SlideShare una empresa de Scribd logo
1 de 22
Web Platform
Presented By
Priyanka Shinde (M - 3248)
What is a protocol after all?
 Protocol is a standard used to define a method of
exchanging data over a computer network such as local
area network, Internet, Intranet
 Protocols define how messages are sent and received, i.e.
the format and order of them, what happens when
messages are transmitted and received.
 Each protocol has its own method of how data is
formatted when sent and what to do with it once received,
how that data is compressed or how to check for errors in
data.
 The protocol can be implemented either in hardware or in
software.
Internet Protocol (IP)
It is a protocol by which data is sent from one
computer to another on the Internet.
Each computer (known as a host) on the Internet
has at least one IP address that uniquely
identifies it from all other computers on the
Internet.
When you send or receive data (for example, an
e-mail note or a Web page), the message gets
divided into little chunks called packets.
 Packets can arrive in a different order than the order they were
sent in. The Internet Protocol just delivers them. It's up to
another protocol, the Transmission Control Protocol (TCP) to
put them back in the right order.
 Each of these packets contains both the sender's Internet
address and the receiver's address
 Protocol version 4 (IPv4) standard that features IP addresses
four bytes (32 bits) in length.
 The newer Internet Protocol version 6 (IPv6) standard features
addresses 16 bytes (128 bits) in length.
Hypertext Transfer Protocol
(HTTP)
 HTTP is a set of standards that allow
users of the World Wide Web to
exchange information found on web
pages.
 The term HTTP was coined by Ted
Nelson
 HTTP commonly utilizes port 80, 8008,
or 8080
 When wanting to access any web page
enter http:// in front of the web
address, which tells the browser to
communicate over HTTP
Hypertext Transfer Protocol over
Secure (HTTPS)
 It is a secure method of accessing or sending information across
a web page.
 All data sent over HTTPS is encrypted before it is sent, this
prevents anyone from understanding that information if
intercepted.
 Because data is encrypted over HTTPS, it is slower than HTTP,
which is why HTTPS is only used when requiring login
information or with pages that contain sensitive information
such as an online bank web page.
 HTTPS uses port 443 to transfer its information.
 HTTPS is first used in HTTP/1.1
File Transfer Protocol (FTP)
File Transfer Protocol (FTP)
• Standard Internet protocol for transmitting files between
computers on the Internet.
• First proposed on April 16, 1971 by Abhay Bhushan
• Used to transfer Web page files from their creator to the
computer that acts as their server for everyone on the
Internet.
• It's also commonly used to download programs and other
files to your computer from other servers.
Contd…
• Your Web browser can also make FTP requests to
download programs you select from a Web page.
• Using FTP, you can also update (delete, rename,
move, and copy) files at a server.
• You need to logon to an FTP server.
• FTP is most commonly used to download a file
from a server using the Internet or to upload a file
to a server (e.g., uploading a Web page file to a
server).
Email Protocols
Interactions between email servers and
clients are governed by email protocols.
The most common email protocols are
POP - Post Office Protocol
IMAP - Internet Mail Access Protocol
SMTP - Simple Mail Transport Protocol
Post Office Protocol (POP3)
Most recent version of a standard protocol for
receiving e-mail.
Provides a simple, standardized way for users
to access mailboxes and download messages
to their computers.
When using the POP protocol all eMail
messages will be downloaded from the mail
server to your local computer
Most POP clients also provide an option to
leave copies of email on the server.
Advantage is that once messages are downloaded
you can cut the internet connection and read your
email at your leisure without incurring further
communication costs
protocol is built into most popular e-mail
products, such as Eudora and Outlook
Express.
It's also built into the Netscape and Microsoft
Internet Explorer browsers.
The conventional port number for POP3 is
110.
Internet Mail Access Protocol (IMAP)
 IMAP was developed at Stanford University in 1986
 Standard protocol for accessing e-mail from your local
server.
 The latest version, IMAP4, is similar to POP3 but
supports some additional features.
 For example, with IMAP4, you can search through
your e-mail messages for keywords while the
messages are still on mail server. You can then choose
which messages to download to your machine.
 Port - 143
Confused?????
Difference between POP3 & IMAP
IMAP POP3
It is a method of accessing
e-mail messages on a
server without having to
download them to your
local hard drive
POP3 requires users to
download messages to
their hard drive before
reading them
The advantage of using an IMAP mail server is that
users can check their mail from multiple computers
and always see the same messages.
This is because the messages stay on the server until
the user chooses to download them to his or her local
drive.
Simple Mail Transfer Protocol
(SMTP)
 SMTP was created in the early 1980's
 used by the Mail Transfer Agent (MTA) to deliver your eMail to the
recipient's mail server.
 only be used to send emails, not to receive them.
 This is why you need to specify both the POP or IMAP server and
the SMTP server when you configure your e-mail application.
 SMTP usually is implemented to operate over Internet port 25.
 An alternative to SMTP that is widely used in Europe is X.400.
 Many mail servers now support Extended Simple Mail Transfer
Protocol (ESMTP), which allows multimedia files to be delivered as
e-mail.
Multipurpose Internet Mail
Extensions (MIME)
Multipurpose Internet Mail
Extensions (MIME)
 MIME was defined in 1992 by the Internet Engineering Task
Force (IETF)
 Many e-mail clients now support MIME, which enables them to
send and receive graphics, audio, and video files via the
Internet mail system.
 There are many predefined MIME types, such as GIF graphics
files and PostScript files.
 In addition, MIME supports messages in character sets other
than ASCII.
 A new version, called S/MIME, supports encrypted messages.
Information on protocols-email protocols

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Internet
InternetInternet
Internet
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission Media
 
How the Internet Works
How the Internet WorksHow the Internet Works
How the Internet Works
 
Data communication & networks
Data communication & networksData communication & networks
Data communication & networks
 
POP3 Post Office Protocol
POP3 Post Office ProtocolPOP3 Post Office Protocol
POP3 Post Office Protocol
 
File Transfer Protocol - FTP
File Transfer Protocol - FTPFile Transfer Protocol - FTP
File Transfer Protocol - FTP
 
C Programming- Features of C language
C Programming-  Features of C languageC Programming-  Features of C language
C Programming- Features of C language
 
What is an intranet
What is an intranetWhat is an intranet
What is an intranet
 
How the internet_works
How the internet_worksHow the internet_works
How the internet_works
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
(Ftp) file transfer protocol
(Ftp)   file transfer protocol(Ftp)   file transfer protocol
(Ftp) file transfer protocol
 
All about email
All about emailAll about email
All about email
 
File sharing ppt
File sharing pptFile sharing ppt
File sharing ppt
 
System programming
System programmingSystem programming
System programming
 
Language processors
Language processorsLanguage processors
Language processors
 
How internet works
How internet worksHow internet works
How internet works
 
High level and Low level Language
High level and Low level Language High level and Low level Language
High level and Low level Language
 
Ftp
FtpFtp
Ftp
 
Smtp
SmtpSmtp
Smtp
 
Internet and Its Applications
Internet and Its ApplicationsInternet and Its Applications
Internet and Its Applications
 

Destacado

Email ppt
Email pptEmail ppt
Email pptmelgade
 
Mime powerpointt
Mime powerpointt Mime powerpointt
Mime powerpointt Zara
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocolguest029bcd
 
E Mail Ppt
E Mail PptE Mail Ppt
E Mail Pptkevpatel
 
Security consideration with e commerce
Security consideration with e commerceSecurity consideration with e commerce
Security consideration with e commerceStudsPlanet.com
 
E mail transfer .74
E mail transfer .74E mail transfer .74
E mail transfer .74myrajendra
 
N-tier Application Developement
N-tier Application DevelopementN-tier Application Developement
N-tier Application DevelopementDetectivee Mirza
 
Tier 1, 2 and 3 Capital based on the Basel II accord
Tier 1, 2 and 3 Capital based on the Basel II accordTier 1, 2 and 3 Capital based on the Basel II accord
Tier 1, 2 and 3 Capital based on the Basel II accordNahid Anjum
 
Web page analysis
Web page analysisWeb page analysis
Web page analysisibz10
 
E-Mail - Technical Overview
E-Mail - Technical OverviewE-Mail - Technical Overview
E-Mail - Technical OverviewVenkatesh Iyer
 
Computer Concepts Unit A PPT Lecture
Computer Concepts Unit A PPT LectureComputer Concepts Unit A PPT Lecture
Computer Concepts Unit A PPT Lecturewsbaker
 
Bandwidth Presentation
Bandwidth PresentationBandwidth Presentation
Bandwidth PresentationGrace=] Penda
 
Differences Between Architectures
Differences Between ArchitecturesDifferences Between Architectures
Differences Between Architecturesprasadsmn
 

Destacado (20)

Email ppt
Email pptEmail ppt
Email ppt
 
Mime powerpointt
Mime powerpointt Mime powerpointt
Mime powerpointt
 
Mime
MimeMime
Mime
 
File Transfer Protocol
File Transfer ProtocolFile Transfer Protocol
File Transfer Protocol
 
E Mail Ppt
E Mail PptE Mail Ppt
E Mail Ppt
 
Online Marketing PPT
Online Marketing PPTOnline Marketing PPT
Online Marketing PPT
 
POP3
POP3POP3
POP3
 
Security consideration with e commerce
Security consideration with e commerceSecurity consideration with e commerce
Security consideration with e commerce
 
E mail transfer .74
E mail transfer .74E mail transfer .74
E mail transfer .74
 
N-tier Application Developement
N-tier Application DevelopementN-tier Application Developement
N-tier Application Developement
 
How email works
How email worksHow email works
How email works
 
Tier 1, 2 and 3 Capital based on the Basel II accord
Tier 1, 2 and 3 Capital based on the Basel II accordTier 1, 2 and 3 Capital based on the Basel II accord
Tier 1, 2 and 3 Capital based on the Basel II accord
 
Web page analysis
Web page analysisWeb page analysis
Web page analysis
 
Mime presentation
Mime presentationMime presentation
Mime presentation
 
E-Mail - Technical Overview
E-Mail - Technical OverviewE-Mail - Technical Overview
E-Mail - Technical Overview
 
Computer Concepts Unit A PPT Lecture
Computer Concepts Unit A PPT LectureComputer Concepts Unit A PPT Lecture
Computer Concepts Unit A PPT Lecture
 
Bandwidth Presentation
Bandwidth PresentationBandwidth Presentation
Bandwidth Presentation
 
Differences Between Architectures
Differences Between ArchitecturesDifferences Between Architectures
Differences Between Architectures
 
Chap 20 smtp, pop, imap
Chap 20 smtp, pop, imapChap 20 smtp, pop, imap
Chap 20 smtp, pop, imap
 
Internet marketing slide
Internet marketing slideInternet marketing slide
Internet marketing slide
 

Similar a Information on protocols-email protocols

Ways to-access-inetrnet-
Ways to-access-inetrnet-Ways to-access-inetrnet-
Ways to-access-inetrnet-markgernale24
 
Introduction to internet.
Introduction to internet.Introduction to internet.
Introduction to internet.Anish Thomas
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityManishKumarH
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To InternetMohit Dhankher
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsHimanshu Pathak
 
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfTCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfanjaniar7gallery
 
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSSWeb Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSSKajal Singh
 
Internet tools and services
Internet tools and servicesInternet tools and services
Internet tools and serviceslearnt
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet ProtocolsAnil Neupane
 
Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)IMRAN KHAN
 

Similar a Information on protocols-email protocols (20)

internet protocol
internet protocolinternet protocol
internet protocol
 
Ways to-access-inetrnet-
Ways to-access-inetrnet-Ways to-access-inetrnet-
Ways to-access-inetrnet-
 
Introduction to internet.
Introduction to internet.Introduction to internet.
Introduction to internet.
 
Application Layer
Application LayerApplication Layer
Application Layer
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To Internet
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
 
Network Protocols
Network ProtocolsNetwork Protocols
Network Protocols
 
Protocols
ProtocolsProtocols
Protocols
 
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdfTCP  RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
TCP RFC 793 TCPIP (Transmission Control ProtocolInternet Proto.pdf
 
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSSWeb Programming: Basics of Internet and Introduction to HTML5 and CSS
Web Programming: Basics of Internet and Introduction to HTML5 and CSS
 
application layer
application layerapplication layer
application layer
 
Lecture 2
Lecture 2Lecture 2
Lecture 2
 
Internet tools and services
Internet tools and servicesInternet tools and services
Internet tools and services
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Web protocol.pptx
Web protocol.pptxWeb protocol.pptx
Web protocol.pptx
 
Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)
 
Tcp
TcpTcp
Tcp
 

Último

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 

Último (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 

Information on protocols-email protocols

  • 2. What is a protocol after all?  Protocol is a standard used to define a method of exchanging data over a computer network such as local area network, Internet, Intranet  Protocols define how messages are sent and received, i.e. the format and order of them, what happens when messages are transmitted and received.  Each protocol has its own method of how data is formatted when sent and what to do with it once received, how that data is compressed or how to check for errors in data.  The protocol can be implemented either in hardware or in software.
  • 3. Internet Protocol (IP) It is a protocol by which data is sent from one computer to another on the Internet. Each computer (known as a host) on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet. When you send or receive data (for example, an e-mail note or a Web page), the message gets divided into little chunks called packets.
  • 4.  Packets can arrive in a different order than the order they were sent in. The Internet Protocol just delivers them. It's up to another protocol, the Transmission Control Protocol (TCP) to put them back in the right order.  Each of these packets contains both the sender's Internet address and the receiver's address  Protocol version 4 (IPv4) standard that features IP addresses four bytes (32 bits) in length.  The newer Internet Protocol version 6 (IPv6) standard features addresses 16 bytes (128 bits) in length.
  • 5. Hypertext Transfer Protocol (HTTP)  HTTP is a set of standards that allow users of the World Wide Web to exchange information found on web pages.  The term HTTP was coined by Ted Nelson  HTTP commonly utilizes port 80, 8008, or 8080  When wanting to access any web page enter http:// in front of the web address, which tells the browser to communicate over HTTP
  • 6. Hypertext Transfer Protocol over Secure (HTTPS)  It is a secure method of accessing or sending information across a web page.  All data sent over HTTPS is encrypted before it is sent, this prevents anyone from understanding that information if intercepted.  Because data is encrypted over HTTPS, it is slower than HTTP, which is why HTTPS is only used when requiring login information or with pages that contain sensitive information such as an online bank web page.  HTTPS uses port 443 to transfer its information.  HTTPS is first used in HTTP/1.1
  • 8. File Transfer Protocol (FTP) • Standard Internet protocol for transmitting files between computers on the Internet. • First proposed on April 16, 1971 by Abhay Bhushan • Used to transfer Web page files from their creator to the computer that acts as their server for everyone on the Internet. • It's also commonly used to download programs and other files to your computer from other servers.
  • 9. Contd… • Your Web browser can also make FTP requests to download programs you select from a Web page. • Using FTP, you can also update (delete, rename, move, and copy) files at a server. • You need to logon to an FTP server. • FTP is most commonly used to download a file from a server using the Internet or to upload a file to a server (e.g., uploading a Web page file to a server).
  • 10. Email Protocols Interactions between email servers and clients are governed by email protocols. The most common email protocols are POP - Post Office Protocol IMAP - Internet Mail Access Protocol SMTP - Simple Mail Transport Protocol
  • 12. Most recent version of a standard protocol for receiving e-mail. Provides a simple, standardized way for users to access mailboxes and download messages to their computers. When using the POP protocol all eMail messages will be downloaded from the mail server to your local computer Most POP clients also provide an option to leave copies of email on the server.
  • 13. Advantage is that once messages are downloaded you can cut the internet connection and read your email at your leisure without incurring further communication costs protocol is built into most popular e-mail products, such as Eudora and Outlook Express. It's also built into the Netscape and Microsoft Internet Explorer browsers. The conventional port number for POP3 is 110.
  • 14. Internet Mail Access Protocol (IMAP)
  • 15.  IMAP was developed at Stanford University in 1986  Standard protocol for accessing e-mail from your local server.  The latest version, IMAP4, is similar to POP3 but supports some additional features.  For example, with IMAP4, you can search through your e-mail messages for keywords while the messages are still on mail server. You can then choose which messages to download to your machine.  Port - 143
  • 17. Difference between POP3 & IMAP IMAP POP3 It is a method of accessing e-mail messages on a server without having to download them to your local hard drive POP3 requires users to download messages to their hard drive before reading them The advantage of using an IMAP mail server is that users can check their mail from multiple computers and always see the same messages. This is because the messages stay on the server until the user chooses to download them to his or her local drive.
  • 18. Simple Mail Transfer Protocol (SMTP)
  • 19.  SMTP was created in the early 1980's  used by the Mail Transfer Agent (MTA) to deliver your eMail to the recipient's mail server.  only be used to send emails, not to receive them.  This is why you need to specify both the POP or IMAP server and the SMTP server when you configure your e-mail application.  SMTP usually is implemented to operate over Internet port 25.  An alternative to SMTP that is widely used in Europe is X.400.  Many mail servers now support Extended Simple Mail Transfer Protocol (ESMTP), which allows multimedia files to be delivered as e-mail.
  • 21. Multipurpose Internet Mail Extensions (MIME)  MIME was defined in 1992 by the Internet Engineering Task Force (IETF)  Many e-mail clients now support MIME, which enables them to send and receive graphics, audio, and video files via the Internet mail system.  There are many predefined MIME types, such as GIF graphics files and PostScript files.  In addition, MIME supports messages in character sets other than ASCII.  A new version, called S/MIME, supports encrypted messages.