SlideShare une entreprise Scribd logo
1  sur  10
How E-Mail
Works
By :
Taqi Shah
Taqi.shajee@gmail.com
How E-Mail Works
• Email is based around the use of electronic
mailboxes.
• When an email is sent, the message is routed
from server to server, all the way to the
recipient's email server.
Mail Transfer Agent (MTA)
• The message is sent to the mail server tasked with
transporting emails (called the MTA, for Mail
Transport Agent) to the recipient's MTA.
• On the Internet, MTAs communicate with one
another using the protocol SMTP, and so are
logically called SMTP servers (or
sometimes outgoing mail servers).
• The recipient's MTA then delivers the email to the
incoming mail server (called the MDA, for Mail
Delivery Agent), which stores the email as it waits
for the user to accept it.
POP3, IMAP
There are two main protocols used for retrieving
email on an MDA:
• POP3 (Post Office Protocol), the older of the
two, which is used for retrieving email and, in
certain cases, leaving a copy of it on the server.
• IMAP (Internet Message Access Protocol), which is
used for coordinating the status of emails
(read, deleted, moved) across multiple email
clients. With IMAP, a copy of every message is
saved on the server, so that this synchronization
task can be completed.
POP3, IMAP
• For this reason, incoming mail servers are
called POP servers or IMAP servers, depending
on which protocol is used.
Difference Between MTAs & MDAs
• To use a real-world analogy, MTAs act as the post
office (the sorting area and mail carrier, which
handle message transportation), while
• MDAs act as mailboxes, which store messages
(as much as their volume will allow) until the
recipients check the box. This means that it is not
necessary for recipients to be connected in order
for them to be sent email.
E-Mail Security
• To keep everyone from checking other users'
emails, MDA is protected by a user name called
a login and by a password.
• Retrieving mail is done using a software program
called an MUA (Mail User Agent).
• When the MUA is a program installed on the user's
system, it is called an email client (such as Mozilla
Thunderbird, Microsoft Outlook, Eudora
Mail, Incredimail or Lotus Notes).
• When it is a web interface used for interacting with
the incoming mail server, it is called webmail.
Falsify One's Own Address When
Sending Mail
• Nearly all ISPs lock down their SMTP servers to that only
their subscribers can use them, or more precisely only
machines whose IP address belongs to the ISP's domain.
This explains why travelling users must modify the outgoing
server settings in their email clients each time they move to
a new home or business.
• When an organization's email server is improperly
configured and allows third-party users on any network to
send emails, this is called an open relay.
• Open relays are generally used by spammers, as using them
hides the true origins of their messages. As a result, many
ISPs keep an up-to-date blacklist of open relays, to keep
subscribers from receiving messages from such servers.
How e mail works

Contenu connexe

Tendances

WWW, Website & Webpage
WWW, Website & WebpageWWW, Website & Webpage
WWW, Website & WebpageZeeshan Alam
 
Electronic mail - Computer Networks
Electronic mail - Computer NetworksElectronic mail - Computer Networks
Electronic mail - Computer NetworksUmme Jamal
 
All about email
All about emailAll about email
All about emailestefana4
 
Webmail and Mail Clients
Webmail and Mail ClientsWebmail and Mail Clients
Webmail and Mail ClientsSomeone Else
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferSerious_SamSoul
 
Email ppt
Email pptEmail ppt
Email pptmelgade
 
creation of personal e-mail id
creation of personal e-mail idcreation of personal e-mail id
creation of personal e-mail idakhila prasanth
 
PPT-Internet growth, IP, Anatomy.pptx
PPT-Internet growth, IP, Anatomy.pptxPPT-Internet growth, IP, Anatomy.pptx
PPT-Internet growth, IP, Anatomy.pptxVijayaLakshmiPS3
 
Imap(internet massege access protocaols)
Imap(internet massege access protocaols)Imap(internet massege access protocaols)
Imap(internet massege access protocaols)shashikant pabari
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message SecurityNrapesh Shah
 

Tendances (20)

Email: Introduction
Email: IntroductionEmail: Introduction
Email: Introduction
 
Another one on Email...
Another one on Email...Another one on Email...
Another one on Email...
 
Email
EmailEmail
Email
 
WWW, Website & Webpage
WWW, Website & WebpageWWW, Website & Webpage
WWW, Website & Webpage
 
E-Mail Basics
E-Mail BasicsE-Mail Basics
E-Mail Basics
 
E mail protocols
E mail protocolsE mail protocols
E mail protocols
 
Electronic mail - Computer Networks
Electronic mail - Computer NetworksElectronic mail - Computer Networks
Electronic mail - Computer Networks
 
E mail flow
E mail flowE mail flow
E mail flow
 
SNMP/SMTP/MIME
SNMP/SMTP/MIMESNMP/SMTP/MIME
SNMP/SMTP/MIME
 
All about email
All about emailAll about email
All about email
 
POP3 Post Office Protocol
POP3 Post Office ProtocolPOP3 Post Office Protocol
POP3 Post Office Protocol
 
Webmail and Mail Clients
Webmail and Mail ClientsWebmail and Mail Clients
Webmail and Mail Clients
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transfer
 
Email ppt
Email pptEmail ppt
Email ppt
 
Basics of E-Mail
Basics of E-MailBasics of E-Mail
Basics of E-Mail
 
Mime
MimeMime
Mime
 
creation of personal e-mail id
creation of personal e-mail idcreation of personal e-mail id
creation of personal e-mail id
 
PPT-Internet growth, IP, Anatomy.pptx
PPT-Internet growth, IP, Anatomy.pptxPPT-Internet growth, IP, Anatomy.pptx
PPT-Internet growth, IP, Anatomy.pptx
 
Imap(internet massege access protocaols)
Imap(internet massege access protocaols)Imap(internet massege access protocaols)
Imap(internet massege access protocaols)
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message Security
 

Similaire à How e mail works

Similaire à How e mail works (20)

Ch22 system administration
Ch22 system administration Ch22 system administration
Ch22 system administration
 
How Email Works
How Email WorksHow Email Works
How Email Works
 
window server 2008 mail configuration
window server 2008 mail configurationwindow server 2008 mail configuration
window server 2008 mail configuration
 
E mail forensics
E mail forensicsE mail forensics
E mail forensics
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Smtp, pop3, imapv 4
Smtp, pop3, imapv 4Smtp, pop3, imapv 4
Smtp, pop3, imapv 4
 
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLSMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
 
Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp) Simple mail transfer protocol (smtp)
Simple mail transfer protocol (smtp)
 
Email
EmailEmail
Email
 
Internet mail server
Internet mail server Internet mail server
Internet mail server
 
12 - E-Mail.ppt
12 - E-Mail.ppt12 - E-Mail.ppt
12 - E-Mail.ppt
 
12 - E-Mail.ppt
12 - E-Mail.ppt12 - E-Mail.ppt
12 - E-Mail.ppt
 
Pop (post office protocol)e mail (electronic mail)
Pop (post office protocol)e mail (electronic mail)Pop (post office protocol)e mail (electronic mail)
Pop (post office protocol)e mail (electronic mail)
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
 
Smtp
SmtpSmtp
Smtp
 
Email working
Email workingEmail working
Email working
 
Introduction to basics command in linux, and working in linux
Introduction to basics command in linux, and working in linuxIntroduction to basics command in linux, and working in linux
Introduction to basics command in linux, and working in linux
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mail
 
Mail server
Mail serverMail server
Mail server
 
Mail server
Mail serverMail server
Mail server
 

Plus de Muhammad Taqi

How speech reorganization works
How speech reorganization worksHow speech reorganization works
How speech reorganization worksMuhammad Taqi
 
Software Cost and Effort Esitmation
Software Cost and Effort EsitmationSoftware Cost and Effort Esitmation
Software Cost and Effort EsitmationMuhammad Taqi
 
Variable eliminatin example
Variable eliminatin exampleVariable eliminatin example
Variable eliminatin exampleMuhammad Taqi
 
D sepration examples
D sepration examplesD sepration examples
D sepration examplesMuhammad Taqi
 
Adobe illustrator cs5 full tutorials
Adobe illustrator cs5  full tutorialsAdobe illustrator cs5  full tutorials
Adobe illustrator cs5 full tutorialsMuhammad Taqi
 

Plus de Muhammad Taqi (7)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
How speech reorganization works
How speech reorganization worksHow speech reorganization works
How speech reorganization works
 
How proxy works
How proxy worksHow proxy works
How proxy works
 
Software Cost and Effort Esitmation
Software Cost and Effort EsitmationSoftware Cost and Effort Esitmation
Software Cost and Effort Esitmation
 
Variable eliminatin example
Variable eliminatin exampleVariable eliminatin example
Variable eliminatin example
 
D sepration examples
D sepration examplesD sepration examples
D sepration examples
 
Adobe illustrator cs5 full tutorials
Adobe illustrator cs5  full tutorialsAdobe illustrator cs5  full tutorials
Adobe illustrator cs5 full tutorials
 

Dernier

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Dernier (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

How e mail works

  • 1. How E-Mail Works By : Taqi Shah Taqi.shajee@gmail.com
  • 2. How E-Mail Works • Email is based around the use of electronic mailboxes. • When an email is sent, the message is routed from server to server, all the way to the recipient's email server.
  • 3. Mail Transfer Agent (MTA) • The message is sent to the mail server tasked with transporting emails (called the MTA, for Mail Transport Agent) to the recipient's MTA. • On the Internet, MTAs communicate with one another using the protocol SMTP, and so are logically called SMTP servers (or sometimes outgoing mail servers). • The recipient's MTA then delivers the email to the incoming mail server (called the MDA, for Mail Delivery Agent), which stores the email as it waits for the user to accept it.
  • 4.
  • 5. POP3, IMAP There are two main protocols used for retrieving email on an MDA: • POP3 (Post Office Protocol), the older of the two, which is used for retrieving email and, in certain cases, leaving a copy of it on the server. • IMAP (Internet Message Access Protocol), which is used for coordinating the status of emails (read, deleted, moved) across multiple email clients. With IMAP, a copy of every message is saved on the server, so that this synchronization task can be completed.
  • 6. POP3, IMAP • For this reason, incoming mail servers are called POP servers or IMAP servers, depending on which protocol is used.
  • 7. Difference Between MTAs & MDAs • To use a real-world analogy, MTAs act as the post office (the sorting area and mail carrier, which handle message transportation), while • MDAs act as mailboxes, which store messages (as much as their volume will allow) until the recipients check the box. This means that it is not necessary for recipients to be connected in order for them to be sent email.
  • 8. E-Mail Security • To keep everyone from checking other users' emails, MDA is protected by a user name called a login and by a password. • Retrieving mail is done using a software program called an MUA (Mail User Agent). • When the MUA is a program installed on the user's system, it is called an email client (such as Mozilla Thunderbird, Microsoft Outlook, Eudora Mail, Incredimail or Lotus Notes). • When it is a web interface used for interacting with the incoming mail server, it is called webmail.
  • 9. Falsify One's Own Address When Sending Mail • Nearly all ISPs lock down their SMTP servers to that only their subscribers can use them, or more precisely only machines whose IP address belongs to the ISP's domain. This explains why travelling users must modify the outgoing server settings in their email clients each time they move to a new home or business. • When an organization's email server is improperly configured and allows third-party users on any network to send emails, this is called an open relay. • Open relays are generally used by spammers, as using them hides the true origins of their messages. As a result, many ISPs keep an up-to-date blacklist of open relays, to keep subscribers from receiving messages from such servers.