SlideShare une entreprise Scribd logo
1  sur  24
Electronic Mail
Forwarding messages : forward the received message to third party with 
or without extra information 
Handling mailboxes : user agent create and maintain two mailboxes 
inbox and outbox. 
User agents are of 2 types 
Command based : mail, pine and elm 
GUI : netscape, outlook, eudora etc.
The main limitation of Email is that it can send messages only in 7 bit ASCII 
format. Therefore it can not be used for languages that are not supported by 7 
bit ASCII characters ( French, german, Russian, Chinese etc.) 
The another limitation is that it can not be used to send binary files or video 
or audio data. 
MIME ( Multipurpose Internet Mail Extensions ) is a supplementary protocol 
that allows non ASCII data to be sent through email. 
The MIME transform non ASCII data at the sender side to ASCII data and at 
the receiving side it is transformed back to the original data.
MIME Header
Data Types in MIME
Content-Transfer-Encoding
Mail Transfer Agent (MTA): SMTP 
• The actual mail transfer is done through MTA
Commands are sent from the client to the server. The format of a command is 
shown in Figure 26.18. It consists of a keyword followed by zero or more 
arguments. 
SMTP defines 14 commands. The first five are mandatory; every implementation 
must support these five commands. The next three are often used and highly 
recommended. The last six are seldom used. 
Commands 
HELO Sender's host name 
MAIL FROM Sender of the message 
RCPTTO Intended recipient of the message 
DATA Body of the mail 
QUIT 
RSET 
VRFY Name of recipient to be verified 
NOOP 
TURN 
EXPN Mailing list to be expanded 
HELP Command name 
SEND FROM Intended recipient of the message 
SMOLFROM Intended recipient of the message 
SMALFROM Intended recipient of the message
Responses are sent from the server to the client. A response is a three digit code 
that may be followed by additional textual information. 
As the table shows, responses are divided into four categories. The leftmost digit of 
the code (2, 3, 4, and 5) defines the category.
Code Description 
Positive Completion Reply 
211 System status or help reply 
214 Help message 
220 Service ready 
221 Service closing transmission channel 
250 Request command completed 
251 User not local; the message will be forwarded 
Positive Intermediate Reply 
354 Start mail input 
Transient Negative Completion Reply 
421 Service not available 
450 Mailbox not available 
451 Command aborted: local error 
452 Command aborted: insufficient storage 
Permanent Negative Completion Reply 
500 Syntax error; unrecognized command 
501 Syntax error in parameters or arguments 
502 Command not implemented 
503 Bad sequence of commands 
504 Command temporarily not implemented 
550 Command is not executed; mailbox unavailable 
551 User not local 
552 Requested action aborted; exceeded storage location 
553 Requested action not taken; mailbox name not allowed
POP3 is deficient in several ways. It does not allow the user to organize her mail on the 
server; the user cannot have different folders on the server. (Of course, the user can 
create folders on her own computer.) In addition, POP3 does not allow the user to 
partially check the contents of the mail before downloading. 
Internet Mail Access Protocol, version 4 (IMAP4) 
IMAP4 is similar to POP3, but has more features with extra 
functions 
•A user can check the email header prior to downloading 
•A user can search the contents of the email for a specific 
string of characters prior to downloading 
•A user can create, delete, or rename mailboxes on the mail 
server 
•A user can create a hierarchy of mailboxes in a folder for 
email storage
POP3 and IMAP4
Electronic Mail (1,2) 
• When the sender and the receiver of an e-mail are on the same system, we need 
only two user agents. 
• When the sender and the receiver of an e-mail are on different systems, we need 
two UAs and a pair of MTAs (client and server).
Electronic Mail (3) 
• When the sender is connected to the mail server via a LAN or a WAN, we need two 
UAs and two pairs of MTAs (client and server).
Electronic Mail (4) 
• When both sender and receiver are connected to the mail server via a LAN or a 
WAN, we need two UAs, two pairs of MTAs and a pair of MAAs. This is the most 
common situation today.

Contenu connexe

Tendances (20)

E mail protocol - SMTP
E mail protocol - SMTPE mail protocol - SMTP
E mail protocol - SMTP
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Electronic Mail
Electronic MailElectronic Mail
Electronic Mail
 
transfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imaptransfer protocols,ftp,smtp,pop,imap
transfer protocols,ftp,smtp,pop,imap
 
SNMP/SMTP/MIME
SNMP/SMTP/MIMESNMP/SMTP/MIME
SNMP/SMTP/MIME
 
Mail server
Mail serverMail server
Mail server
 
Smtp protocol
Smtp protocolSmtp protocol
Smtp protocol
 
Internet mail server
Internet mail server Internet mail server
Internet mail server
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLSMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocols
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Mail server
Mail serverMail server
Mail server
 
Imap(internet massege access protocaols)
Imap(internet massege access protocaols)Imap(internet massege access protocaols)
Imap(internet massege access protocaols)
 
Mail server
Mail serverMail server
Mail server
 
SMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer ProtocolSMTP Simple Mail Transfer Protocol
SMTP Simple Mail Transfer Protocol
 
Email server system1.ppt
Email server system1.pptEmail server system1.ppt
Email server system1.ppt
 
Smtp
SmtpSmtp
Smtp
 

En vedette

Vivaldi Autum
Vivaldi AutumVivaldi Autum
Vivaldi AutumHOME
 
考試院
考試院考試院
考試院family
 
防癌兩味藥
防癌兩味藥防癌兩味藥
防癌兩味藥foonkok
 
MessagingMo Ltd Solutions for Exchange Server 2007 Unified Messaging
MessagingMo Ltd Solutions  for Exchange Server 2007 Unified MessagingMessagingMo Ltd Solutions  for Exchange Server 2007 Unified Messaging
MessagingMo Ltd Solutions for Exchange Server 2007 Unified MessagingMo Lucas
 
2013年行事曆
2013年行事曆2013年行事曆
2013年行事曆family
 
Words of wisdom2
Words of wisdom2Words of wisdom2
Words of wisdom2foonkok
 
1er Ignite Valencia Cosas que aprendí jugando a wargames
1er Ignite Valencia Cosas que aprendí jugando a wargames1er Ignite Valencia Cosas que aprendí jugando a wargames
1er Ignite Valencia Cosas que aprendí jugando a wargamesPedro-Juan Ferrer Matoses
 
Pollinator-mediated floral evolution and speciation in southern African Irida...
Pollinator-mediated floral evolution and speciation in southern African Irida...Pollinator-mediated floral evolution and speciation in southern African Irida...
Pollinator-mediated floral evolution and speciation in southern African Irida...University of Adelaide
 

En vedette (9)

Vivaldi Autum
Vivaldi AutumVivaldi Autum
Vivaldi Autum
 
考試院
考試院考試院
考試院
 
What’S On This Week
What’S On This WeekWhat’S On This Week
What’S On This Week
 
防癌兩味藥
防癌兩味藥防癌兩味藥
防癌兩味藥
 
MessagingMo Ltd Solutions for Exchange Server 2007 Unified Messaging
MessagingMo Ltd Solutions  for Exchange Server 2007 Unified MessagingMessagingMo Ltd Solutions  for Exchange Server 2007 Unified Messaging
MessagingMo Ltd Solutions for Exchange Server 2007 Unified Messaging
 
2013年行事曆
2013年行事曆2013年行事曆
2013年行事曆
 
Words of wisdom2
Words of wisdom2Words of wisdom2
Words of wisdom2
 
1er Ignite Valencia Cosas que aprendí jugando a wargames
1er Ignite Valencia Cosas que aprendí jugando a wargames1er Ignite Valencia Cosas que aprendí jugando a wargames
1er Ignite Valencia Cosas que aprendí jugando a wargames
 
Pollinator-mediated floral evolution and speciation in southern African Irida...
Pollinator-mediated floral evolution and speciation in southern African Irida...Pollinator-mediated floral evolution and speciation in southern African Irida...
Pollinator-mediated floral evolution and speciation in southern African Irida...
 

Similaire à Email ftp

retrieving the mail
retrieving the mailretrieving the mail
retrieving the mailtumetr1
 
window server 2008 mail configuration
window server 2008 mail configurationwindow server 2008 mail configuration
window server 2008 mail configurationanwarkade1
 
Internet technology unit 6
Internet technology unit 6Internet technology unit 6
Internet technology unit 6WE-IT TUTORIALS
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferSerious_SamSoul
 
E-Mail - Technical Overview
E-Mail - Technical OverviewE-Mail - Technical Overview
E-Mail - Technical OverviewVenkatesh Iyer
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocolAnagha Ghotkar
 
Application layer
Application layerApplication layer
Application layerAnithaRaj31
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applicationsOnline
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptxYouTubeCONTRA
 
Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit vJAIGANESH SEKAR
 
Working of Email_services
Working of Email_services Working of Email_services
Working of Email_services Sabin dumre
 
Electronic mail protocols and operations
 Electronic mail protocols and operations Electronic mail protocols and operations
Electronic mail protocols and operationsVivekRajawat9
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITDeepraj Bhujel
 
E-Mail Header- A Forensic Key to Examine an E-Mail
E-Mail Header- A Forensic Key to Examine an E-MailE-Mail Header- A Forensic Key to Examine an E-Mail
E-Mail Header- A Forensic Key to Examine an E-MailIRJET Journal
 

Similaire à Email ftp (20)

retrieving the mail
retrieving the mailretrieving the mail
retrieving the mail
 
Electronic Mail.ppt
Electronic Mail.pptElectronic Mail.ppt
Electronic Mail.ppt
 
window server 2008 mail configuration
window server 2008 mail configurationwindow server 2008 mail configuration
window server 2008 mail configuration
 
Internet technology unit 6
Internet technology unit 6Internet technology unit 6
Internet technology unit 6
 
Mail server
Mail serverMail server
Mail server
 
Lecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transferLecture 9 electronic_mail_representation_and_transfer
Lecture 9 electronic_mail_representation_and_transfer
 
E-Mail - Technical Overview
E-Mail - Technical OverviewE-Mail - Technical Overview
E-Mail - Technical Overview
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
 
Smtp, pop3, imapv 4
Smtp, pop3, imapv 4Smtp, pop3, imapv 4
Smtp, pop3, imapv 4
 
Application layer
Application layerApplication layer
Application layer
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
 
Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit v
 
Working of Email_services
Working of Email_services Working of Email_services
Working of Email_services
 
how email works
how email workshow email works
how email works
 
Electronic mail protocols and operations
 Electronic mail protocols and operations Electronic mail protocols and operations
Electronic mail protocols and operations
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - IT
 
Email
EmailEmail
Email
 
SMTP(true)
SMTP(true)SMTP(true)
SMTP(true)
 
E-Mail Header- A Forensic Key to Examine an E-Mail
E-Mail Header- A Forensic Key to Examine an E-MailE-Mail Header- A Forensic Key to Examine an E-Mail
E-Mail Header- A Forensic Key to Examine an E-Mail
 

Plus de Nitesh Singh

Risk taking and emotions
Risk taking and emotionsRisk taking and emotions
Risk taking and emotionsNitesh Singh
 
Project report RAILWAY TICKET RESERVATION SYSTEM SAD
Project report RAILWAY TICKET RESERVATION SYSTEM SADProject report RAILWAY TICKET RESERVATION SYSTEM SAD
Project report RAILWAY TICKET RESERVATION SYSTEM SADNitesh Singh
 
The real comedy behind comedy
The real comedy behind comedyThe real comedy behind comedy
The real comedy behind comedyNitesh Singh
 
Project report Rs Dry celaners
Project report Rs Dry celaners Project report Rs Dry celaners
Project report Rs Dry celaners Nitesh Singh
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layerNitesh Singh
 
Ta 104-topology (1)
Ta 104-topology (1)Ta 104-topology (1)
Ta 104-topology (1)Nitesh Singh
 

Plus de Nitesh Singh (20)

Risk taking and emotions
Risk taking and emotionsRisk taking and emotions
Risk taking and emotions
 
Project report RAILWAY TICKET RESERVATION SYSTEM SAD
Project report RAILWAY TICKET RESERVATION SYSTEM SADProject report RAILWAY TICKET RESERVATION SYSTEM SAD
Project report RAILWAY TICKET RESERVATION SYSTEM SAD
 
The real comedy behind comedy
The real comedy behind comedyThe real comedy behind comedy
The real comedy behind comedy
 
Project report Rs Dry celaners
Project report Rs Dry celaners Project report Rs Dry celaners
Project report Rs Dry celaners
 
BIG DATA ANALYSIS
BIG DATA ANALYSISBIG DATA ANALYSIS
BIG DATA ANALYSIS
 
Udp vs-tcp
Udp vs-tcpUdp vs-tcp
Udp vs-tcp
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
Routers vs-switch
Routers vs-switchRouters vs-switch
Routers vs-switch
 
New udp
New udpNew udp
New udp
 
I pv4 format
I pv4 formatI pv4 format
I pv4 format
 
I pv4 addressing
I pv4 addressingI pv4 addressing
I pv4 addressing
 
Hub vs-switch
Hub vs-switchHub vs-switch
Hub vs-switch
 
Ftp
FtpFtp
Ftp
 
Www and http
Www and httpWww and http
Www and http
 
Transmission main
Transmission mainTransmission main
Transmission main
 
Ta 104-topology
Ta 104-topologyTa 104-topology
Ta 104-topology
 
Ta 104-topology (1)
Ta 104-topology (1)Ta 104-topology (1)
Ta 104-topology (1)
 
Ta 104-tcp
Ta 104-tcpTa 104-tcp
Ta 104-tcp
 
Ta 104-media-3
Ta 104-media-3Ta 104-media-3
Ta 104-media-3
 
Ta 104-media-2
Ta 104-media-2Ta 104-media-2
Ta 104-media-2
 

Email ftp

  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Forwarding messages : forward the received message to third party with or without extra information Handling mailboxes : user agent create and maintain two mailboxes inbox and outbox. User agents are of 2 types Command based : mail, pine and elm GUI : netscape, outlook, eudora etc.
  • 8. The main limitation of Email is that it can send messages only in 7 bit ASCII format. Therefore it can not be used for languages that are not supported by 7 bit ASCII characters ( French, german, Russian, Chinese etc.) The another limitation is that it can not be used to send binary files or video or audio data. MIME ( Multipurpose Internet Mail Extensions ) is a supplementary protocol that allows non ASCII data to be sent through email. The MIME transform non ASCII data at the sender side to ASCII data and at the receiving side it is transformed back to the original data.
  • 9.
  • 13.
  • 14. Mail Transfer Agent (MTA): SMTP • The actual mail transfer is done through MTA
  • 15. Commands are sent from the client to the server. The format of a command is shown in Figure 26.18. It consists of a keyword followed by zero or more arguments. SMTP defines 14 commands. The first five are mandatory; every implementation must support these five commands. The next three are often used and highly recommended. The last six are seldom used. Commands HELO Sender's host name MAIL FROM Sender of the message RCPTTO Intended recipient of the message DATA Body of the mail QUIT RSET VRFY Name of recipient to be verified NOOP TURN EXPN Mailing list to be expanded HELP Command name SEND FROM Intended recipient of the message SMOLFROM Intended recipient of the message SMALFROM Intended recipient of the message
  • 16. Responses are sent from the server to the client. A response is a three digit code that may be followed by additional textual information. As the table shows, responses are divided into four categories. The leftmost digit of the code (2, 3, 4, and 5) defines the category.
  • 17. Code Description Positive Completion Reply 211 System status or help reply 214 Help message 220 Service ready 221 Service closing transmission channel 250 Request command completed 251 User not local; the message will be forwarded Positive Intermediate Reply 354 Start mail input Transient Negative Completion Reply 421 Service not available 450 Mailbox not available 451 Command aborted: local error 452 Command aborted: insufficient storage Permanent Negative Completion Reply 500 Syntax error; unrecognized command 501 Syntax error in parameters or arguments 502 Command not implemented 503 Bad sequence of commands 504 Command temporarily not implemented 550 Command is not executed; mailbox unavailable 551 User not local 552 Requested action aborted; exceeded storage location 553 Requested action not taken; mailbox name not allowed
  • 18.
  • 19.
  • 20. POP3 is deficient in several ways. It does not allow the user to organize her mail on the server; the user cannot have different folders on the server. (Of course, the user can create folders on her own computer.) In addition, POP3 does not allow the user to partially check the contents of the mail before downloading. Internet Mail Access Protocol, version 4 (IMAP4) IMAP4 is similar to POP3, but has more features with extra functions •A user can check the email header prior to downloading •A user can search the contents of the email for a specific string of characters prior to downloading •A user can create, delete, or rename mailboxes on the mail server •A user can create a hierarchy of mailboxes in a folder for email storage
  • 22. Electronic Mail (1,2) • When the sender and the receiver of an e-mail are on the same system, we need only two user agents. • When the sender and the receiver of an e-mail are on different systems, we need two UAs and a pair of MTAs (client and server).
  • 23. Electronic Mail (3) • When the sender is connected to the mail server via a LAN or a WAN, we need two UAs and two pairs of MTAs (client and server).
  • 24. Electronic Mail (4) • When both sender and receiver are connected to the mail server via a LAN or a WAN, we need two UAs, two pairs of MTAs and a pair of MAAs. This is the most common situation today.