SlideShare una empresa de Scribd logo
1 de 14
Shashwat Shriparv
dwivedishashwat@gmail.com
InfinitySoft
INTRODUCTION
In the early days of ARPANET, email is
consisted exclusively of text messages
written in English and expressed in ASCII.
For this environment , RFC 822 did the job
completely.
Nowadays, on the worldwide Internet,
this approach is no longer adequate.
The problems include sending and receiving are
1. Message in language with accents (eg:
French and German).
2. Message in nonLatin alphabets( eg: Hebrew
and Russian)
3. Message in language without alphebets(eg:
Chinese and Japanese)
4. Massage not containing text at all(eg: audio
and video
MIME-Multipurpose Internet Mail
Extensions
• A solution was proposed in RFC 1341 and updated in
RFC 1521.This solution called MIME is now widely used.
• The basic idea of MIME is to continue to use the RFC
822 format, but to add structure to the message body
and define encoding rules for non-ASCII messages.
• BY not deviating from 822, MIME massage can be sent
using the existing mail programs and protocols .
• All that has to be changed are the sending and receiving
programs, which users can do for themselves
• MIME defines five new message headers
They are
Header Meaning
MIME-Version: Identifies the MIME version
Content Description: Human-Readable string telling what is in the
message
Content-Id: Unique identifier
Content-Transfer-Encoding How the body is wrapped for transmission
Content-Type: Nature of the message
Type Subtype
Description
Text
Plain
Rich text
Unformatted text
Text including simple formatting
commands
Image
Gif
Jpeg
Still picture in GIF format
Still picture in JPEG format
Audio
Video
Basic
Mpeg
Audible sound
Application Octet-stream
Postscript
An un interpreted byte sequence
A printable document in PostScript
Message
Rfc822 A MIME RFC 822 message
Partial Message has been split for transmission
External Body Message itself must be fetched over the net
Multipart
Mixed
Alternative
Parallel
Digest
Same message in different formats
Parts must be viewed simultaneously
Each part is a complete RFC 822message
Movie in Mpeg format
Independent parts in the specified order
Message Transfer
• The message transfer system is
concerned with relaying ,messages from
originator to the recipient.
• Establish a transport connection from the
source machine to the destination
machine.
• There are situations in which this does not
work.
• To overcome this we can do is ….
SMTP-Simple Mail Transfer
Protocol
• Within the Internet email is delivered by having
the source machine establish a TCP connection
to port 25 of the destination machine
• Listening to this port is an email daemon that
speaks SMTP .
• SMTP is a simple ASCII protocol.
• If the server is willing to accept mail, the client
announces whom the email is coming from and
whom it is going to.
Email Gateways
• Email using SMTP works best when both
the sender and the receiver are on the
Internet and can support TCP connection
between sender and receiver. However,
many machines that are not on the
Internet still want to send and receive
email from Internet sites.
Final Delivery
• A simple protocol used for fetching email from a
remote mailbox is POP3(Post Office Protocol)
which is defined in RFC 1225.
• A more sophisticated delivery protocol is
IMAP(Interactive Mail Access Protocol) which is
defined in RFC 1064.
• The third delivery protocol is DMSP(Distributed
Mail System Protocol), which is part of the
PCMAIL system and described in RFC 1056.
• Independent of whether email is delivered directly to the
workstations or to a remote server, many systems
provide hooks for additional processing of incoming
email.
• An especially valuable tool for many email users is the
ability to set up filters.
• These are rules that are checked when email comes in
or when the user agent is started. Each rule specifies a
condition and an action.
• Another delivery feature often provided is
the ability to forward incoming email to a
different address. This address can even
be a computer operated by a commercial
paging service.
• Ability to install a vacation daemon.
Email Privacy
• When an email message is sent between
two distant sites, it will generally transit
dozens of machines on the way.Any of
these can read and record the message
for future use.
• Widely used secure email systems are.
PGP
PGM
Shashwat Shriparv
dwivedishashwat@gmail.com
InfinitySoft

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Dictributed application by Waqas
Dictributed application by WaqasDictributed application by Waqas
Dictributed application by Waqas
 
Simple mail transfer protocol
Simple mail transfer protocolSimple mail transfer protocol
Simple mail transfer protocol
 
Email
EmailEmail
Email
 
Introduction to Application layer
Introduction to Application layerIntroduction to Application layer
Introduction to Application layer
 
Unit 5 application layer
Unit 5 application layerUnit 5 application layer
Unit 5 application layer
 
Jaimin chp-7 - application layer- 2011 batch
Jaimin   chp-7 - application layer- 2011 batchJaimin   chp-7 - application layer- 2011 batch
Jaimin chp-7 - application layer- 2011 batch
 
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocol
 
Application layer protocol
Application layer protocolApplication layer protocol
Application layer protocol
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Application layer protocols
Application layer protocolsApplication layer protocols
Application layer protocols
 
file transfer and access utilities
file transfer and access utilitiesfile transfer and access utilities
file transfer and access utilities
 
Application layer : DNS
Application layer : DNSApplication layer : DNS
Application layer : DNS
 
Application layer
Application layerApplication layer
Application layer
 
Email HTTP And FTP
Email HTTP And FTP Email HTTP And FTP
Email HTTP And FTP
 
Network layer
Network layerNetwork layer
Network layer
 
Remote Login and File Transfer Protocols
Remote Login and File Transfer ProtocolsRemote Login and File Transfer Protocols
Remote Login and File Transfer Protocols
 
Chapter3
Chapter3Chapter3
Chapter3
 

Similar a Email

Similar a Email (20)

Email
EmailEmail
Email
 
Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit v
 
Mail server
Mail serverMail server
Mail server
 
Mail server
Mail serverMail server
Mail server
 
Information on protocols-email protocols
Information on protocols-email protocolsInformation on protocols-email protocols
Information on protocols-email protocols
 
The Internet
The InternetThe Internet
The Internet
 
Protocol
ProtocolProtocol
Protocol
 
Vishal patel.pptx
Vishal patel.pptxVishal patel.pptx
Vishal patel.pptx
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - IT
 
Application layer
Application layerApplication layer
Application layer
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOLSMTP - SIMPLE MAIL TRANSFER PROTOCOL
SMTP - SIMPLE MAIL TRANSFER PROTOCOL
 
how email works
how email workshow email works
how email works
 
Tcp/Ip Model
Tcp/Ip ModelTcp/Ip Model
Tcp/Ip Model
 
Network Protocols KS4
Network Protocols KS4Network Protocols KS4
Network Protocols KS4
 
Unit 7 - Internet and Intranet Applications - IT
Unit 7 - Internet and Intranet Applications - ITUnit 7 - Internet and Intranet Applications - IT
Unit 7 - Internet and Intranet Applications - IT
 
E mail protocols
E mail protocolsE mail protocols
E mail protocols
 
window server 2008 mail configuration
window server 2008 mail configurationwindow server 2008 mail configuration
window server 2008 mail configuration
 
Protocols
ProtocolsProtocols
Protocols
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 

Más de Shashwat Shriparv (20)

Learning Linux Series Administrator Commands.pptx
Learning Linux Series Administrator Commands.pptxLearning Linux Series Administrator Commands.pptx
Learning Linux Series Administrator Commands.pptx
 
LibreOffice 7.3.pptx
LibreOffice 7.3.pptxLibreOffice 7.3.pptx
LibreOffice 7.3.pptx
 
Kerberos Architecture.pptx
Kerberos Architecture.pptxKerberos Architecture.pptx
Kerberos Architecture.pptx
 
Suspending a Process in Linux.pptx
Suspending a Process in Linux.pptxSuspending a Process in Linux.pptx
Suspending a Process in Linux.pptx
 
Kerberos Architecture.pptx
Kerberos Architecture.pptxKerberos Architecture.pptx
Kerberos Architecture.pptx
 
Command Seperators.pptx
Command Seperators.pptxCommand Seperators.pptx
Command Seperators.pptx
 
Upgrading hadoop
Upgrading hadoopUpgrading hadoop
Upgrading hadoop
 
Hadoop migration and upgradation
Hadoop migration and upgradationHadoop migration and upgradation
Hadoop migration and upgradation
 
R language introduction
R language introductionR language introduction
R language introduction
 
Hive query optimization infinity
Hive query optimization infinityHive query optimization infinity
Hive query optimization infinity
 
H base introduction & development
H base introduction & developmentH base introduction & development
H base introduction & development
 
Hbase interact with shell
Hbase interact with shellHbase interact with shell
Hbase interact with shell
 
H base development
H base developmentH base development
H base development
 
Hbase
HbaseHbase
Hbase
 
H base
H baseH base
H base
 
My sql
My sqlMy sql
My sql
 
Apache tomcat
Apache tomcatApache tomcat
Apache tomcat
 
Linux 4 you
Linux 4 youLinux 4 you
Linux 4 you
 
Introduction to apache hadoop
Introduction to apache hadoopIntroduction to apache hadoop
Introduction to apache hadoop
 
Next generation technology
Next generation technologyNext generation technology
Next generation technology
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Email

  • 2. INTRODUCTION In the early days of ARPANET, email is consisted exclusively of text messages written in English and expressed in ASCII. For this environment , RFC 822 did the job completely. Nowadays, on the worldwide Internet, this approach is no longer adequate.
  • 3. The problems include sending and receiving are 1. Message in language with accents (eg: French and German). 2. Message in nonLatin alphabets( eg: Hebrew and Russian) 3. Message in language without alphebets(eg: Chinese and Japanese) 4. Massage not containing text at all(eg: audio and video
  • 4. MIME-Multipurpose Internet Mail Extensions • A solution was proposed in RFC 1341 and updated in RFC 1521.This solution called MIME is now widely used. • The basic idea of MIME is to continue to use the RFC 822 format, but to add structure to the message body and define encoding rules for non-ASCII messages. • BY not deviating from 822, MIME massage can be sent using the existing mail programs and protocols . • All that has to be changed are the sending and receiving programs, which users can do for themselves
  • 5. • MIME defines five new message headers They are Header Meaning MIME-Version: Identifies the MIME version Content Description: Human-Readable string telling what is in the message Content-Id: Unique identifier Content-Transfer-Encoding How the body is wrapped for transmission Content-Type: Nature of the message
  • 6. Type Subtype Description Text Plain Rich text Unformatted text Text including simple formatting commands Image Gif Jpeg Still picture in GIF format Still picture in JPEG format Audio Video Basic Mpeg Audible sound Application Octet-stream Postscript An un interpreted byte sequence A printable document in PostScript Message Rfc822 A MIME RFC 822 message Partial Message has been split for transmission External Body Message itself must be fetched over the net Multipart Mixed Alternative Parallel Digest Same message in different formats Parts must be viewed simultaneously Each part is a complete RFC 822message Movie in Mpeg format Independent parts in the specified order
  • 7. Message Transfer • The message transfer system is concerned with relaying ,messages from originator to the recipient. • Establish a transport connection from the source machine to the destination machine. • There are situations in which this does not work. • To overcome this we can do is ….
  • 8. SMTP-Simple Mail Transfer Protocol • Within the Internet email is delivered by having the source machine establish a TCP connection to port 25 of the destination machine • Listening to this port is an email daemon that speaks SMTP . • SMTP is a simple ASCII protocol. • If the server is willing to accept mail, the client announces whom the email is coming from and whom it is going to.
  • 9. Email Gateways • Email using SMTP works best when both the sender and the receiver are on the Internet and can support TCP connection between sender and receiver. However, many machines that are not on the Internet still want to send and receive email from Internet sites.
  • 10. Final Delivery • A simple protocol used for fetching email from a remote mailbox is POP3(Post Office Protocol) which is defined in RFC 1225. • A more sophisticated delivery protocol is IMAP(Interactive Mail Access Protocol) which is defined in RFC 1064. • The third delivery protocol is DMSP(Distributed Mail System Protocol), which is part of the PCMAIL system and described in RFC 1056.
  • 11. • Independent of whether email is delivered directly to the workstations or to a remote server, many systems provide hooks for additional processing of incoming email. • An especially valuable tool for many email users is the ability to set up filters. • These are rules that are checked when email comes in or when the user agent is started. Each rule specifies a condition and an action.
  • 12. • Another delivery feature often provided is the ability to forward incoming email to a different address. This address can even be a computer operated by a commercial paging service. • Ability to install a vacation daemon.
  • 13. Email Privacy • When an email message is sent between two distant sites, it will generally transit dozens of machines on the way.Any of these can read and record the message for future use. • Widely used secure email systems are. PGP PGM