+ All Categories

Email

Date post: 13-May-2015
Category:
Upload: roy-thomas
View: 318 times
Download: 0 times
Share this document with a friend
Description:
A brief discription on the basic Email function charctertics etc...
Popular Tags:
35
Group 5.
Transcript
Page 1: Email

Group 5.

Page 2: Email

Overview. WHAT IS E-MAIL . DIFFERENT E-MAIL PROVIDERS. WHAT MAKES UP AN E-MAIL. DIFFERENT ARCHITECTURAL MODELS. HOW E-MAIL REALLY TRAVEL. BOUNCING OF E-MAIL. THREATS TO E-MAIL. OVERCOMING THREATS. CONCLUSION.

Page 3: Email

Meaning Electronic mail, often abbreviated as email or e-

mail. Email – an electronic message transmitted over a

network from one user to another. Can be as simple as a few lines of text, or include

attachments such as pictures or documents. It is the method of exchanging digital messages

between two or more systems. E-mail systems are based on a store-and-forward

model. In which e-mail computer server systems accept,

forward, deliver and store messages on behalf of user.

Page 4: Email

History The first email systems were developed at SCD

and MIT in 1965. Incompatible with each other, each system was designed to facilitate message delivery between users on a single machine.

Ray Tomlinson invented email

back in 1971 – essentially fostering global business communication.

It is the easy & cheapest comm.

Page 5: Email

Definition

Electronic mail (or E-mail ) can be defined as ‘the transformation of computer- stored messages by using telecommunications”

Page 6: Email

Advantages of E mail

Screening information Bringing Work on the Road Sending Messages to Greet Managing E mail is easy and fast Email is easy to filter E-mails are delivered uninterruptedly

Page 7: Email

Disadvantages of E-mail

E-Mail Overload Time consuming E-mail and Excuse Infecting your computer with a virus Ignorance

Page 8: Email

Now a days there many e-mail providers.

Gmail.

Yahoo mail.

Rediff mail.

Hotmail.

Email Providers

Page 9: Email

How to Sign Up for a Gmail Email Account

1. Go to www.gmail.com

2. Click on “Sign Up for Gmail”

3. Fill in the Registration Form

Create user ID

Page 10: Email

Cont….Should I provide accurate person information or is it OK to lie?

Unique login name

Password registration boxes and password strength

Security question

Answer to the security question

Description of Google’s Web History

Page 11: Email

Cont….Email address for authenticating account

Location of person creating an account

Word verification

Terms of Service policy and links to other user policies

Button for creating Gmail account

Page 12: Email

Sending and Receiving Email

Three Exercises

1. Signing in (“Logging In”) to Gmail

2. Sending a message to your class partner

3. Reading new messages in your “Inbox”

Page 13: Email

Sending and Receiving Email

Exercise 1: Signing In

1. Go to www.gmail.com 2. Type in your username

and password3. Click on the ‘sign in’

button

Page 14: Email

Sending and Receiving Email

Exercise 2: Sending an EmailTo: Type full email address of your class partner

Subject: Type a title for your message

Message: Type your message in this box

Send: Used to send emails

Page 15: Email

Sending and Receiving Email

Confirmation message:

Confirmation message and link to sent message

Page 16: Email

Sending and Receiving Email

Checking for New Email MessagesThe number of new messages in your account appears beside the Inbox link.Main Menu

Page 17: Email

Sending and Receiving Email

The Inbox

Messages already opened

Un-read message in bold font

Page 18: Email

Sending and Receiving Email

Your Messages

TitleSender Date

Double click on a subject to read a message

Page 19: Email

Managing your Messages

Replying to a Message

“Replying” to a message sends it back to the person who sent it to you.

Exercise: View the message from your partner Click on the “Reply Button” Type in a Reply Click on Send

Page 20: Email

WHAT MAKES UP AN E-MAIL.Internet e-mail messages consist of two major

sections HeaderHeader

Structured into fields such as summary, sender(from), receiver(to), subject, date , cc ,Bcc, reply, message-id about the e-mail.

BodyBodyThe message itself as unstructured text; sometimes containing a signature block at the end. This is exactly the same as the body of a regular letter.

Page 21: Email

DIFFERENT ARCHITECTURAL MODELS. Different Architectural Models exist for

constructing computer systems. Some models include

Peer-Peer

Pipe and Filter

Implicit Invocation

Client-Server

Page 22: Email

Provided Interface

ClientRequired Interface

Provided Interface

ClientRequired Interface

Provided Interface

ClientRequired Interface

Provided Interface

ClientRequired Interface

Provided Interface

ClientRequired Interface

Provided Interface

ClientRequired Interface

Provided Interface

ServerRequired Interface

Provided Interface

ServerRequired Interface

Provided Interface

ClientRequired Interface

Provided Interface

ClientRequired Interface

Provided Interface

ClientRequired Interface

Provided Interface

ClientRequired Interface

Provided Interface

ClientRequired Interface

Provided Interface

ClientRequired Interface

Provided Interface

ServerRequired Interface

Provided Interface

ServerRequired Interface

DIFFERENT ARCHITECTURAL MODELS. The model that works best for email is the

Client-Server model.

Clients carry out user interactions with the email server.

Page 23: Email

An email client is an email program such as Outlook Express, for sending, receiving and organizing your email messages.

Email servers are used to process, store and send, and receive email messages. There are different types of email servers, such as POP 3, SMTP and IMAP servers. The most popular email servers are POP 3 (incoming mail servers for your incoming mail) and SMTP (outgoing mail servers for your outgoing mail).

Page 24: Email

Step A: Sender creates and sends an email The originating sender creates an The originating sender creates an

email in their Mail User Agent (MUA) email in their Mail User Agent (MUA) and clicks 'Send‘.and clicks 'Send‘.

Step B: Sender's MDA/MTA routes the email The sender's MUA transfers the email The sender's MUA transfers the email

to a Mail Delivery Agent (MDA).to a Mail Delivery Agent (MDA). Frequently, the sender’s MTA also Frequently, the sender’s MTA also handles the responsibilities of an MDA. handles the responsibilities of an MDA. The MDA/MTA accepts the email, then The MDA/MTA accepts the email, then routes it to local mailboxes.routes it to local mailboxes.

HOW E-MAIL REALLY WORKS

Page 25: Email

Step C: Network Cloud

The network cloud may encompass a multitude The network cloud may encompass a multitude of mail servers, DNS servers, routers and other of mail servers, DNS servers, routers and other devices and services too numerous to mention.devices and services too numerous to mention.

These devices may be protected by firewalls, These devices may be protected by firewalls, spam filters and malware detection software spam filters and malware detection software that may bounce or even delete an email. that may bounce or even delete an email.

Step D: Email Queue

So it enters an email queue with other o it enters an email queue with other outgoing email messages.outgoing email messages.

Page 26: Email

Step E: MTA to MTA Transfer

When transferring an email, the sending MTA When transferring an email, the sending MTA handles all aspects of mail delivery until the handles all aspects of mail delivery until the message has been either accepted or rejected by message has been either accepted or rejected by the receiving MTA.the receiving MTA.

Step F: Firewalls, Spam and Virus Filters

An email encountering a firewall may be tested by An email encountering a firewall may be tested by spam and virus filters before it is allowed to pass spam and virus filters before it is allowed to pass inside the firewall. If the message contains inside the firewall. If the message contains malware, the file is usually quarantined and the malware, the file is usually quarantined and the sender is notified. If the message is identified as sender is notified. If the message is identified as spam, it will probably be deleted without notifying spam, it will probably be deleted without notifying the sender.the sender.

Page 27: Email
Page 28: Email

BOUNCING OF E-MAIL.Due to the following reasons e-mail will bounce. Mailbox Not Found

Invalid mailbox

Mailbox unavailable

Mailbox full

Host unknown.

Page 29: Email

A sending MTA can encounter two general kinds of problems transferring an email: Transient or Permanent failures.

Transient failuresIf a transient error occurs, the MTA will hang onto the message, periodically retrying the delivery until it either succeeds or fails, or until the MTA decides that the transient issue is really a permanent condition.

Permanent failuresIf the MTA cannot deliver the message (it has received a fatal error message or failed to complete the transfer after repeated attempts), it bounces the message back to the sender.

Page 30: Email

THREATS TO E-MAIL E-mail spoofing

Occurs when the header information of an email is altered to make the message appear to come from a known or trusted source.

E-mail bombing

Is the intentional sending of large volumes of messages to a target address. The overloading of the target email address can render it unusable and can even cause the mail server to crash.

Page 31: Email

OVERCOMING THREATS E-mail messages have to go through

intermediate computers before reaching their destination.

Many Internet Service Providers (ISP) store copies of e-mail messages on their mail servers before they are delivered.

Using encryption techniques.

Page 32: Email

CONCLUSION There are many uses of e-mail in our daily life.

We should not misuse the e-mail for illegal activities.

We should have our own moral values.

Page 33: Email

Reference Google

Wikipedia

Page 34: Email

Team Members

Sonu K Sebastian Sajith P.S Sam Scaria Scaria Joseph Sonia Sebu Surayya

Shruthi.S. Murali Shipla Tony Xavier Thambu John Swathi Raj Roy Thomas

Page 35: Email

Thank You.


Recommended