UNIT - IV - INTERNET TECHNOLOGY and PROTOCOL
UNIT - IV - INTERNET TECHNOLOGY and PROTOCOL
UNIT – IV
EMAIL BASICS
Email is a service which allows us to send the message in electronic mode over
the internet. It offers an efficient, inexpensive and real time mean of
distributing information among people.
E-Mail Address
Each user of email is assigned a unique name for his email account. This name
is known as E-mail address. Different users can send and receive messages
according to the e-mail address.
E-mail is generally of the form username@domainname. For example,
webmaster@tutorialspoint.com is an e-mail address where webmaster is
username and tutorialspoint.com is domain name.
The username and the domain name are separated by @ (at) symbol.
E-mail addresses are not case sensitive.
Spaces are not allowed in e-mail address.
E-mail Header
The first five lines of an E-mail message is called E-mail header. The header
part comprises of following fields:
From
Date
To
Subject
CC
BCC
From
The From field indicates the sender’s address i.e. who sent the e-mail.
Date
The Date field indicates the date when the e-mail was sent.
To
The To field indicates the recipient’s address i.e. to whom the e-mail is sent.
Subject
The Subject field indicates the purpose of e-mail. It should be precise and to
the point.
INTERNET TECHNOLOGY
CC
CC stands for Carbon copy. It includes those recipient addresses whom we
want to keep informed but not exactly the intended recipient.
BCC
BCC stands for Black Carbon Copy. It is used when we do not want one or more
of the recipients to know that someone else was copied on the message.
Greeting
Greeting is the opening of the actual message. Eg. Hi Sir or Hi Guys etc.
Text
It represents the actual content of the message.
Signature
This is the final part of an e-mail message. It includes Name of Sender, Address,
and Contact Number.
Advantages
Inexpensive
The cost of sending e-mail is very low.
Printable
It is easy to obtain a hardcopy of an e-mail. Also an electronic copy of an e-mail
can also be saved for records.
Global
E-mail can be sent and received by a person sitting across the globe.
Generality
It is also possible to send graphics, programs and sounds with an e-mail.
Disadvantages
Apart from several benefits of E-mail, there also exists some disadvantages as
discussed below:
Forgery
Overload
Misdirection
Junk
No response
Forgery
E-mail doesn’t prevent from forgery, that is, someone impersonating the
sender, since sender is usually not authenticated in any way.
Overload
Convenience of E-mail may result in a flood of mail.
Misdirection
It is possible that you may send e-mail to an unintended recipient.
Junk
Junk emails are undesirable and inappropriate emails. Junk emails are
sometimes referred to as spam.
No Response
It may be frustrating when the recipient does not read the e-mail and respond
on a regular basis.
E-mail System
INTERNET TECHNOLOGY
Working of E-mail
Email working follows the client server approach. In this client is the mailer i.e.
the mail application or mail program and server is a device that manages
emails.
Following example will take you through the basic steps involved in sending
and receiving emails and will give you a better understanding of working of
email system:
Suppose person A wants to send an email message to person B.
Person A composes the messages using a mailer program i.e. mail client
and then select Send option.
The message is routed to Simple Mail Transfer Protocol to person B’s
mail server.
The mail server stores the email message on disk in an area designated
for person B.
The disk space area on mail server is called mail spool.
There are various email service provider available such as Gmail, hotmail,
ymail, rediff mail etc. Here we will learn how to create an account using Gmail.
Open gmail.com and click create an account.
Now a form will appear. Fill your details here and click Next Step.
INTERNET TECHNOLOGY
This step allows you to add your picture. If you don’t want to upload
now, you can do it later. Click Next Step.
Now a welcome window appears. Click Continue to Gmail.
Wow!! You are done with creating your email account with Gmail. It’s
that easy. Isn’t it?
Now you will see your Gmail account as shown in the following image:
Key Points:
Gmail manages the mail into three categories namely Primary,
Social and Promotions.
Compose option is given at the right to compose an email message.
Inbox, Starred, Sent mail, Drafts options are available on the left pane
which allows you to keep track of your emails.
Once you have specified all the above parameters, It’s time to send the email.
The mailer program provides a Send button to send email, when you click
Send, it is sent to the mail server and a message mail sent successfully is
shown at the above.
Reading Email
Every email program offers you an interface to access email messages. Like in
Gmail, emails are stored under different tabs such as primary, social, and
promotion. When you click one of tab, it displays a list of emails under that
tab.
In order to read an email, you just have to click on that email. Once you click a
particular email, it gets opened.
The opened email may have some file attached with it. The attachments are
shown at the bottom of the opened email with an option called download
attachment.
Replying Email
After reading an email, you may have to reply that email. To reply an email,
click Reply option shown at the bottom of the opened email.
Once you click on Reply, it will automatically copy the sender’s address in to
the To field. Below the To field, there is a text box where you can type the
message.
Once you are done with entering message, click Send button. It’s that easy.
Your email is sent.
Forwarding Email
It is also possible to send a copy of the message that you have received along
with your own comments if you want. This can be done using forward button
available in mail client software.
The difference between replying and forwarding an email is that when you
reply a message to a person who has send the mail but while forwarding you
can send it to anyone.
When you receive a forwarded message, the message is marked with a >
character in front of each line and Subject: field is prefixed with Fw.
Deleting Email
INTERNET TECHNOLOGY
If you don’t want to keep email into your inbox, you can delete it by simply
selecting the message from the message list and clicking delete or pressing the
appropriate command.
Some mail clients offers the deleted mails to be stored in a folder called
deleted items or trash from where you can recover a deleted email.
Attachment
Ability to attach file(s) along with the message is one of the most useful
features of email. The attachment may be a word document, PowerPoint
presentation, audio/video files, or images.
In order to attach file(s) to an email, click the attach button. As a result, a
dialog box appears asking for specifying the name and location of the file
you want to attach.
Once you have selected the appropriate file, it is attached to the mail.
Usually a paper clip icon appears in the email which indicates that it has
an attachment.
When adding an attachment it is better to compress the attached files so
as to reduce the file size and save transmission time as sending and
downloading large files consumes a lot of space and time.
Address Book
Address book feature of a mail program allows the users to store information
about the people whom they communicate regularly by sending emails. Here
are some of the key features of an Address book:
Address book includes the nick names, email addresses, phone number
etc. of the people.
Using address book allows us not to memorize email of address of a
person, you just have to select recipient name from the list.
When you select a particular name from the list, the corresponding email
address link automatically get inserted in to the To: field.
Address book also allows creating a group so that you can send a email
to very member of the group at once instead of giving each person email
address one by one.
MIME Types
Suppose if you want to send a word processor document that has a group of
tabular columns with complex formatting. If we transfer the file as text, all the
formatting may be lost. MIME compliant mailer takes care of messy details and
the message arrives as desired.
The following table describes commonly used MIME Types:
EMAIL PROTOCOL
SMTP
o SMTP stands for Simple Mail Transfer Protocol.
o SMTP is a set of communication guidelines that allow software to
transmit an electronic mail over the internet is called Simple Mail
Transfer Protocol.
o It is a program used for sending messages to other computer users
based on e-mail addresses.
o It provides a mail exchange between users on the same or different
computers, and it also supports:
o It can send a single message to one or more recipients.
o Sending message can include text, voice, video or graphics.
o It can also send the messages on networks outside the internet.
o The main purpose of SMTP is used to set up communication rules
between servers. The servers have a way of identifying themselves and
announcing what kind of communication they are trying to perform.
They also have a way of handling the errors such as incorrect email
address. For example, if the recipient address is wrong, then receiving
server reply with an error message of some kind.
Components of SMTP
o First, we will break the SMTP client and SMTP server into two
components such as user agent (UA) and mail transfer agent (MTA). The
user agent (UA) prepares the message, creates the envelope and then
puts the message in the envelope. The mail transfer agent (MTA)
transfers this mail across the internet.
INTERNET TECHNOLOGY
o The relaying system without TCP/IP protocol can also be used to send
the emails to users, and this is achieved by the use of the mail gateway.
The mail gateway is a relay MTA that can be used to receive an email.
INTERNET TECHNOLOGY
Working of SMTP
EMAIL ADDRESSES
On the far right, the .com component represents the top level domain (TLD) for
the email address. It could also be replaced with .org, .edu, or another entity.
Commonly-used TLDs include:
The domain name is the specific name of the organization. This could be any
name, but familiar ones include Google.com or Target.com. The combination
of the organization name and TLD is the address entered into a browser to go
to the organization’s website. The @ (pronounced “at”) symbol is the
connector between the domain and the person who the email address belongs
to. In this case, the person is Jane Doe. When an email is sent to this address,
the message is sent to Jane Doe at the domain name.
INTERNET TECHNOLOGY
To create a personal email address that will not change as you change schools,
jobs, or internet service providers, create an account with an email provider of
your choosing, such as Gmail or Yahoo! Mail. The email provider will often ask
for your first and last name to create your unique email address. Typically,
users will use their name in the email address, so the mail will be easily
recognizable. Create a password in order to securely access your emails, and
you’re set.
2. Header
The header consists of a series of lines. Each header field consists of a single
line of ASCII text specifying field name, colon and value. The main header
fields related to message transport are :
1. To: It specifies the DNS address of the primary recipient(s).
2. Cc : It refers to carbon copy. It specifies address of secondary recipient(s).
3. BCC: It refers to blind carbon copy. It is very similar to Cc. The only
difference between Cc and Bcc is that it allow user to send copy to the
third party without primary and secondary recipient knowing about this.
4. From : It specifies name of person who wrote message.
5. Sender : It specifies e-mail address of person who has sent message.
INTERNET TECHNOLOGY
6. Received : It refers to identity of sender’s, data and also time message was
received. It also contains the information which is used to find bugs in
routing system.
7. Return-Path: It is added by the message transfer agent. This part is used
to specify how to get back to the sender.
3. Body:- The body of a message contains text that is the actual
content/message that needs to be sent, such as “Employees who are eligible
for the new health care program should contact their supervisors by next
Friday if they want to switch.” The message body also may include signatures
or automatically generated text that is inserted by the sender’s email system.
The above-discussed field is represented in tabular form as follows :
Header Meaning
Header Meaning
Return-
Path It can be used to identify a path back to the sender.
In addition to above-discussed fields, the header may also contain a variety of
other fields which are as follows :
Header Meaning
a remote computer say email server and stored there until the recipient of the
email go online and check it.
For sending and receiving any email an email address is needed, every email
address comprises three parts :
Username: It can be anything but following the guidelines decided by the email
provider.
Domain name/host: It is the mail server where the message will be stored. It
can be @gmail, @outlook, etc.
Domain Type: It tells whether a given email address is commercial like .com or
educational .edu and some other custom type.
Email System
1. Email Client
2. Mail Transfer Agent
3. Mail Delivery Agent
Email Client
An email client is also known as a Mail User Agent. It is actually the program
or the application that one has on his/her computer to send and receive
emails. The email client is used to compose emails, send them, and read
them. It is basically used for email management like creating, sending,
receiving, and deleting emails.
Features of Email Client:
1. It hides the complexity of sending and receiving emails by providing a
user-friendly interface. By using this interface it is possible for any novice
user to send and receive emails easily.
2. Most of the email client servers provide some kind of backup so one need
not worry if any message is deleted as it will move to the bin and one can
recover it from there.
INTERNET TECHNOLOGY
3. Each email client provides a high level of encryption to the messages while
sending them on the internet to reach the server, so it takes care of
privacy or confidentiality.
4. One of the most important features is accessibility means the ability to
read messages from any computer or mobile device from anywhere in the
world by using an internet connection.
5. No problem of memory or space as email clients provide more than
sufficient memory space on email servers.
6. Email clients can also be used as a to-do list for setting important
reminders.
Examples
Some of the famous Email Clients are as follows:-
Microsoft Outlook: It is one of the best email clients as it has lots of features
that individuals can use for personal information management. It is a part of
the Office 365 suite. It can be used in both ways as stand-alone software and
also as multiple-user software.
Some of the features of Microsoft Outlook are:
1. Task Management
2. Contact Management
3. Setting Reminders
4. Note Taking
5. Calendar Management
1. Email Tracking
2. Calendar syncing and integration options
3. The facility of speed reader
4. Feature of customizing themes
5. Events management
Thunderbird: This email client is made by Mozilla, actually at first they made
it for Linux mainly but considering windows users they designed it for both
windows and mac. One of the best things about this email client is that it is
free. For security purposes, it is one of the good choices.
Some of the features of Thunderbird are:
1. Multiple App Integration
2. Best Privacy Features
3. Multiple Inbox Management
4. Message Filtering
5. Tabbed email option
Applications
Some of the applications of an email client are :
1. Communication with others over the internet: Email client helps to
communicate over the internet in a secure way by sending and receiving
messages.
2. For business growth and development: In today’s digital era it is nearly
impossible to avoid interaction through an email client, for one purpose or
other. It helps in business growth as it provides a digital platform by using
which branding or advertising can be done easily.
3. For sharing different types of files: Sharing files with remote clients
become very easy with the use of email clients, different types of files and
media can be shared easily using email clients.
4. For the backup purpose of useful data: Data backup of useful files had
always been a big problem to all but now it is easy to save useful data by
mailing it to yourself, in this manner, it will be on the server and can be
accessed from anywhere and anytime.
5. Record Keeping: It is also used to keep written records of transactions
between clients which makes communication transparent and no one can
deny his/her statements.
Mail Transfer Agent
A mail transfer agent is used to send email between different computers say
from one computer to another by making the use of Simple Mail Transfer
Protocol (SMTP).
INTERNET TECHNOLOGY
Users are unaware of mail transfer agents and think that the email
transmission process is straightforward while it takes a lot to send an email to
the intended recipient.
Mail Delivery Agent
Mail Delivery Agent is used by the Mail Transfer Agent for sending emails to a
specific user’s inbox. More specifically, think of a mail delivery agent as any
program which handles a message for delivery to the point where the mail
transfer agent can read it.
EMAIL SERVER
Email servers work pretty much like other kinds of servers. They are
responsible for routing specific information, in this case – emails, across a
network like the internet.
Email servers rely on the IP addresses attached to emails and the DNS
system to ensure that each message is routed directly across the internet to
the correct recipient, regardless of the domain.
INTERNET TECHNOLOGY
E
mail servers relay messages between senders and recipients
Depending on the server settings, any given mail server (e.g., Microsoft
Exchange Server) is responsible for distributing outgoing email (like an SMTP
server) or for retrieving and managing incoming email (like an IMAP server).
1. The sender uses a computer to sign into their email account and write a
message. As well as the message, they must include the recipient’s email
address before they hit send.
2. The email is first sent to SMTP or outgoing email servers. Here, the server
does a DNS record check to translate domain names in email addresses into
IP addresses that servers can use to route the email.
3. If the email goes to a domain within the same network, the first server can
simply route the email to the correct IMAP server.
4. However, if the mail is addressed to a domain on an IMAP server in a
different network, the initial SMTP server will rely on unrelated SMTP servers
to route the mail.
5. Finally, the incoming mail server uses a protocol like IMAP or POP to send all
messages to the recipient’s computer. The recipient can then find the
message in the inbox of their account.
H
ow a mail server works
Compiled List
The compiled list is prepared by collecting information from various sources
such as surveys, telemarketing etc.
Announcements
These lists are created for sending out coupans , new product announcements
and other offers to the customers.
Discussion List
This list is created for sharing views on a specific topic suchas computer,
environment , healt, education etc.
Before joining a mailing list, it is mandatory to subscribe to it. Once you are
subscribed, your message will be sent to all the persons who have subscribed
to the list. Similarly if any subscriber posts a message, then it will be received
by all subscribers of the list.
There are many list servers available, each having its own commands for
subscribing to the list. Some of them are described in the following table:
EMAIL SECURITY
Email security is a term for describing different procedures and techniques for
protecting email accounts, content, and communication against unauthorized
access, loss or compromise. Email is often used to spread malware, spam and
phishing attacksSignificance of Email Security Practices
984,855.
INTERNET TECHNOLOGY
BEC (Business Email Compromise) – The tracker uses this approach to acquire
access to a business email account and impersonate the owner. The attacker
usually targets organizations that use wire transfers to send money to overseas
vendors.
Dangerous emails have some common features. Look out for the following
attributes to identify emails that have been sent with a malicious intent −
Look for emails that utilize display name spoofing to hide the sender's true
identity. These emails look like to have been sent by respectable organizations
or trustworthy persons. Examine the sender's email address in the header for
any small variations, such as extra characters or letters.
A Sense of Immediacy
In addition to verifying the email's header, you should also check the email's
body. If you receive an unusual request that makes you feel compelled to act,
it's likely that it includes malware. As a result, examine the email's wording for
any feeling of urgency. Check for grammar and spelling issues, as most spam
emails are poorly written.
Any email that requests you to verify, evaluate, check, or confirm any
information is most likely a virus email. As a result, double-check the sender's
email address before responding.
Suspicious Links
Keep an eye out for emails that push you to visit a website. It might be infected
with malware! Check the URL before clicking on the link. If it's a hyperlinked
link, hover your cursor over the text and double-check the link before clicking.
Following are some of the best practices in email security that work −
Make sure the devices you use to log in are up to date. With the rise of remote
work, many workers are encouraged to work from home and use personal
devices to access company email accounts. Personal gadgets, on the other
hand, are far more difficult for an organization to track, posing a serious
security concern.
INTERNET TECHNOLOGY
Only connect to secure Wi-Fi networks. If your firm doesn't utilize Wi-Fi or
work from home, make sure you're always connected to the internet over a
secure connection.