user can create a hierarchy of mailboxes in a folder for email storage
  • 27. It allows us to access email messages from anywhere, and from many different devices as we want. It only downloads a message when we click on it. As a result, you do not have to wait for all of your new messages to download from the server before you can read them. Attachments are not automatically downloaded with IMAP. As a result, you're able to check your messages a lot more quickly and have greater control over which attachments are opened. Finally, IMAP can be used offline just like POP - you can basically enjoy the benefits of both protocols in one.
  • 28. CONCLUSION As the world becomes more mobile than ever, IMAP is becoming more and more popular. The proliferation of smartphones, laptops, tablets and other devices is making the demand for IMAP stronger than ever. While POP will remain popular with people who only access their email via one or two devices - and those who have slow connections to the Internet - IMAP is sure to remain the protocol of choice for most of today's busy people.